Book Image

Edge Computing Patterns for Solution Architects

By : Ashok Iyengar, Joseph Pearson
Book Image

Edge Computing Patterns for Solution Architects

By: Ashok Iyengar, Joseph Pearson

Overview of this book

Enriched with insights from a hyperscaler’s perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches. This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you’ll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You’ll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing. By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.
Table of Contents (17 chapters)
Free Chapter
1
Part 1:Overview of Edge Computing as a Problem Space
4
Part 2: Solution Architecture Archetypes in Context
8
Part 3: Related Considerations and Concluding Thoughts

Zero Trust or as close as you can get

In this section, we will discuss common and emerging practices to secure the application’s use of the network, and what really matters. We will review major aspects of a Zero Trust architecture in the context of edge computing. By the end, you will be able to describe the approaches, what potential benefits they bring, and when they might be useful to your edge architectures.

Let’s begin with the basics and discuss handling secrets. It can be surprising how often this discipline is overlooked or ignored, yet proper implementation is critical to prevent unauthorized access.

Managing secrets on the edge

Software development teams should not only be trained in how to securely connect applications to remote services but they should also be provided with edge-native solutions to enable them to properly manage the credentials, API keys, certificates, and other secrets. While some tools such as GitHub provide built-in secrets management...