Skip to content

4 Tips for Edge Computing Deployments

Edge computing deployments have unique constraints that are significantly different from the ones with which typical data center deployments contend. After all, by definition, edge deployments are away from normal support services, far from the sanitized data center, and deeply enmeshed in the real work of the organization where they must deliver high value without disrupting other business activities.

So, organizations pursuing edge deployments should step back and carefully consider all the different factors that must be weighed for edge computing and then look for a solution that addresses the most crucial. Let’s take a look at four of the most crucial.

Tip 1: Keep the Footprint Small

It might seem an obvious point, but many products sold as “edge” equipment are not actually designed for that purpose—they’re simply marketed for that role or, at best, minimally adapted for edge requirements.

Because some vendors just sell standard data center equipment for edge use without accounting for the less-than-perfect environment that may be encountered there, edge installations are acquiring a reputation for being unexpectedly troublesome.

That’s why it’s vital that edge equipment should be conceived from the start for that purpose, with sufficient ruggedness built in to handle the wider range of issues that are typical at the edge, whether that edge is the shop floor, a warehouse, or somewhere in a retail establishment.

Edge components and systems need to be thought of as “universal” products that can be deployed when and where needed, with few limitations, and made appropriately secure in any given environment.

Tip 2: Autonomous and Resilient

Edge computing is no place for daintiness: It’s where real work gets done, some of it dirty, messy, hot, and noisy. So, in addition to needing only a basic physical environment and simple power and connectivity, prudent adopters make sure the edge setup (hardware and software) is designed to be failure resistant, able to recover from many problems autonomously, to protect data, and to maintain operations in almost any circumstance.

What does that look like in practice? As much as possible, physical interventions onsite need to be avoided—no buttons that say “press here” to restart something. Instead, everything should be callable and able to respond when power is made available. Furthermore, autonomy should be part of the basics, delivering no-nonsense reboots and allowing most other maintenance tasks to be initiated remotely.

Tip 3: Easily Scalable and Expandable

Edge environments are dynamic, with new applications being deployed regularly and data volumes growing exponentially, creating new demands on edge infrastructure. It’s critical that this infrastructure is designed to accommodate that growth and expand and upgrade the edge micro-data center with new resources and applications as easily as the initial edge deployment.

Failure to plan for expansion of the edge environment can lead to expensive forklift upgrades or multiple independent islands of infrastructure to manage, with all the complexity and cost associated with that kind of choice.

Tip 4: Standardized and Simple To Manage

For all but the smallest of organizations, this is perhaps the most important consideration because edge may involve multiplying sites and types of equipment on the network.

If approached haphazardly, without a plan, edge can quickly spawn hard-to-manage complexity that can strain IT staff and have company-wide implications. To keep from becoming a nightmare, edge systems should take a standardized approach requiring little or no customization and minimal skills in installation.

To that end, edge should embrace infrastructure as code (IaC), which simplifies change control.

Repeatability means that service and support is standardized so staff doesn’t need to research each installation before responding to a problem; instead, use a consistent approach and methodology. It’s a model for efficiency used across every other domain, from manufacturing to medicine, but too often ignored in edge deployments.

Similarly, management must not require specialized IT staff on site; upgrades and infrastructure scaling must be non-disruptive; the foundation must be self-healing; and IT specialists must be able to manage the entire edge fleet seamlessly at scale.

Finally, look for zero-touch provisioning. This is a device-configuration process that can be operated automatically and eliminates most of the burden on IT administrators when setting up, maintaining, or upgrading an edge system.

If you’re interested in learning more about our Edge Computing solutions can transform your IT infrastructure, start your free trial today!

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Discover more from Version 2

Subscribe now to keep reading and get access to the full archive.

Continue reading

×

Hello!

Click one of our contacts below to chat on WhatsApp

×