Applications aren’t possible without application development, and in today’s hosted-feature age, neither are advanced services. That makes the question of how to implement edge and telecom applications critical, but it’s a difficult question to answer. Applications will typically have an optimum architectural model, set by the way the application relates to the real world. That…
5G Standalone: Does It Really Change Anything?
Tech news, like political news, often tries to cover all the bases, so it would be reasonable for me to be cynical about Light Reading’s recent story on 5G “standalone”. 5G’s “next big flop” sure sounds negative, but in truth LR has shown a healthy level of 5G skepticism in the past. The reason this…
SD-WAN May Be Taking Us Somewhere Important
SD-WAN has undergone a number of transformations, driven (for a change) more by a recognition of new missions than by simple technology evolution. What we may now be seeing is a completely new network model emerging, one that separates connectivity from bit transport in a decisive way. That new model could empower new competitors in…
Monitoring, Observability, and What Should Lie Beyond
We hear a lot these days about “observability”, and many in the network and IT space think this is just another cynical “create-another-category” move by some analyst firms. After all, the distinction between the new concept of observability and good old-fashioned monitoring seems pretty subtle and subjective. In fact, the most common remark I get…
Our Edge Computing Series as a Report
My recent blog series on edge computing is now available as a special report, in zipped PDF format. Please download it HERE! Email and RSS:
Edge Computing Part 5: Edge Networking and Security
This is the fifth and final blog in my series on edge computing, and in it we’ll talk about two critical issues. First, how do we network “the edge” to realize the capabilities buyers expect. Second, how do we secure the edge, given that its real-world relationship target makes it a profound security risk. Any…
Edge Computing Part 4: Adapting Current Technologies to the Edge
What can we learn, if anything, from those applications already considered “edge computing”? We have cloud applications that are event-driven today, and some of them aren’t even IoT. We also have some applications that might not seem event-driven at all. Obviously, we have local edge computing in place for most of the “IoT” applications enterprises…
Edge Computing Part 3: What Might an Edge Architecture Look Like?
Wherever “the edge” is hosted, what gets hosted is software. If there is such a thing as “edge software” as a subset of “software” or “cloud software” then there has to be development, and development has to be based on some set of what’s popularly called “middleware”, a toolkit that facilitates development by providing a…
Edge Computing Part Two: Will Cloud Providers Own the Edge?
Is “the edge” an extension of the public cloud? That may well be the biggest question we face in edge computing, because it determines what players are likely to dominate the evolution of edge computing, and who will frame how edge applications are written. Those factors may then determine just how fast we get a…
Edge Computing: Part One
While there are surely many contenders for the most critical and hyped technology, edge computing is my choice. 5G depends on the edge, and so does IoT. Many believe it’s the future of cloud computing. Many believe it’s the future of premises computing. Everybody seems to believe that it will make them money, despite the…