Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Edge Computing Patterns for Solution Architects
  • Table Of Contents Toc
Edge Computing Patterns for Solution Architects

Edge Computing Patterns for Solution Architects

By : Ashok Iyengar, Joseph Pearson
5 (8)
close
close
Edge Computing Patterns for Solution Architects

Edge Computing Patterns for Solution Architects

5 (8)
By: Ashok Iyengar, Joseph Pearson

Overview of this book

Enriched with insights from a hyperscaler’s perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches. This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you’ll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You’ll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing. By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.
Table of Contents (17 chapters)
close
close
Lock Free Chapter
1
Part 1:Overview of Edge Computing as a Problem Space
4
Part 2: Solution Architecture Archetypes in Context
8
Part 3: Related Considerations and Concluding Thoughts

Data Has Weight and Inertia

Whether audio, visual, sensory, or telemetry, edge computing is all about data. Whether the data is processed or otherwise transformed at the source where it is generated, stored for later analysis, or used to build models in the future, data is the lifeblood of edge computing. Since data is so valuable, organizations need to store and analyze it before determining relevancy. However, it needs to be done both securely and while actively protecting it in order to meet regulatory compliance regulations. This chapter will discuss considerations about data in its various states. Decisions you make about data will affect where data is primarily stored (data at rest) and how it is stored. Thus, how it is accessed or transferred (data in motion) becomes a secondary consideration, and tracking how it is used and transformed (data in processing) is critical to having confidence in its trustworthiness.

In this chapter, we will cover the following main topics:

...
Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Edge Computing Patterns for Solution Architects
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon