Fri, 13 Oct 2023 11:52:00 -0000
|Read Time: 0 minutes
We are experiencing a fundamental design shift, driven by a perfect storm that is occurring at the edge. First, we are seeing massive amounts of data being created by data sources, from sensors, robotics, video, and other devices, most of which never existed until recently.
Second, a new generation of technology has matured which enables us to derive value from that data in near real time. Technologies such as AI and machine learning, paired with small form factor computing and low latency 5G networking, enable us to capture, curate, analyze, and act faster than ever before. Multicloud has also matured to the point where companies can leverage any cloud platform for monitoring, reporting, and model training.
Most importantly, unique challenges require a new approach to the edge. The diversity of hardware and environments makes testing, integrating, deploying, and managing hardware and associated software a critical design point. Edge application workloads are challenging because they must support diverse use cases like computer vision in manufacturing or inventory management in retail. Large-scale geo-distributed locations such as retail stores and distribution centers elevate business-level concerns surrounding security, support, and efficient distributed systems operations.
The edge, by its very nature, has unique challenges. Together, data and the technologies that capture it are defining a new set of challenges, implications, and constraints that are fundamentally different than those involved with core datacenter and cloud models.
Attempts to solve edge challenges with use-case-specific, bespoke solutions have resulted in technology silos that become operational nightmares as use cases and workloads increase over time.
These challenges are driving business and technology requirements towards a new approach—one that avoids these operational roadblocks.
At Dell, we’re changing how we approach these challenges by creating a new management and orchestration platform for the edge.
This new approach allows us to tackle these edge challenges and avoid the case-by-case solutions that result in technology silos that are difficult to scale and manage. We understand that edge infrastructure management is a large undertaking for any organization.
There is a need to reimagine edge management operations whereby enterprises can orchestrate the entire lifecycle management of applications, anywhere and anytime. They need to be empowered to scale their edge operations with consistency and security for any use case. They must be able to simplify their operations, optimize their edge investment, and secure their distributed edge estate easily.
Simply extending traditional IT and datacenter-centric practices to manage your edge estate does not work. We need a new approach to address the unique challenges at the edge.
We’ll get you started by breaking down these challenges and their solutions to help improve the application lifecycle management, and to elevate the efficiency of OT and IT teams and their collaborative productivity.
Dell NativeEdge is an edge operations software platform that helps businesses securely scale their edge management across their distributed edge estate. NativeEdge centralizes edge management across locations, automates operations, offers flexibility with its open design, enables zero-trust security, and provides multicloud connectivity. With NativeEdge, enterprises across various industries can securely power any edge application, anywhere, to achieve their specific business goals.
The platform also prioritizes partnerships and leverages a broad ecosystem of independent software vendors, system integrators, original equipment manufacturers (OEMs), and channel partners to deliver tailored solutions to customers through their preferred technology providers.
NativeEdge is designed to be cost-effective by offering subscription-based or software-as-a-service (SaaS) options.
The platform streamlines edge management across different industries, including but not limited to: retail, manufacturing, energy, digital cities, and healthcare. While it can be used to deploy and manage a small edge environment (a single edge site with just a few edge compute endpoints), it seamlessly scales up for deploying and operating more complex edge compute estates (multiple edge sites with many edge compute endpoints).
At the center of NativeEdge is the orchestrator, which supports edge operations such as application orchestration, fleet management, and life cycle management. Packaged as Helm charts, the NativeEdge Orchestrator can be deployed anywhere a dedicated Kubernetes cluster exists. For example, the Kubernetes cluster can be on-premise inside a VM or bare-metal server. Once the NativeEdge Orchestrator is deployed, customers can easily add NativeEdge-enabled Devices into the edge estate with secure device onboarding and zero-touch provisioning.
To learn more about how to simplify edge operations at scale, click here to see an interactive flip-book.
With the industry’s broadest portfolio of edge infrastructure hardware and our industry-leading secure supply chain, we can digitally sign and certify hardware in the factory. The chain starts at first power-on, which automates the deployment and configuration of the edge infrastructure that is managed by NativeEdge while ensuring a zero-trust chain of custody.
Users are able to eliminate operational complexity at scale with centralized management using blueprint-based deployment, zero-touch provisioning, automated onboarding operations of infrastructure, and applications from edge to multicloud.
This new paradigm eliminates supply chain risks and integration failures. It ensures that the entire solution is consistently installed properly and helps consolidate multiple applications and use cases into one architecture. Users can apply automated workflows simultaneously to thousands of devices across all locations.
To learn more about how to improve productivity and efficiency, click here to see an interactive flip-book.
Built on an open design, NativeEdge offers the flexibility to choose the independent software vendor (ISV) and cloud environment for edge application workloads. You can centrally and consistently deploy containerized and virtual applications using blueprints to work with your choice of IoT framework and OT vendor.
Make the most of your edge investments using an open design that works with software applications, IoT frameworks, multi-vendor operations technology solutions, and multicloud environments. Users can reduce proof-of-concept development time and deliver a consistent experience across multiple hardware form factors and price points.
To learn more about how to optimize your edge investment, click here to see an interactive flip-book.
All of these benefits mean absolutely nothing if they compromise an enterprise's security. The distributed nature of the edge and lack of technical staff make security and compliance the most business-critical pieces, determining the viability of any edge plan.
The platform is built from the ground up with zero-trust security principles. We alleviate security fears by delivering a platform that ensures the integrity of edge hardware from design to deployment, including within the supply chain, to protect applications and data through hardened blueprints and digitally signed package validation.
In many cases, local skilled resources are not available at the start of onboarding, which causes delays. NativeEdge only requires the skills needed to plug in and power on a device, and then automation takes care of everything else.
Zero trust is a security and network paradigm that seeks to prevent a violation of trust through users, applications, or devices.
To learn more about how to secure with zero trust, click here to see an interactive flip-book.
Our goal for NativeEdge is to help customers securely scale their edge operations and to support any use case or combination of use cases, by enabling them to simplify their operations, optimize their investment, and secure their entire edge estate.
This new approach simplifies operations through integrated automation processes to streamline edge deployment and operations at scale, without relying on IT expertise in the field. NativeEdge does so with centralized management, zero-touch deployment and onboarding, and automated operations.
Our strong history of industry technology partnerships at the edge has resulted in a strong edge ecosystem that can leverage the open, vendor-agnostic design of the platform, enabling customers to optimize their edge investment. We support existing and new edge use cases with an open design that works with users' choice of software applications, IoT frameworks, OT vendor solutions, and multicloud environments. We put the customers in the driver’s seat to control their edge, and to not get locked into closed or vertically integrated vendor ecosystems.
To learn more about NativeEdge features and benefits, click on the following links:
This blog is a part of a self-learning series. For more information on NativeEdge, go to:
Tue, 17 Oct 2023 13:43:00 -0000
|Read Time: 0 minutes
At the edge, there are security risks where devices are typically deployed in remote and less secure locations, making them vulnerable to physical tampering. Furthermore, when these devices are shipped throughout the supply chain, the device could be exposed to multiple different parties where there could be a malicious actor somewhere throughout the supply chain.
The distributed nature of the edge and lack of technical staff make security and compliance the most business-critical pieces, determining the viability of any edge plan.
Maintaining hardware and software complexity for various form factors, network connections, levels of ruggedization, and configurations is a significant challenge that must be addressed for large-scale edge deployments.
This highlights the importance of ensuring that edge devices are secure, user-friendly, and straightforward to deploy.
The NativeEdge platform is built from the ground up with zero-trust security principles. We alleviate the security fears by delivering a platform that ensures the integrity of edge hardware from design to deployment, and along the supply chain to protect applications and data through hardened blueprints and digitally signed package validation.
Our top priority is ensuring security from design to deployment and all along the supply chain to protect applications, data, and infrastructure across the edge estate using zero-trust security principles.
To address this need, Dell introduces NativeEdge secure device onboard (SDO), a solution that simplifies the deployment of NativeEdge-enabled Devices while ensuring robust security with zero-trust and zero-touch capabilities. Using NativeEdge, anyone can set up a NativeEdge-enabled Device by plugging in a network cable, powering on the device, and stepping away. Devices automatically onboard into the NativeEdge Orchestrator for zero-touch deployment across sites.
After SDO, the NativeEdge Orchestrator securely provisions the NativeEdge Operating Environment onto the NativeEdge-enabled Device. At this point, the device can accept deployment of applications from the NativeEdge Orchestrator.
Every shipment of NativeEdge-enabled Device from the Dell manufacturing plant is secure and locked down. This is accomplished by the following:
Secure operations, including the ability to deploy and secure workloads anywhere, and centrally monitor and report on technical and business-level changes, is another critical concern at the edge. Application orchestration solutions designed for edge deployments must be able to deploy these operations workloads to the cloud of their choice.
An important feature of NativeEgde security is the secured component verification (SCV). It ensures that the devices are delivered and ready for deployment exactly as they were built by Dell manufacturing, providing an extension to the Dell Secure Supply Chain assurance process. We leverage a trusted platform module (TPM) chip to secure the hardware with integrated cryptographic keys. TPM stores some security certificates and secrets to encrypt all the management communication. It ensures that, as an edge device is onboarded to NativeEdge, the connection is highly secure, and that edge device cannot be removed from the location and managed through any other means. It can only be managed through NativeEdge.
Additionally, securing with zero trust reinforces the security of applications, data, and infrastructure at every layer:
Finally, as part of zero trust, we need that tamper-proof edge hardware and software integrity. We need to make sure that something hasn't happened to that device, because at the edge, you may not have the same level of security controls that you have inside your core data center, or even inside a regional data center. These sites typically have fewer access controls than some of the other edge sites we just mentioned. By giving you consistent management and control and the ability to keep your edge infrastructure up to date, you can be assured that your edge state is not increasing the attack surface for your IT infrastructure and operations.
Zero-trust security principles are at the core of NativeEdge, ensuring the integrity of edge hardware, applications, and data through hardened blueprints and digitally signed package validation. While onboarding new devices or applications, the platform extends continuous security across all connected resources, providing you with peace of mind.
NativeEdge empowers you to leverage the enormous benefits of edge computing, while ensuring the integrity and safety of your systems and data.
Dell NativeEdge helps businesses secure the data pipeline from data sources to the edge applications running locally, in data centers, or on the cloud. It combines advanced security measures such as encryption, user access control, private app catalog, network segmentation, and security orchestration. The edge platform also uses telemetry and analytics to proactively assess the security posture of the edge estate without relying on experts with audit capabilities to visit every site.
Dell NativeEdge protects your edge estate with zero-trust security principles. The edge operations software platform enables secure zero-touch onboarding coupled with a hardened and secure edge operating system, which is fundamental to the fidelity of your edge estate. With Dell NativeEdge, you can rest assured that the devices, users, network, applications, and data are continually attested and validated across your expanding edge estate.
To learn more about how to secure with zero trust, click here to see an interactive flip-book.
To learn more about edge security essentials, click on the following links:
This blog is a part of a self-learning series. For more information on NativeEdge, go to:
Sun, 05 Nov 2023 12:54:00 -0000
|Read Time: 0 minutes
Edge devices offer businesses across industries the opportunity to elevate their operations in an unprecedented way. Each edge device that is added to operations comes with multiple management challenges.
The two main challenges businesses constantly need to address are:
If the purpose of these edge devices is to deliver data and improve efficiency, the platform that manages them should match these goals.
Additionally, the struggle to keep IT and OT functioning seamlessly is compounded by the need for edge devices to be deployed, monitored, and updated without creating bottlenecks or unnecessary repetitive tasks.
Managing these distributed systems, especially in locations that don’t have technical personnel, must be simple, scalable, and easily repeatable. Systems must be fundamentally zero-touch once plugged in and powered on.
Therefore, eliminating operational complexity at scale via a centralized management platform would require zero-touch deployment and onboarding, and automated operations of infrastructure and applications from edge to multicloud are essential.
Dell NativeEdge is the edge operations software platform that will help enterprises simplify their edge environments by automating edge operations and enforcing zero trust security.
This blog explores how automation with NativeEdge helps simplify the operational processes, allowing for OT and IT to streamline tasks and increase edge device efficiency.
Imagine these possibilities with automation:
Dell NativeEdge makes all these possible.
Through the automation of routine and repetitive tasks like onboarding devices, orchestrating application workloads, and managing them at scale, recent analysis suggests the NativeEdge platform can speed up application lifecycle management at the edge 22 times faster than current processes.1 This means a large-scale edge implementation that may take 100 or more hours to deploy could be completed in under five hours with Dell NativeEdge.
NativeEdge dramatically simplifies operations through deeply integrated automation processes to streamline edge deployment and operations at scale without relying on IT expertise in the field. NativeEdge does so with centralized management, zero-touch deployment and onboarding, and automated operations.
Automating the provisioning and deployment processes enables developers to request and access the necessary resources and environments without relying on manual intervention from IT operations. This self-service approach accelerates development cycles and reduces the time required to set up and configure new environments.
Creating tools and workflows that automate tasks like deployment, testing, and monitoring helps reduce human intervention and ensures consistent and error-free processes. This aligns closely with the principles of DevOps implementation, where development and operations teams collaborate closely to achieve faster and more reliable software or hardware delivery.
Through the Dell NativeEdge platform, automation simplifies edge operations by providing centralized control and management of distributed edge devices and infrastructure. This simplification leads to increased operational efficiency, reduced manual intervention, improved reliability, and better utilization of edge resources. These advantages are particularly crucial in edge computing scenarios, where resources are distributed across various remote locations and need to function reliably and with minimal human intervention.
Imagine you have edge devices on a fleet of boats. Without automation, if you wanted to update the application version, you would have to send a DevOps specialist to each boat, which would take ages and raise costs astronomically. Taking a step back, if you want to find out what is wrong with the edge device, how long will it take to figure it out and how long would it take to repair it so the device is up and running properly?
NativeEdge leverages IaC to automate application provisioning, deployment, and lifecycle management on NativeEdge-enabled Devices as well as on other infrastructure with virtualized or containerized environments.
To understand how we can leverage IaC, let’s make sure we understand some basic terminology:
Using blueprints is a powerful way to streamline infrastructure and application deployment, ensure consistency, and reduce the risk of errors in your software development and deployment process.
A common tool for creating and managing blueprints is IaC. An example on this could be using frameworks in Ansible for infrastructure provisioning, and configuration management tools like Puppet or Chef for application configuration.
Following our example above of updating an application on devices installed on a fleet of boats. You can leverage automation with Dell NativeEdge, and blueprints can facilitate the process. There are two routes to create blueprints:
Note: Components of a blueprint can often be reused in various contexts. For example, you can use the same blueprint to deploy similar microservices in different parts of your application.
Once you choose the blueprint you would like to use, it provides an option to deploy the updated application using the blueprint on all the devices running the old version across the entire fleet of boats with just a few clicks in NativeEdge. You don’t need to know how to create the VM receipt, or how to run a playbook, or how to install it. All you need to know is how to click install, and the rest is automated.
All these features in NativeEdge allow for a simplified operational process to update the edge device’s application on the fleet of boats in less time and with less technical expertise on hand. Similarly, we can apply these benefits to retail stores, manufacturing factories, or smart cities.
NativeEdge can manage your entire application lifecycle through automation tools. It helps deploy apps on any infrastructure, including public and private clouds. It is a reliable DevOps tool to speed up the building, deployment, and management of software, apps, and microservices without sacrificing operational efficiency or security.
1Estimated: Based on 2023 study of edge operations by GLG Research on behalf of Dell Technologies and estimates from test deployment of NativeEdge (Avg. of 100 responses from IT practitioners).
To learn more about NativeEdge Application Orchestration, click on the following link:
This blog is a part of a self-learning series. For more information on NativeEdge, go to:
Sun, 19 Nov 2023 14:53:00 -0000
|Read Time: 0 minutes
Edge has a unique set of challenges that require a new way of architecting to solve them. Edge computing is a distributed computing paradigm where data processing is performed closer to the data source or "edge" of the network, rather than relying solely on centralized cloud servers.
An open design fosters a culture of innovation and collaboration. It promotes flexibility and a more future-proof approach to edge computing. However, it's essential to carefully evaluate the specific requirements of the edge computing environment and choose the approach that best aligns with the organization's goals and constraints.
In this blog, we will help you understand how to get the most out of edge investments using an open design that works with software applications, IoT frameworks, multi-vendor operations technology solutions, and multicloud environments of your choice. This will allow you to consolidate technology silos and deliver consistent management experience across devices with connectivity out of the box.
When edge computing lacks an open design, it can face several challenges, including:
As a result, closed systems may limit the ability of developers and organizations to innovate and create customized edge computing solutions.
Multicloud by design, also known as a multi-cloud strategy or multi-cloud architecture, is an intentional approach to utilizing multiple cloud service providers for various aspects of an organization's computing needs. In this strategy, a company deliberately chooses to use two or more cloud platforms, such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) to meet specific business requirements.
While multicloud offers numerous benefits, it also introduces complexities in terms of management, orchestration, and security. Organizations need to plan their multi-cloud strategy carefully, including workload placement, data synchronization, network configurations, and security measures, to ensure a successful and efficient implementation. Specialized tools and services designed for managing multi-cloud environments can assist in these efforts.
Watch the following video on how to optimize your edge investment:
Built on an open design, Dell NativeEdge offers the flexibility to choose the ISV applications and cloud environments for your edge application workloads. You can centrally and consistently deploy containerized and virtual applications using blueprints to work with your choice of IoT frameworks and OT vendors. Like everything else from Dell, NativeEdge is multicloud by design, enabling you to deploy applications across and new or existing environment.
Here are a few advantages of using an open design system:
We are working with partners to co-engineer and develop solutions that include software, partner intellectual property, products, and services. Dell also has some of the biggest, longest-standing partnerships in the industry with companies like Microsoft, Intel, and VMware.
When market-leading companies team together to create and offer validated, proven reference architectures, then we can help you mitigate risk and accelerate your time to revenue.
As an example, with NativeEdge, the Dell Validated Design for Manufacturing Edge using Telit Cinterion can be implemented and brought to market quicker, allowing for faster and more secure deployment, lower costs, increased security, and more reliable and repetitive outcomes based on the blueprints implemented. This allows for:
By removing the complexity of deployment and adding the element of application-level lifecycle management, NativeEdge reduces the amount of physical touch required and creates a repeatable deployment process at scale.
Dell Technologies will continue to foster partnerships to develop open software that enables interoperability and ease of operations while avoiding being locked into expensive, proprietary technologies that limit your ability to innovate and create. For more information, visit our Edge Ecosystem.
Watch the following video: Power management company optimizes edge investments for success
Make the most of edge investments by using an open design that works with software applications, IoT frameworks, multi-vendor operations technology solutions, and multicloud environments. This enables you to deploy applications across new or existing environments. NativeEdge will support each edge use case with an open design that works with your choice of software applications, IoT frameworks, OT vendor solutions, and multicloud environments.
Dell Technologies is going to enable its existing strong edge ecosystem of partners to leverage the open, vendor-agnostic design, allowing customers to optimize their edge investment. This way, we can put the customer in the driver’s seat to control their edge.
To learn more about how to simplify edge operations at scale, click here to see an interactive flip-book.
To learn more about NativeEdge Application Orchestration, click on the following links:
This blog is a part of a self-learning series. For more information on NativeEdge, go to:
Thu, 02 May 2024 09:38:01 -0000
|Read Time: 0 minutes
Over the past year, I have been actively involved in generative artificial intelligence (Gen AI) projects aimed at assisting developers in generating high-quality code. Our team has also adopted Copilot as part of our development environment. These tools offer a wide range of capabilities that can significantly reduce development time. From automatically generating commit comments and code descriptions to suggesting the next logical code block, they have become indispensable in our workflow.
According to a recent study by McKinsey, quantify the level of productivity gain in the following areas:
Figure 1. Software engineering: speeding developer work as a coding assistant (McKinsey)
This study shows that “The direct impact of AI on the productivity of software engineering could range from 20 to 45 percent of current annual spending on the function. This value would arise primarily from reducing time spent on certain activities, such as generating initial code drafts, code correction and refactoring, root-cause analysis, and generating new system designs. By accelerating the coding process, Generative AI could push the skill sets and capabilities needed in software engineering toward code and architecture design. One study found that software developers using Microsoft’s GitHub Copilot completed tasks 56 percent faster than those not using the tool. An internal McKinsey empirical study of software engineering teams found those who were trained to use generative AI tools rapidly reduced the time needed to generate and refactor code and engineers also reported a better work experience, citing improvements in happiness, flow, and fulfilment.”
The remarkable progress of AI-based code generation owes its success to the unique characteristics of programming languages. Unlike natural language text, code adheres to a structured syntax with well-defined rules. This structure enables AI models to excel in analyzing and generating code.
Several factors contribute to the swift evolution of AI-driven code generation:
The Cognition & Development Lab at Washington University in St. Louis investigates how infants and young children think, reason, and learn about the world around them. Their research focuses on the development of early social-cognitive capacities. They are the makers of Devin, the world’s first AI software engineer.
Devin possesses remarkable capabilities in software development in the following areas:
The Devin project is a clear indication of how fast we move from simple coding assistants to more complete engineering capabilities.
When I asked this question recently during a Copilot training session that our team took, the answer was “No”, or to be more precise “Not yet”. The common thinking is that it provides a productivity enhancement tool that will save developers from spending time on tedious tasks such as documentation, testing, and so on. This could have been true yesterday, but as seen with project Devin, it already goes beyond simple assistance to full development engineering. We can rely on the experience from past transformations to learn a bit more about where this is all heading.
The advent of cloud computing, pioneered by AWS approximately 15 years ago, revolutionized the entire IT landscape. It introduced the concept of fully automated, API-driven data centers, significantly reducing the need for traditional system administrators and IT operations personnel. However, beyond the mere shrinking of the IT job market, the following parallel events unfolded:
While traditional IT jobs declined, the transformation also yielded positive outcomes:
Figure 2. Cloud transformation’s impact on IT budget allocation
As we transition to the era of AI, we can anticipate similar trends:
Organizations will allocate more resources to AI initiatives. The transition to AI is not merely an evolutionary step; it is a strategic imperative.
According to a research conducted by ISG on behalf of Glean, Generative AI projects consumed an average of 1.5 percent of IT budgets in 2023. These budgets are expected to rise to 2.7 percent in 2024 and further increase to 4.3 percent in 2025. Organizations recognize the potential of AI to enhance operational efficiency and bridge IT talent gaps. Gartner predicts that Generative AI impacts will be more pronounced in 2025. Despite this, worldwide IT spending is projected to grow by 8 percent in 2024. Organizations continue to invest in AI and automation to drive efficiency. The White House budget proposes allocating $75 billion for IT spending at civilian agencies in 2025. This substantial investment aims to deliver simple, seamless, and secure government services through technology.
The impact of AI extends far beyond the confines of the IT job market. It permeates nearly every facet of our professional landscape. As with any significant transformation, AI presents both risks and opportunities. Those who swiftly embrace it are more likely to seize the advantages.
So, what steps can software developers take to capitalize on this opportunity?
In the immediate term, developers can enhance their effectiveness when working with AI assistants by acquiring a combination of the following technical skills:
More skilled developers will need to learn how to create their own “AI engineers” which they will train and fine tune to assist them with user interface (UI), backend, and testing development tasks. They could even run a team of “AI engineers” to write an entire project.
Not necessarily. In the case of cloud transformation, developers with AI expertise will likely be in high demand. Those who will not be able to adapt to this new world are likely to stay behind and face the risk of losing their job.
It would be fair to assume that the scope of work, post-AI transformation, will grow and will not stay stagnant. As an example, we will likely see products adding more “self-driving” capabilities, where they could run more complete tasks without the need for human feedback or enable close to human interaction with the product.
Under this assumption, the scope of new AI projects and products is going to grow, and that growth should balance the declining demand for traditional software engineering jobs.
As a history enthusiast, I often find parallels in the past that can serve as a guide to our future. The industrial era witnessed disruptive technological advancements that reshaped job markets. Some professions became obsolete, while new ones emerged. As a society, we adapted quickly, discovering new growth avenues. However, the emergence of AI presents unique challenges. Unlike previous disruptions, AI simultaneously impacts a wide range of job markets and progresses at an unparalleled pace. The implications are indeed profound.
Recent research by Nexford University on How Will Artificial Intelligence Affect Jobs 2024-2030 reveals some startling predictions. According to a report by the investment bank Goldman Sachs, AI could potentially replace the equivalent of 300 million full-time jobs. It could automate a quarter of the work tasks in the US and Europe, leading to new job creation and a productivity surge. The report also suggests that AI could increase the total annual value of goods and services produced globally by 7 percent. It predicts that two-thirds of jobs in the US and Europe are susceptible to some degree of AI automation, and around a quarter of all jobs could be entirely performed by AI.
The concerns raised by Yuval Noa Harari, a historian and professor at the Department of History of the Hebrew University of Jerusalem, resonate with many. The rapid evolution of AI may indeed lead to significant unemployment.
However, when it comes to software engineers, we can assert with confidence that regardless of how automated our processes become, there will always be a fundamental need for human expertise. These skilled professionals perform critical tasks such as maintenance, updates, improvements, error corrections, and the setup of complex software and hardware systems. These systems often require coordination among multiple specialists for optimal functionality.
In addition to these responsibilities, computer system analysts play a pivotal role. They review system capabilities, manage workflows, schedule improvements, and drive automation. This profession has seen a surge in demand in recent years and is likely to remain in high demand.
In conclusion, AI represents both risk and opportunity. While it automates routine tasks, it also paves the way for innovation. Our response will ultimately determine its impact.
Wed, 27 Mar 2024 18:13:00 -0000
|Read Time: 0 minutes
In today's digital landscape, the expansion of edge computing has transformed how data is processed and managed. However, with this evolution comes the challenge of managing and maintaining numerous edge deployments efficiently. DevEdgeOps is a shift-left approach that moves operational tasks to an earlier stage. This approach facilitates collaboration between IT and OT streamlining edge operations. By integrating AI-assisted techniques into DevEdgeOps practices, organizations can unlock stacks of benefits, ranging from increased productivity to improved operational efficiency.
“The automation process using infrastructure as code (IaC) is complex, especially when it comes to highly distributed edge environments. It must be balanced with the requirements of edge operating environments which are different than IT. Gen AI and Copilot-based edge automation development tools can reduce the development process of that automation code and help to meet the requirements of edge operations workloads.” says Nati Shalom, Fellow at Dell NativeEdge, introducing the topic in his blog Edge-AI trends in 2024.
In a recent study by McKinsey, it indicates a potential improvement of up to 56 percent in productivity. DevEdgeOps advocates for reducing that complexity using a shift-left approach where production issues can be identified earlier during the development phase.
Figure 1. The benefits of using Gen AI as a coding assistant (Copilot) (Source: McKinsey)
One of the primary advantages of leveraging AI in DevEdgeOps is the ability to automate and optimize complex tasks associated with edge operations. Traditional methods of managing edge environments often involve manual interventions, which are time consuming and error prone. AI-powered automation tools can streamline these processes by intelligently analyzing data patterns, predicting potential issues, and automating corrective actions. This reduces the burden on IT teams, minimizes the risk of downtime, and improves system reliability.
A case in point was the recent winner of the Dell Hackathon, Rachel Shalom, from the NativeEdge team. In her article DevOps Made Easy with Gen AI, she explores the integration of Gen AI into DevOps practices, simplifying and optimizing the development process. By leveraging Gen AI's capabilities, developers can automate tasks such as code generation, testing, and deployment, reducing time-to-market and enhancing efficiency. Through Rachel’s real-world example, she illustrates how Gen AI streamlines DevOps workflows, empowers teams to focus on innovation, and fosters collaboration between development and operations teams.
Regarding data and modeling insights, Rachel writes “You might be wondering, why not use Copilot or a commercial GPT for queries right off the bat? We gave that a shot, but it fell short of our specific need to generate configuration files. This was mainly because our proprietary internal data was not familiar to the model, leading us to the necessity of fine-tuning with a private GPT-3.5.”
AI-assisted DevEdgeOps enables organizations to adopt a proactive approach to edge management. By leveraging predictive analytics and machine learning algorithms, businesses can anticipate and prevent potential issues before they escalate into critical failures. This proactive approach enhances system resilience and enables organizations to allocate resources more effectively, which optimizes operational costs.
AI-driven DevEdgeOps facilitates rapid development and deployment of edge applications. Traditional development processes often struggle to keep pace with the dynamic nature of edge computing, resulting in delays and inefficiencies. By harnessing Gen AI capabilities such as Copilot-based development tools, organizations can accelerate the development life cycle, reduce time-to-market, and stay ahead of the competition. This enhances agility and allows businesses to capitalize on emerging opportunities more effectively.
In addition to operational benefits, AI-assisted DevEdgeOps can also drive significant cost savings for organizations. The McKinsey study referenced earlier highlights the potential for a 56 percent improvement in productivity through the adoption of AI-driven automation. By automating repetitive tasks, optimizing resource utilization, and minimizing downtime, businesses can achieve substantial cost reductions while maximizing the return on investment (ROI) of their edge investments.
Furthermore, AI-assisted DevEdgeOps fosters innovation by empowering organizations to focus on value-added activities rather than repetitive mundane operational tasks. By automating routine maintenance, troubleshooting, and provisioning activities, IT teams can devote more time and resources to innovation-driven initiatives that drive business growth and competitive advantage. This enhances organizational agility and fosters a culture of continuous improvement and innovation.
The benefits of automating edge operations with AI-assisted DevEdgeOps are undeniable. By leveraging AI capabilities to streamline processes, enhance proactive management, accelerate development, and drive cost savings, organizations can unlock the full potential of their edge deployments. As the digital landscape continues to evolve, embracing AI-driven automation in DevEdgeOps will be essential for organizations looking to stay competitive, agile, and resilient in the face of the ever-changing demands.
Thu, 22 Feb 2024 09:47:46 -0000
|Read Time: 0 minutes
Many blogs cover the Agile process itself; however, this blog is not one of them. Instead, I want to share the lessons learned from working in a highly distributed development team across eleven countries. Our teams ranged from small startups post-acquisition to multiple teams from Dell, and we had an ambitious goal to deliver a complex product in one year! This journey started when Dell’s Project Frontier leaped to the next stage of development and became NativeEdge.
This blog focuses on how Agile transformation enables us to transform into a one-team culture. The journey is ongoing as we get closer to declaring success. The Agile transformation process is a constant iterative process of learning and optimizing along the way, of failing and recovering fast, and above all, of committed leadership and teamwork.
Having said that, I thought that we reached an important milestone, at one year, in this journey that makes it worthwhile sharing.
Agile methodologies were originally developed in the manufacturing industry with the introduction of Lean methodology by Toyota. Lean is a customer-centric methodology that focuses on delivering value to the customer by optimizing the flow of work and minimizing waste. The evolution of these principles into the software industry is known as Agile development, which focuses on rapid delivery of high-quality software. Scrum is a part of the Agile process framework and is used to rapidly adjust to changes and produce products that meet organizational needs.
The fact that a software product doesn’t look like a physical device doesn’t make the production and delivery process as different as many tend to think. The increasing prevalence of embedded software in physical products further blurs the line between these two worlds.
Software product delivery follows similar principles to the Lean manufacturing process of any physical product, as shown in the following table:
Lean manufacturing | Agile software development |
Supply chain | Features backlog |
Manufacturing pipeline | CI/CD pipeline |
Stations | Pods, cells, squads, domains |
Assembly line | Build process |
Goods | Product release |
Agile addresses the need of organizations to react quickly to market demands and transform into a digital organization. It encompasses two main principles:
Many detailed analyses show why Agile transformation fails. However, I would like to suggest a simpler explanation. Despite the similarities between manufacturing and software delivery, as outlined in the previous section, many software companies don’t operate with a manufacturing mindset.
Software companies that operate with a manufacturing mindset are companies where their leadership measures their development efficiency just as they measure other business KPIs, such as sales growth. They understand that their development efficiency directly impacts their business productivity. This is obvious in manufacturing, but for some reason, it has become less obvious in software. When you measure your development efficiency at the top leadership level and even board level, all the rest of the agile transformation issues that are reported in the failure analysis, such as resistance to change, become just symptoms of that root cause. It is, therefore, no surprise that companies like Spotify have been successful in this regard. Spotify has even published a lot of its learning and use cases, as well as open-source projects such as Backstage, which helped them differentiate themselves from other media streaming companies, just as Toyota did when they introduced Lean.
Changing a culture is the biggest challenge in any Agile transformation project. As many researchers have noted, Agile transformation requires a big cultural transformation including team structure. Therefore, it is no surprise that this came up as the biggest challenge in the Doing vs being: Practical lessons on building an agile culture article by McKinsey & Company.
Figure 1. Exhibit 1 from McKinsey & Company article: Doing vs being: Practical lessons on building an Agile culture
Our challenge was probably at the top of the scale in that regard, as our team was built out of a combination of people from all around the world. Our challenge was to create a one-team agile culture that would enable us to deliver a new and complex product in one year.
Getting to this one-team culture is tough, because it works in many ways against human nature, which is often competitive.
One thing that helped us go through this process was the fact that we all felt frustration and pain when things didn’t work. We also had a lot to lose if we failed. At this point, we realized that our only way out of this would be to adopt Agile processes and team structures. The pain that we all felt was a great source of motivation that drove everyone to get out of their comfort zone and be much more open to adopting the changes that were needed to follow a truly Agile culture.
This wasn’t a linear process by any means and involved many iterations and frustrating moments until it became what it is today. For the sake of this blog, I will spare you from that part and focus on the key lessons that we took to implement our specific Agile transformation journey.
There are many lessons and processes that were already defined on how to implement Agile methodologies. Many of the lessons were built on the success of other companies. So, as a lesson learned, it’s always better to build on a mature baseline and use it as a basis for customization rather than trying to come up with your own method. In our case, we chose to use the Scrum@Scale as our base methodology.
As one can expect, out-of-the-box methodologies don’t consider your specific organizational reality and challenges. It is therefore very common to customize generic processes to fit your own needs. We chose to write our own guidebook, which summarizes our version of the agile roles and processes. I found that the process of writing our ‘Agile guidebook’ was more important than the book itself. It created a common vocabulary, cleared out differences, and enabled team collaboration, which later led to a stronger buy-in from the entire team.
Defining Agile processes can sometimes feel like an academic exercise. To ensure that we weren’t falling into this trap, we took specific use cases from our daily routine and tested them against the process that we had just defined. We measured how much those processes got clearer or better than the existing ones, and only if we all felt that we had reached a consensus did we make it official.
This task is easier said than done. It represents the most challenging aspect, as it necessitates restructuring teams to align with the skills required in each domain. Additionally, we had to ensure that each domain maintained the appropriate capacity, in line with business priorities. Flexibility was crucial, allowing us to adapt teams as priorities shifted.
In this context, it was essential that those involved in defining this structure remained unbiased and earned the trust of the entire team when proposing such changes. As part of our Agile process, we also employed simulations to validate the model’s effectiveness. By minimizing dependencies between teams for each feature development, we transformed the team structure. Initially, features required significant coordination and dependency across teams. However, we evolved to a point where features could be broken down without inter-team dependencies, as illustrated in the following figure:
Figure 2. Organizing teams into self-organizing domains teams. Breaking large features into smaller increments (2-4 sprints each) likely fits better into the domain structure than large features
Agile processes require an agile development environment. One of the constant challenges that I’ve experienced in this regard is that many organizations fail to put the right investment and leadership attention into this area. If that is the case, you wouldn’t gain the speed and agility that you were hoping to get through the entire Agile transformation. In manufacturing terms, that's like investing in robots to automate the manufacturing pipeline but leaving humans to pass the work between them. A number of these humans could never keep up with the rest of the supply chain. This actually gets worse as the supply (feature development) gets faster. Your development speed is largely determined by how far your development processes are automated. To get to that level of automation, you need to constantly invest in the development platform. The challenge is that in most cases, the ratio between developers and DevOps can sometimes be 20:1, and that turns DevOps quickly into the next bottleneck. Platform engineering can be a solution. In a nutshell, in the shift-left model much of the ongoing responsibility for handling the feature development and testing automation to the development team and puts the main effort of the "DevOps" team to focus mostly on delivering and evolving a self-service development platform that enables the developers to do this work without having to become a DevOps expert themselves.
Teams can easily get distracted by daily pressures, causing focus to drift. Keeping discipline on those Agile processes is where a lot of teams fail, as they tend to take shortcuts when the delivery pressure grows. KPIs allow us to keep track of things and ensure that we’re not drifting over time, keeping our ‘eye on the ball’ even when such a distraction happens. There are many KPIs that can measure team effectiveness. The key is to pick the three that are the most important at each stage, such as stability of the release, peer review time, average time to resolve a failure, and test coverage percentage.
As leaders, we often tend to be impatient and opinionated towards the ‘elephant memory’ of our colleagues. Trying to let the team figure out this sort of transformation all by themselves is a clear recipe for failure. Failure in such a process can make things much worse. On the other hand, having a highly experienced coach with good knowledge of the organization and with the right preparation was a vital facilitator in our case. We needed two iterations to come closer together. The first one was used mostly to get the ‘steam out’, which allowed us to work more effectively on all the rest of these points during the second iteration.
As I close my first year at Dell Technologies and reflect on all the things that I’ve learned, especially for someone who’s been in startups all of his career, I never expected that we could accomplish this level of transformation in less than a year. I hope that the lessons from this journey are useful and hopefully save some of the pain that we had to go through to get there. Obviously, none of this could have been accomplished without the openness and inclusive culture of the entire team in general and leadership specifically within Dell’s NativeEdge team. Thank you!
Mon, 12 Feb 2024 11:43:11 -0000
|Read Time: 0 minutes
Edge AI plays a significant role in the digital transformation of retail warehouses and stores, offering benefits in terms of efficiency, responsiveness, and enhanced customer experience in the following areas:
The scale and complexity of Edge-AI transformation in retail are influenced by factors such as the number of edge devices, data volume, AI model complexity, real-time processing requirements, integration challenges, security considerations, scalability, and maintenance needs.
A mid-size retail organization is composed of tens of warehouses and hundreds of stores spread across different locations. In addition to that, it needs to support dozens of external suppliers that also need to become an integral part of the supply chain system. To enable Edge-AI retail, it will need to introduce many new sensors, devices, and systems that will enable it to automate a large part of its daily operation. This will result in hundreds of thousands of devices across the stores and warehouses.
Figure 1. The Edge-AI device scale challenge
The scale of the transformation depends on the number of edge devices deployed in retail environments. These devices could include smart cameras, sensors, RFID readers, and other internet of things (IoT) devices. The ability to scale the Edge-Ai solution as the retail operation grows is an essential factor. Scalability considerations involve not only the number of devices but also the adaptability of the overall architecture to accommodate increased data volume and computational requirements.
Each device comes with its proprietary stack, making the overall management and maintenance of such a diverse and highly fragmented environment extremely challenging. To address that, Edge-Ai transformation also includes the transformation to a more common cloud-native and cloud-based infrastructure. This level of modernization is quite massive and costly and cannot happen in one go.
Figure 2. Cloud native and cloud transformation break the device management silos challenges
This brings the need to handle the integration with existing systems (brownfield) to enable smoother transformation. This often involves integration with existing retail systems, such as point-of-sale systems, inventory management software, and customer relationship management tools.
Dell NativeEdge serves as a generic platform for deploying and managing edge devices and applications at the edge of the network. One notable addition in the latest version of NativeEdge is the ability to deliver an end-to-end solution on top of the platform that includes PTC, Litmus, Telit, Centerity, and so on. This capability allows users to get a consistent and simple management from Bare-Metal provisioning to a fully automated full-blown solution.
Figure 3. Using NativeEdge and Centerity as part of the open edge solution stack
In this blog, we demonstrate the benefits behind the integration of NativeEdge and Centerity that simplify the retail Edge-AI transformation challenges.
Centerity CSM² is a purpose-built monitoring, auto-remediation, and asset management platform for enterprise retailers that provides proactive wall-to-wall observability of the in-store technology stack. The key part in the Centrity architecture is the Centerity Manager is responsible for collecting all the data from the edge devices into a common dashboard.
Figure 4. Centerity retail management and monitoring
The following are the architecture choices made to address the Edge-AI transformation challenges with Dell NativeEdge as the edge platform and Centerity as the asset management and monitoring for both the retail warehouse and store. In this case, we have two sites, one representing a warehouse where we connect to the customer’s existing environment running on VMware infrastructure, and a retail store running in a different location.
Note: The Centrify Proxy (customer site-1 in the following figure) is used to aggregate multiple remote devices through a single network connection.
Figure 5. Using NativeEdge and Centerity to fully automate and manage and retail warehouse and store
Since the store is often limited by infrastructure capacity, we will use a gateway to aggregate the data from all the devices. For this purpose, we will use a NativeEdge Endpoint as a gateway and install the Centerity monitoring agent on it. The monitoring agent will act as a proxy that on one hand connects to the individual devices in the store and, on the other hand, sends this information back to the Centerity Manager to aggregate all this information into one control plane. In this case, the warehouse runs on a private cloud based on VMware and represents a central data center. Since we have more capacity on this environment, we will collect the data directly from the device to the manager without the need for a proxy agent. The architecture is also set to enable future expansion to public clouds such as AWS and GCP.
Secure device onboarding—In this step, we will onboard three different edge compute classes (PowerEdge, OptiPlex, and Gateway) to represent a warehouse facility with diverse set of devices. NativeEdge will treat each of these devices as a separate ECE instance and, thus, provide a consistent management layer to all the devices, regardless of their compute class.
Figure 6. Zero-touch provisioning of edge infrastructure from BareMetal to cloud
This phase is broken down into two parts; The first is provisioning the Centerity Manager which is the main component and then provision the edge proxy on the target store and warehouse.
To do that:
To install Centerity Edge proxy collector on each warehouse:
The following blueprint automates the deployment of the Centerity agent on a NativeEdge Endpoint. It launches a virtual machine (VM) on the remote device which is configured to connect to the Centerity Manager. It also optimizes the VM to support AI workload by enabling GPU passthrough.
Figure 7. Create an AI optimized VM on the target device
NativeEdge can execute the above blueprint simultaneously on all the devices. The following figure shows the result of executing this blueprint on three devices.
Figure 8. Deploy the Edge Proxy on all the stores in one bulk
In this step, we will configure and set up the devices and connect them to the Centerity monitoring service. Note that this step is done directly on the centerity management console and not through NativeEdge console.
In this case, we chose the following endpoints within the logistic center or warehouse.
Figure 9. Centerity Management connected to the edge device managed by NativeEdge
In this step, we will manage the retail warehouse and store through the monitoring of the devices that we connected to the system in the previous step. This will include the following set of operations:
Figure 10. Monitoring and managing retail devices
Dell NativeEdge provides a fully-automated secure device onboarding from Bare Metal to the cloud. As a DevEdgeOps platform, NativeEdge also provides the ability to validate and continuously manage the provisioning and configuration of those devices in a secure way. This minimizes the risk of failure and security breaches due to misconfiguration or human errorThose potential vulnerabilities can be detected earlier in the pre-deployment development process. The introduction of NativeEdge Orchestrator enables customers to have a consistent and simple management of built-in solutions across their entire fleet of new and existing devices. The separation between the device management and solution is key to enabling consistent operational management between different solution vendors as well as cloud infrastructure. In addition to that, the ability to integrate with the retail existing infrastructure (VMware in this specific example) as well as cloud-native infrastructure simultaneously ensures smoother transformation to a modern Edge-AI-enabled infrastructure.
The specific integration between NativeEdge and Centerity in this specific use case enables customers to deliver a full-blown retail management which integrates with both their legacy and new AI enabled devices. According to recent studies, this level of end-to-end monitoring and automation can reduce the maintenance overhead and potential downtime by 57 percent.
Figure 11. Moving to a fully automated and monitored retail warehouse and store brings a significant TCO saving
It is also worth noting that the open solution framework provided by NativeEdge allows partners such as Centerity to use Dell NativeEdge as a generic edge infrastructure framework, addressing fundamental aspects of device fleet management. Vendors can then focus on delivering the unique value of their solution, be it predictive maintenance or real-time monitoring, as demonstrated by the Centerity use case in this blog.
Tue, 06 Feb 2024 10:17:30 -0000
|Read Time: 0 minutes
In the era of rapid technological advancements, artificial intelligence (AI) has made its way from research labs to real-world applications. Edge inferencing, in particular, has emerged as a game-changing technology, enabling AI models to make real-time decisions at the edge. To harness the full potential of edge inferencing, streaming technology plays a pivotal role, facilitating the seamless flow of data and predictions. In this blog, we will explore the significance of streaming for edge inferencing and how it empowers real-time AI applications.
Streaming technology is a core component of edge inferencing, as it allows for the continuous and real-time transfer of data between devices and edge servers. Streaming can take various forms, such as video streaming, sensor data streaming, and audio streaming, or depending on the specific application's requirements. This real-time data flow enables AI models to make predictions and decisions on the fly, enhancing the overall user experience and system efficiency.
Streaming for edge inferencing is already transforming various industries. Here are some examples:
The Dell Streaming Data Platform (SDP) is a comprehensive solution for ingesting, storing, and analyzing continuously streaming data in real-time. It provides one single platform to consolidate real-time, batch, and historical analytics for improved storage and operational efficiency.
The following figure shows a high-level overview of the Streaming Data Platform architecture streaming data from the edge to the core.
Figure 1. SDP high-level architecture
The key advantage of SDP, in the context of edge, is the low footprint and the ability to deal with long-term data storage. Because the platform is built on Kubernetes, storing all that data is a matter of adding nodes. Now that you have all that data, using it becomes a practice in innovation. By autotiering storage upon ingestion, SDP allows for unlimited historical data retrieval for analysis alongside real-time streaming data. This enables endless business insights at your fingertips, far into the future.
One key advantage of SDP at edge deployment is its capability of supporting real-time inferencing for edge AI/ML applications as live data is ingested into SDP. Data insights can be obtained without delay while such data is also persistently stored using SDP’s innovative tiered-storage design that provides long-term storage and data protection.
For computer vision use cases, SDP provides plugins for the popular open-source multimedia processing framework GStreamer that enables easy integration with GStreamer video analytics pipelines. See the GStreamer and GStreamer Plugins.
Figure 2. Edge Inferencing with SDP
Figure 3. Using SDP for visual embedding of computer vision
SDP was also optimized to process video streaming data and process it at the edge by adding frame detection. Saving video frames combined with an integrated vector database enables to handle video processing at the edge.
SDP is optimized for deep learning by providing semantic embedding of ingested data, especially for unstructured data such as images and videos. As unstructured data is ingested into SDP, they are processed by an embedding pipeline that leverages pretrained models to extract semantic embeddings from raw data and persist such embeddings in a vector database. Such semantic embedding of raw data enables advanced data management capabilities as well as support for GenAI type of applications. For example, these embeddings can provide domain-specific context for GenAI type of query using Retrieval Augmented Generation (RAG).
As AI/ML applications are becoming more widely adopted at the edge, SDP is ideally suited to support these applications by enabling real-time inference at the edge. Compared to traditional edge AI applications where data is transported to the cloud or core for inferencing, SDP can provide real-time inference right at the edge when live data is ingested so that inference latency can be greatly reduced.
In addition, SDP embraces rapidly emerging deep learning and GenAI applications by providing advanced data semantic embedding extraction and embedding vector storage, especially for unstructured multimedia data such as audio, image, and video data.
Figure 4. Unstructured data embedding vector generation
SDP is designed with an innovative tiered-storage architecture. Tier-1 provides high performance local storage while tier-2 provides long-term storage. Specifically, tier-1 data storage is provided by replicated Apache Bookkeeper backed by a local storage to guarantee data durability once data is ingested into SDP. Asynchronously, data is flushed into tier-2 long-term storage such as Dell’s PowerScale to provide unlimited data storage and data protection. Alternatively, on NativeEdge, replicated Longhorn storage can also be used as long-term storage for SDP. With long term data storage, analytics applications can consume unbounded data to gain insights over a long period of time.
The following figure illustrates the long-term storage architecture in SDP.
Figure 5. SDP long-term storage
SDP is fully cloud-native in its design with distributed architecture and autoscaling. SDP can be readily deployed on any Kubernetes environment in the cloud or on-premises. On NativeEdge, SDP is deployed on a K3s cluster by the NativeEdge Orchestrator. In addition, SDP can be easily scaled up and down as the data ingestion rate and application workload vary. This makes SDP flexible and elastic in different NativeEdge deployment scenarios. For example, SDP can leverage Kubernetes and autoscale its stream segment stores to adapt to changing data ingestion rates.
Dell NativeEdge is an edge operations software platform that helps customers securely scale their edge operations to power any use case. It streamlines edge operations at scale through centralized management, secure device onboarding, zero-touch deployment, and automated management of infrastructure and applications. With automation, open design, zero-trust security principles, and multicloud connectivity, NativeEdge empowers businesses to attain their wanted outcomes at the edge.
Dell NativeEdge provides several features that make it ideal for deploying SDP on the edge, including:
In a previous blog, we provided insight into how we can turn our Edge devices into a Kubernetes cluster using NativeEdge Orchestrator. This step creates the foundation that allows us to deploy any edge service through a standard Kubernetes Helm package.
Figure 6. Deploying SDP solution on NativeEdge-enabled Kubernetes
SDP is built as a cloud native service. The deployment of SDP includes a set of microservices as well as Ansible playbooks to automate the configuration management of those services.
The main blueprint that deploys the SDP app is shown in the following figure. It is a TOSCA node definition of an Application Module type, and it invokes an Ansible playbook to configure and start the deployment process.
Figure 7. Deploying SDP App
For the deployment, SDP is one of the available services we can choose from the NativeEdge Catalog under the Solutions tab. In the following figure, an HA SDP service is deployed on top of a Kubernetes cluster.
Figure 8. Select the SDP service from the NativeEdge Catalog
In the following figure, as part of the deployment process, we can provide input parameters. In this case, we provide configuration parameters that can vary from one edge location to another. We use the same blueprint definition with different deployment parameters to adjust various edge requirements, like different location requirements, different configurations, and so on.
Figure 9. Deploy the SDP blueprint and enter the inputs
SDP service is deployed as can be seen in the following figure.
Figure 10. Create an SDP instance by performing the install workflow
Streaming services is a critical part of any edge inferencing solution and comes with the following benefits:
NativeEdge comes with built-in support for SDP which comes with an edge-optimized streaming solution geared specifically to fit edge use cases such as video inferencing.
NativeEdge is a great choice for edge AI-enabled streaming because:
SDP lifecycle management is fully automated on NativeEdge Orchestrator. SDP is available as Solutions in the NativeEdge Catalog. To deploy an instance of SDP on NativeEdge, a customer simply selects SDP from the NativeEdge Catalog under the Solutions tab and triggers the SDP deployment. The SDP blueprint deploys an SDP cluster on NativeEdge Endpoints. Once SDP is deployed, its ongoing day two operations are also managed by NativeEdge Orchestrator, providing a seamless experience for customers.
NativeEdge also comes with a fully optimized stack for handling AI workload through the support integrated accelerators through GPU pass through, SRIOV, and so on.
NativeEdge provides an open platform that easily plugs into your custom streaming platform through the support of Kubernetes and Blueprints, which is an integrated part of NativeEdge Orchestrator.
For more information, see the following:
Tue, 02 Jan 2024 09:45:00 -0000
|Read Time: 0 minutes
Deploying a Kubernetes cluster on the edge involves setting up a lightweight, efficient Kubernetes (K8s) environment suitable for edge computing scenarios. Edge computing often involves deploying clusters on remote or resource-constrained locations, such as remote data centers, or even on-premise hardware in locations with limited connectivity.
This blog describes the steps for deploying an edge-optimized Kubernetes cluster on Dell NativeEdge.
Our Kubernetes stack is comprised of a Kubernetes controller, storage, and a virtual IP (also known as load balancer). We have chosen open-source components as our first choice for obvious reasons.
Standard K8s comes with a relatively high footprint cost which doesn’t fit low-cost functional edge use cases, and this is why MicroK8, K3s, K0, KubeVirt, Virtlet, and Krustlet have emerged as smaller footprint variants of Kubernetes.
We have chosen K3s as our Kubernetes cluster, Longhorn for storage, and Kube-VIP for our cluster networking.
Figure 1. Edge-Optimized Kubernetes Stack
The following sections provide a quick overview of each element in the stack.
Edge is a constrained environment that is often limited by resource capacity.
K3s is a lightweight, certified Kubernetes distribution designed for lightweight environments, including edge computing scenarios. It's an excellent choice for deploying Kubernetes clusters on the edge due to its reduced resource requirements and simplified installation process.
Longhorn is an open-source, cloud-native distributed storage system for Kubernetes. It is designed to provide persistent storage for containerized applications in Kubernetes environments.
Kubernetes Virtual IP (Kube-VIP) is an open-source tool for providing high availability and load balancing within Kubernetes clusters. It manages a virtual IP address associated with services, ensuring continuous access to services, load balancing, and resilience to node failures.
To automate the deployment of Edge Kubernetes on NativeEdge, we need to automate the deployment of all three components of our edge architecture.
For that purpose, we use the NativeEdge Orchestrator blueprint. The blueprint provides the automation scheme for each component and allows us to compose a solution offering an end-to-end automation of the entire cluster on all its components.
Figure 2. Automating the Kubernetes Cluster Deployment
The following snippets show the blueprint for each of the three components that were previously described. A blueprint is a form of infrastructure as code (IaC) written in YAML format. Each blueprint uses a different automation plugin that fits each unit.
The first snippet shows the provisioning of a virtual IP address (VIP) that serves as the cluster entry point to the outside world. As with any load-balancer, it provides a single VIP address for all three nodes in the cluster. In this case, we chose a fabric plugin (SSH script) to automate the installation and configuration of that VIP service (scripts/install_kvip.sh).
Figure 3. VIP Blueprint Snippet
The second snippet shows the provision of the K3s cluster. It comes in multiple configuration flavors, a single node, and a three or five node HA cluster. We first provision the first node and then, in case of a multi node cluster, provision the rest of the nodes. All of the nodes form a cluster and result in an HA solution.
Figure 4. K3s Blueprint Snippet
The third snippet shows the provision of Longhorn, a cloud-native HA distributed block storage for Kubernetes. It is optional and the user can decide, using inputs, whether to add HA storage to the cluster. Longhorn creates replicas of the data in other nodes' volumes in the cluster, so in the case that a node fails, you still have the other replicas.
Figure 5. Storage (Longhorn) Helm Chart Blueprint
After you connect all of the components and create the HA Kubernetes cluster, you have a topology of three Kubernetes nodes (in case a of a three-node cluster), plus Kube-VIP as the VIP entry point to the cluster, and a Longhorn storage component, as shown in the following topology diagram.
Figure 6. Automation Topology
This process takes a few minutes, and then you have an HA Kubernetes cluster.
The discovery phase is responsible for maintaining the list of available edge devices. The result of the discovery is a list of environment entries each containing the relevant device assets management.
This list is used as an input to the deployment phase and lets the user select the designated devices that are used for the cluster.
Figure 7. NativeEdge Discovery
In the previous snippet, we see the available NativeEdge Endpoints that the user can choose from to form a cluster. The user can choose either one or three NativeEdge Endpoints to create an HA cluster. An odd number of endpoints is needed for the cluster leader election algorithm. It is essential to avoid multiple leaders getting elected, a condition known as a split-brain problem. Consensus algorithms use odd number voting to elect the leader. An example of this could be electing the node with majority votes.
Workflow execution is the phase where we map the automation plan as described in the blueprint into a chain of tasks. This calls the relevant infrastructure resource API needed to establish our cluster.
The user starts by deploying the K3S blueprint from the application catalog, as shown in the following figure.
Figure 8. NativeEdge Workflow Execution
In the following figure, we can see the deployment progress bar, at 61 percent complete. It deploys all the necessary cluster resources, the K3S components, the Kube-VIP, and Longhorn.
Figure 9. NativeEdge Solution Deployments
Upon deployment completion, NativeEdge shows the Deployment Capabilities and Outputs, as seen in the following figure. This list includes important information such as the K3s cluster endpoint to access the cluster.
The Deployment Capabilities and Outputs display also includes events or logs of the deployment execution, where the user can view various steps of the deployment execution.
Figure 10. Deployment Details
Edge devices can vary significantly in terms of networking capability, resource level, hardware capabilities, operating systems, and functional role, leading to fragmentation in the edge computing ecosystem.
Edge AI is a catalyst event that leads to even more significant edge device fragmentation. It requires specialized hardware accelerators like GPUs, Neural Processing Units (NPUs), or Tensor Processing Units (TPUs) to efficiently run deep learning models. Different manufacturers produce these accelerators, leading to a variety of hardware platforms and architectures. In addition to that, many organizations, especially in industries such as automotive, healthcare, and industrial IoT, develop custom edge AI solutions tailored to their specific requirements.
Using Kubernetes at the edge can help reduce device fragmentation complexity through:
Having said that, setting up a Kubernetes cluster on edge devices can be a complex task.
NativeEdge provides a built-in blueprint that automates the entire process through a single API call.
It is also important to note that in this specific example, we refer to a specific edge Kubernetes stack. The provided blueprint can be easily extended to fit your specific environment or your choice of Kubernetes stack.
Tue, 26 Sep 2023 19:15:00 -0000
|Read Time: 0 minutes
Edge computing is generally defined as “a distributed computing paradigm that brings computation and data storage closer to the sources of data.1” The goal of this approach is to improve response times and save bandwidth.
Beyond this definition, edge computing is critical for enterprises to drive innovation and business outcomes. Existing approaches to the edge have led to technology silos, unscalable operations, poor infrastructure utilization, and inflexible legacy ecosystems. The massive proliferation of diverse edge devices has also increased exposure to cyberattacks. Dell has addressed these challenges with the new NativeEdge solution, a key feature of which is the ability to deploy edge devices swiftly and securely. At the root of this capability is FIDO Device Onboard (FDO), an open standard defined by technology leaders within the FIDO Alliance to automatically and securely onboard devices within edge deployments as diverse as retail, manufacturing, and energy. The FDO implementation used by Dell is based on the open-source implementation that has been contributed to the Linux Foundation Edge project by Intel.
The integration of the FIDO Device Onboard (FDO) with the Dell NativeEdge solution helps organizations to deploy and manage infrastructure at the edge by utilizing zero-trust principles and a streamlined supply chain to secure the edge environment at scale. “Intel developed and contributed the base technology that became FDO. Our work with Dell and the FIDO Alliance is a great example of the power of collaboration to address the continuously evolving threat landscape faced by our edge customers,” said Sunita Shenoy, Senior Director, Edge Technology Product Management at Intel.
Edge computing is transforming industries and we are delighted that FDO is a key component in Dell's innovative NativeEdge platform," said Andrew Shikiar, executive director and CMO of the FIDO Alliance. See the press release here: FIDO Device Onboard (FDO) Certification Program is Launched to Enable Faster, More Secure, Deployments of Edge Nodes and IoT Devices
In this blog, we will look at the edge challenges and three key elements that seek to address them: firstly Dell’s NativeEdge solution (described here), secondly the FIDO Device Onboarding (FDO) standard, and lastly the Linux Foundation Edge Open-Source software implementation of FDO (described here).
Recent years have seen a significant shift towards the edge, as more companies deploy devices that increase the demand for more data and analytics. By deploying devices to the edge, companies can reduce latency, improve the speed of data processing, and enhance security. Further, deploying devices at the edge can also help reduce bandwidth consumption and minimize the costs that are associated with transmitting large amounts of data to the cloud. The deployment of devices at the edge has therefore become a crucial component of modern technology infrastructure, enabling businesses to improve their operational efficiency and deliver better customer experiences.
The NativeEdge operations software platform enables organizations to securely deploy and manage infrastructure at the edge. NativeEdge supports a wide range of NativeEdge Endpoints. It uses zero-trust principles, combined with a holistic factory integration approach and application orchestration, to create a secure edge environment. It can start small with a single device and scale out as needed, and it can be deployed centrally or globally, regardless of network connectivity challenges, absence of technical staff, or facility environment.
In an internal Dell analysis2 consisting of return-on-investment modeling together with nearly a hundred Dell customer interviews, and a third-party environmental consultant review for methodology validation, Dell examined the potential economic impact of running NativeEdge across 25 facilities of a composite manufacturing company.
The study found that after three years, the company could expect to see the following benefits:
As these figures show, NativeEdge is designed to address the major aspects of managing an edge system. The first two of these aspects are closely linked as the ability to provide zero-touch provisioning (also known as onboarding) together with zero-trust security, a key tenet of which is, “Never trust, always verify."
Traditionally, the installation of edge devices has been a cumbersome and time-consuming process. Edge installers, who could be individuals such as retail store managers or factory plant managers, may lack the expertise to manage complex edge devices and operating system installations. This highlights the importance of ensuring that edge devices are user-friendly and straightforward to deploy, as mistakes in manual onboarding can lead to security issues as well as service outages.
With NativeEdge, anyone can easily set up a NativeEdge Endpoint by simply plugging in a network cable, powering on the device, and stepping away. By leveraging the FIDO Alliance’s open standard known as FIDO Device Onboard Specification 1.1, Dell assures a streamlined installation process that is as easy as possible. The FIDO Alliance is a standards organization with over 250 members that was formed in 2012 with the goal of “simpler, stronger authentication.”
Leaders in technology from the FIDO Alliance (including Intel, Amazon, Google, Qualcomm, and Arm) created FDO. It is an open specification that defines an approach which combines 'plug and play'-like simplicity with the highest levels of security. It fully aligns with the zero-trust security framework in that neither the edge device nor the platform onto which it is being onboarded are trusted before onboarding takes place. FDO extends zero trust from the installation point back to the manufacturer.
The following steps are aligned with the numbers in the figure:
Finally, having finished the FDO process, the device contacts its management platform, which is the platform that manages it for the rest of its lifecycle. FDO then lies dormant, although it can be re-awakened if needed, such as if the device is sold or repurposed.
Dell has integrated FDO into many elements of its NativeEdge solution, from its secure manufacturing facilities to the Dell Digital Locker used to store Ownership Vouchers to the NativeEdge Orchestrator. A full and detailed description of how FDO has been dovetailed into NativeEdge is available here.
The following diagram shows the FDO process applied within the NativeEdge environment.
The numbered steps in the diagram are explained in detail in the following steps:
Software implementations of FDO consist of several functional elements, which are highlighted in the following generic FDO tool diagram.
The numbered steps in the diagram are described in further detail as follows:
Companies have a range of options when implementing the FDO software. They can develop the software themselves directly from the specification, use one of the commercially available implementations of FDO (for example, Red Hat), or they can use the Linux Foundation Edge implementation (described here).
The FDO software within the Linux Foundation Edge has been developed and contributed by Intel, one of the authors of the FDO specification. The code is a mixture of C and Java (depending on which part of the FDO system is being implemented). It offers client software for both Intel and other processors including Arm.
With NativeEdge, Dell set a simple but critical goal; allow customers to deploy Edge solutions quickly and securely and then manage them effectively throughout their lifetime. As with all simple goals, the challenge is in developing a solution that fully delivers on the promise. With NativeEdge, Dell has taken full advantage of FIDO Device Onboarding (FDO) together with the Linux Foundation Edge FDO project code to build on top of an industry onboarding technology that fully supports Dell’s mission to simplify deployment and management at the edge while delivering the highest levels of security. NativeEdge is now available for customers to deploy at scale.
1 https://en.wikipedia.org/wiki/Edge_computing
2 Based on internal analysis, May 2023. The internal analysis consisted of internal modeling, customer interviews, and third-party environmental consultant review for methodology validation.
Mon, 25 Sep 2023 07:30:48 -0000
|Read Time: 0 minutes
As the demand for edge computing continues to grow, organizations are seeking comprehensive solutions that streamline the development and operational processes in edge environments. This has led to the emergence of DevEdgeOps platforms, with specialized processes and tools. Including frameworks designed to support the unique requirements of developing, deploying, and managing applications in edge computing architectures.
Shift Left refers to the practice of moving activities that were traditionally performed mostly at production stage to an earlier in the development stage. It is often applied in software development and DevOps to integrate testing, security, and other considerations earlier in the development lifecycle. Similarly, in the world of edge computing, we are moving operational tasks to an earlier stage, just like how we did with Shift Left in DevOps. We call this new idea, DevEdgeOps.
A DevEdgeOps platform facilitates collaboration between developers and operations teams, addressing challenges like network connectivity, security, scalability, and edge deployment management.
In this blog post, we introduce edge computing, its use cases, and architecture. We explore DevEdgeOps platforms, discussing their features and impact on edge computing development and operations.
Edge computing is a distributed computing paradigm that brings data processing and analysis closer to the source of data generation, rather than relying on centralized cloud or datacenter resources. It aims to address the limitations of traditional cloud computing, such as latency, bandwidth constraints, privacy concerns, and the need for real-time decision-making.
To learn more about the use cases, unique challenges, typical architecture and taxonomy refer to my previous post: Edge Computing in the Age of AI: An Overview
DevEdgeOps is a term that combines elements of development (DevOps) and edge computing. It refers to the practices, methodologies, and tools used for managing and deploying applications in edge computing environments while leveraging the principles of DevOps. In other words, it aims to enable efficient development, deployment, and management of applications in edge computing environments, combining the agility and automation of DevOps with the unique requirements of edge deployments.
A DevEdgeOps platform provides developers and operations teams with a unified environment for managing the entire lifecycle of edge applications, from development and testing to deployment and monitoring. These platforms typically combine essential DevOps practices with features specific to edge computing, allowing organizations to build, deploy, and manage edge applications efficiently.
The emergence of new edge use cases that combine cloud-native infrastructure and AI introduces an increased operational complexity and demands more advanced application lifecycle management. Traditional management approaches may no longer be sustainable or efficient in addressing these challenges.
In my previous post, How the Edge Breaks DevOps, I referred to the unique challenges that the edge introduces and the need for a generic platform that will abstract the complexity associated with those. In this blog, I introduced DevEdgeOps platforms that combine essential DevOps practices with features specific to edge computing. I also described the set of features that are expected to be part of this new platform category. By embracing these approaches, organizations can effectively manage operational complexity and fully harness the potential of edge computing and AI.
Wed, 28 Feb 2024 13:03:00 -0000
|Read Time: 0 minutes
Inferencing, in the context of artificial intelligence (AI) and machine learning (ML), refers to the process of classifying or making predictions based on the input information. It involves using existing knowledge or learned knowledge to arrive at new insights or interpretations.
Data growth driven by data-intensive applications and ubiquitous sensors to enable real-time insight is growing three times faster than traditional methods that require network access. This drives data processing at the edge to keep up with the pace and reduce cloud cost and latency. S&P Global Market Intelligence estimates that by 2027, 62 percent of enterprises data will be processed at the edge.
Inferencing is a crucial aspect of various AI applications, including natural language processing, computer vision, graph processes, and robotics.
The process of inferencing typically involves the following steps:
Inference at the edge is a technique that enables data-gathering from devices to provide actionable intelligence using AI techniques rather than relying solely on cloud-based servers or data centers. It involves installing an edge server with an integrated AI accelerator (or a dedicated AI gateway device) close to the source of data, which results in much faster response time. This technique improves performance by reducing the time from input data to inference insight, and reduces the dependency on network connectivity, ultimately improving the business bottom line. Inference at the edge also improves security as the large dataset does not have to be transferred to the cloud. For more information, see Edge Inferencing is Getting Serious Thanks to New Hardware, What is AI Inference at the Edge?, and Edge Inference Concept Use Case Architecture.
In short, inferencing is the process of an AI model using what it has learned to give us useful answers quickly. This can happen at the edge or on a personal device which maintains privacy and shortens response time.
AI inferencing can be challenging because edge systems may not always have sufficient resources. To be more specific, here are some of the key challenges with edge inferencing:
Handling a deep learning process involves continuous data pipeline management and infrastructure management. This leads to the following question:
To illustrate how inferencing works, we use TensorFlow as our deep learning framework.
TensorFlow is an open-source deep learning framework developed by the Google Brain team. It is widely used for building and training ML models, especially those based on neural networks.
The following example illustrates how to create a deep learning model in TensorFlow. The model takes a set of images and classifies them into separate categories, for example, sea, forest, or building.
We can create an optimized version of that TensorFlow Lite model with post-training quantization. The edge inferencing works using TensorFlow-Lite as the underlying framework and Google Edge Tensor Processing Uni (TPU) as the edge device.
This process involves the following steps:
You can read the full example in this post: Step by Step Guide to Make Inferences from a Deep Learning at the Edge | by Renu Khandelwal | Towards AI
Inferencing is like a magic show, where AI models surprise us with their clever responses. It's used in many exciting areas like talking to virtual assistants, recognizing objects in pictures, and making smart decisions in various applications.
Edge inferencing allows us to bring the AI processing closer to the source of the data and thus gain the following benefits:
What is AI Inference at the Edge? | Insights | Steatite (steatite-embedded.co.uk)
Wed, 27 Sep 2023 05:19:01 -0000
|Read Time: 0 minutes
Edge computing is a distributed computing paradigm that brings data processing and analysis closer to the source of data generation, rather than relying on centralized cloud or datacenter resources. It aims to address the limitations of traditional cloud computing, such as latency, bandwidth constraints, privacy concerns, and the need for real-time decision-making.
Edge computing finds applications across various industries, including manufacturing, transportation, healthcare, retail, agriculture, and digital cities. It empowers real-time monitoring, control, and optimization of processes. This enables efficient data analysis and decision-making at the edge as it complements cloud computing by providing a distributed computing infrastructure.
Here are some common examples:
These are just a few examples, and the applications of edge computing continue to expand as technology advances. The key idea is to process data closer to its source, reducing latency, improving reliability, and enabling real-time decision-making for time-sensitive applications.
Edge computing brings numerous benefits, but it also presents a set of challenges that organizations need to address. The following image highlights some common challenges associated with edge computing:
The following diagram represents a typical edge computing architecture and its associated taxonomy.
A typical edge computing architecture consists of several components working together to enable data processing and analysis at the edge. Here are the key elements you would find in such an architecture:
It is important to note that while the components and the configurations of edge solution may differ, the overall objective remains the same: to process and analyze data at the edge to achieve real-time insights, reduced latency, improved efficiency, and better overall performance.
Data growth driven by data intensive applications and ubiquitous sensors to enable real time insight is growing three times faster than access network. This drives data processing at the edge to keep up with the pace and reduce cloud cost and latency. IDC estimates that by 2027 62% of enterprises data will be processed at the edge!
Inference at the edge is a technique that enables data-gathering from devices to provide actionable intelligence using AI techniques rather than relying solely on cloud-based servers or data centers. It involves installing an edge server with an integrated AI accelerator (or a dedicated AI gateway device) close to the source of data, which results in much faster response time.1 This technique improves performance by reducing the time from input data to inference insight, and reduces the dependency on network connectivity, ultimately improving the business bottom line.2 Inference at the edge also improves security as the large dataset do not have to be transferred to the cloud.3
Edge computing in the age of AI marks a significant paradigm shift in how data is processed, and insights are generated. By bringing AI to the edge, we can unlock real-time decision-making, improve efficiency, and enable innovations across various industries. While challenges exist, advancements in hardware, software, and security are paving the way for a future where intelligent edge devices are an integral part of our interconnected world.
It is expected that Inferencing market alone will overtake training with highest growth at the edge – necessitating competition in data center, near edge, and far edge.
For more information on how edge-inferencing works, refer to the next post on this regard: Inferencing at the Edge
1 https://steatite-embedded.co.uk/what-is-ai-inference-at-the-edge/
2 https://www.storagereview.com/review/edge-inferencing-is-getting-serious-thanks-to-new-hardware
Tue, 08 Aug 2023 14:31:00 -0000
|Read Time: 0 minutes
With an ever-evolving digital landscape and most edge use cases built around brownfield applications, IT operations have become a challenging matter for many organizations, particularly when bringing workloads to the enterprise edge.
These edge operational challenges include:
Edge lives outside data centers in the real world where we live. It is located where data is captured close to devices or endpoints, to generate immediate and actionable insights.
We are experiencing a perfect storm of innovation driven by an explosion of data (IoT, telemetry, video, and streaming data), technology capabilities (multicloud, AI/ML, heterogeneous computing, software-defined, and 5G), and the resulting business challenges (security, compliance, productivity, and customer experience).
Security that is required at these locations needs a different approach:
Dell is committed to assisting customers with the simplification of edge operations as the demand for secure and efficient application delivery has become paramount. The Dell NativeEdge platform leverages the power of edge computing to revolutionize application delivery in a secure environment.
NativeEdge provides a unique set of assets in an edge operations software platform which allows IT operations to deliver application orchestration, multicloud connectivity, zero-touch onboarding, a zero-trust security approach, and infrastructure management.
NativeEdge provides a standardized framework for defining and deploying applications. This simplifies the management and scalability of complex edge environments while ensuring consistency and reliability in application orchestration.
NativeEdge zero-touch provisioning is a feature that allows for the automatic and seamless deployment of NativeEdge Endpoint (OptiPlex, Gateways, and PowerEdge) without manual intervention. It enables quick and effortless setup by leveraging order and manufacturing preconfigured settings, eliminating the need for on-site configuration, and reducing deployment time and effort.
NativeEdge multicloud capabilities allow NativeEdge Endpoints to connect and integrate with multiple cloud platforms. It enables organizations to leverage various cloud services and resources, such as storage, computing power, and analytics, across different cloud providers, which enhances flexibility and scalability in edge computing deployments.
NativeEdge infrastructure management capabilities provide a comprehensive set of tools and features that enable centralized control and monitoring of NativeEdge Endpoints. It includes functions such as remote device management, software updates, configuration management, and performance monitoring—all of which enhance efficiency and simplify the management of edge computing infrastructure.
Zero trust is a security framework according to the National Institute of Standards and Technology Special Publication (NIST SP) 800-207 that challenges the traditional perimeter-based approach. It assumes that no user or device should be inherently trusted, requiring continuous verification and authentication of every access request. It aims to improve cybersecurity by minimizing risks and enforcing strict access controls regardless of location or network. A zero-trust solution starts with the seven pillars of security as defined by the Department of Defense (DoD), such as device trust, user trust, transport and session trust, data trust, software trust, the two layers that provide the visibility and analytics, and automation and orchestration. Each pillar has 45 capabilities, and each capability has 152 zero-trust activities.
NativeEdge is a powerful and secure edge computing application delivery solution that combines features like zero-touch provisioning, multicloud capabilities, and robust infrastructure management. It provides seamless edge, core, and cloud deployment, integration with multiple cloud platforms, and centralized control, which brings scale to edge operations.
Watch the overview video:
Curious to know more about NativeEdge capabilities? See Edge Security Essentials: Edge Security and How Dell NativeEdge Can Help, or visit Dell.com/NativeEdge and Dell Technologies Solutions Info Hub for NativeEdge.