Successfully reported this slideshow.

Azureday 2020 - The Edge talks - long road into the Cloud​

0

Share

Upcoming SlideShare
Edge computing in practice
Edge computing in practice
Loading in …3
×
1 of 22
1 of 22

Azureday 2020 - The Edge talks - long road into the Cloud​

0

Share

Download to read offline

Edge Computing is gaining incredible hype and traction all over IoT community. Day by day we can see corporations and startups dive in this movement on both hardware and software level. Join me in the journey across the Cloud and beyond to the Edge. We will be climbing the peaks of real use cases to see the story behind all the buzzwords and fluff.Let’s analyze this based on real life case studies and demos of Edge Computing in practice.

Edge Computing is gaining incredible hype and traction all over IoT community. Day by day we can see corporations and startups dive in this movement on both hardware and software level. Join me in the journey across the Cloud and beyond to the Edge. We will be climbing the peaks of real use cases to see the story behind all the buzzwords and fluff.Let’s analyze this based on real life case studies and demos of Edge Computing in practice.

More Related Content

Related Books

Free with a 14 day trial from Scribd

See all

Related Audiobooks

Free with a 14 day trial from Scribd

See all

Azureday 2020 - The Edge talks - long road into the Cloud​

  1. 1. The Edge talks - long road into the Cloud Rafał Warzycha | Technology Evangelist @ ABB
  2. 2. — About me
  3. 3. — Rafał Warzycha Technology Evangelist @ ABB Podcast creator – just4Fun.io Blogger, community sheppard from Łódź rafal.warzycha@pl.abb.co m @rwarzycha
  4. 4. — Data security Data ownership Data processing Agenda 1 2 3
  5. 5. — Edge talks
  6. 6. Source https://www.pubnub.com/blog/moving-the-cloud-to-the-edge-computing/
  7. 7. — Data security
  8. 8. Source https://www.pubnub.com/blog/moving-the-cloud-to-the-edge-computing/
  9. 9. — 83 % — Field devices are inadequately updated for known security flaws Source https://www.cyberscoop.com/wifi-router-firmware-study-american-consumer-institute-study/
  10. 10. — Root cause THREATPOST The install base of connected devices is expected to reach more than 31 billion devices by 2020, according to Business Insider Intelligence. Many of them will likely be left with default passwords, or will be installed and never updated or patched, researchers said.
  11. 11. — Data ownership
  12. 12. — Who really owns the data ? • device manufacturer • end-user • 3rd party • …
  13. 13. — Multitenancy Tenant A Tenant B Tenant C TSI
  14. 14. — Data processing
  15. 15. — Expectations
  16. 16. — Reality
  17. 17. — — Q&A
  18. 18. — — Thank you!
  19. 19. Don't forget to rate my session in Mobile App!

Editor's Notes

  • Hello everyone, 
     
    I am happy to be here with you. Today I will be sharing with you some thoughts and experiences related to the Edge Computing.
  • A few words about me - my name is Rafał Warzycha, I'm Technology Evangelist @ ABB. You may recognize my voice from the podcast called just4fun. I am also involved in multiple knowledge-sharing initiatives in Lodz.

    My day to day work as a Client Success Team member is to travel all over the world and help my clients to build their IoT solutions based on Microsoft Azure.
     
    Today I would like to share with you some real-life stories that I have brought back from my travels to give you some idea about how Edge computing is being developed by developers all over the world.
  • We will focus on three areas -
     
    Data security
    Data ownership
    Data processing
     
    Those 3 are most commonly associated with edge computing and can give you some insights into what kind of issues developers and architects are experiencing.
     
  • Let's start with data security. This topic is very sticky since security is an art. On its own. I the case of edge computing we typically put devices in the field to collect and process data. To "do sth in the field" means to expose it to the harm - both literally and figuratively. You may recognize the slogan, that the letter "S" in the "IoT" acronym stands for Security.
     
    Since 2011 when we started to observe a rapid growth on IoT all over the world, low security was the common denominator of. I remember multiple conference talks, where it was exposed to great details. Security got improved since then but will still struggle with some threads.
     
    Today's issues are mostly related to botnet activities. Unfortunately, we can still observe IoT devices that are mass-produced, with poorly implemented security and no option for firmware updates when vulnerability will be discovered. Since there is no if, where.
     
  • The attack, which occurred between March and April [2019] at one of the firm's clients in the "entertainment industry," targeted an online streaming application, Imperva says in a blog. At one point, the botnet produced more than 292,000 requests per minute, the researchers say.
  • “Many IoT devices are treated as fire-and-forget: Once initially set up, IoT devices are not monitored or checked for abnormal behavior, meaning an infected device could be operating for a significant period of time before issues are ever detected,” according to IBM X-Force.

    Storytime EL
  • Story time
  • Story time
  • Story time
  • Storytime
  • Questinons?
  • Thank you for joining me in this talk. I hope it was informative and interesting. I'm available during the event, please feel free to ask me anything related to IoT.
     
    Additionally, soon on the Theater track, my friend Pawel Fiderek is starting his talk, say hi from me.
  • ×