Understanding Edge Computing in a Cloud Computing World

Understanding Edge Computing in a Cloud Computing World

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 1h 48m | 238 MB

In recent years, computation and data storage has been moving out to the edge, meaning devices and servers are located closest to the source of the data. Edge computing has been essential in reducing latency in IoT devices, such as those in cars, planes, homes, and even on your wrist. However, there is much confusion around how edge computing is created, secured, and operated. In this course, David Linthicum takes the mystery out of the concept of edge computing, including how edge systems are designed, built, deployed, and maintained. David covers key facets of edge computing, from explaining the basic concepts and its uses, to the different components of an edge computing system, and details the state-of-the-art edge technology that can be employed today to build future-proof, edge-based computing systems and infrastructure.

Table of Contents

1 Leverage edge computing
2 Evolution of edge computing
3 What you should know
4 What is edge computing
5 Edge computing Use case 1
6 Edge computing Use case 2
7 Components of edge computing
8 Edge computing infrastructure
9 Edge computing Architecture basics
10 Edge computing Networking
11 Edge computing Storage
12 Edge computing Compute
13 Edge computing Management
14 Other edge computing requirements
15 Edge computing Security
16 Edge computing Governance
17 Edge configuration management
18 Edge data management
19 Edge computing Operations
20 Linking edge computing with cloud computing
21 Cloud-based edge computing services
22 Development and deployment of edge computing from the cloud
23 Demo Azure edge-based services
24 Demo AWS edge-based services
25 Building an edge computing solution
26 Edge computing Design
27 Edge computing Development
28 Edge computing Deployment
29 Edge operations planning
30 Next-generation edge computing
31 AI at the edge
32 Federated systems at the edge
33 Distributed security at the edge
34 Future edge-based applications
35 Staying current on edge computing

Homepage