Page 13 - Issue 2 2023
P. 13

EDGE COMPUTING


           The new edge is coming to transform


                        the computing experience





                                    By Carla Petersen, channel manager at Westcon-Comstor





            dge computing is not a new technology. Emerging during the ‘first wave’ (2000-2010)
            of the internet, when the need to distribute content closer to the user was a priority,
       Eedge started gaining traction. It was considered the ideal solution to solve the ‘last
        mile’ problem. Today, it has become such an integral part of computing that the global
        edge market is projected to reach $155.9 billion by 2030.
           Spurred by the ‘second wave’ (2010-2020) of the internet defined by the cloud and
        mobility, and then the emergence of the current ‘third wave’ (2020-current), where the
        focus is now on devices and mobility, edge computing has evolved significantly over the
        past two decades. F5 CTO Geng Lin covers this evolutionary path in more detail in his
        paper “The Third Wave of the Internet.”

        Growing threat landscape
        One of the key insights from this paper is that, until recently, there has been no need for
        a platform at the edge. Application design and architecture readily adapted to the cloud.
        However, the growing digital economy saw increased threat actors, with volumetric   Carla Petersen
        attacks disrupting businesses worldwide. In recent years, malicious code and malware
        have become a path to profit.                                             experiences. It also requires attention
           Given its nature, the edge could still protect organisations and applications by   to parallel trends in technology around
        inserting services closer to the user. This meant bad actors were detected and neutralised   observability and using artificial
        before they could disrupt business or manage to breach a company’s defences.  intelligence and machine learning for
           However, more advanced challenges emerge during this ‘third wave’ of the internet   business, security and operational
        as new capabilities are injected into devices and applications. The number of devices and   automation.
        users constantly communicating over the network still poses a performance challenge   While broad characteristics, such
        despite the increasing bandwidth we can access. Attackers have grown even more   as described by F5 CTO Geng Lin in his
        malicious and are leveraging advanced technologies to exploit the pervasiveness of   Edge 2.0 manifesto, provide overarching
        applications and devices.                                                 guidance for an Edge 2.0 platform, design
                                                                                  considerations at the architectural level
        Platform centricity                                                       are also needed.
        The edge has not been designed to effectively support the distribution of apps and data;   Terms like ‘secure by default,’
        this is where the emergence of an edge application platform has become necessary, as   ‘deliver autonomy,’ and ‘provide native
        one does not simply throw together such a platform.                       observability’ are easily thrown about.
           Bolting on the ability to deploy computing on existing edge networks does not fully   But what do those mean regarding
        address the challenges posed by the ‘third wave’ of the internet. Furthermore, it does not   technology and approaches that must
        fully take advantage of how devices and endpoints can become more active participants   be considered? More importantly, how
        in solving these challenges.                                              should they be incorporated into an Edge
           After all, applications and devices are no longer passive receivers of information.   2.0 application platform?
        They can initiate connections themselves and influence the decision-making process.   The F5 paper ‘Edge 2.0 Core
        Therefore, a new approach that looks beyond the traditional viewpoint of the edge is   Principles’ examines this more closely.
        based on applications as passive receivers of information becomes critical. This will also   For the company, Edge 2.0 is defined by
        provide the impetus needed to realise the power of distributed computing as it has   a focus on experience centricity and a
        evolved over the past two decades.                                        platform that is not tied to the location
                                                                                  or even type of architecture. User
        More security-minded                                                      simplicity and being more application-
        This approach ensures the need for security, scale and speed of applications at the edge.   and operational-centric are crucial
        Critically, this must be done without negatively impacting the developer and operational   components of this new environment.


        SUBSCRIBE FREE                                                                      EngineerIT Issue 2 | 2023 | 13
   8   9   10   11   12   13   14   15   16   17   18