Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Edge Computing: Growth Drivers

Truth in IT
09/30/2023
84
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: In your research, you are seeing a lot of growth at the edge. And, you know, what do you see as the main drivers of that? I guess not only the growth of edge computing, but but the growth of the data itself as well. Todd Dorsey: Sure. Well, in many ways, the growth of data at the edge is the factor and reflects the growth of data everywhere. More devices, more applications producing more data, use of media files and larger file sizes. But of course, the edge has unique environments there. Video surveillance, for example, for security. And there's automation technologies and IoT and proliferation of sensors and the manufacturing and environmental situations. Mobile devices and smart devices and 5G networks, you know, as a result of mobile field forces and mobile field workforces. I think of a recent example when I was at the auto dealership. We had a AC leak in our vehicle, and it was wasn't clear where it was coming from, and it had extended warranty on it. But so we had to end up submitting a case with the warranty company for them to cover the AC outage. But, you know, as part of that experience, there's, of course, video in the lobby and there's a case being opened. And as part of our historical records and pictures being taken and submitted with that. And it's just a much richer environment than what it was a decade ago. And of course, there's no end in sight with the amount of data growing for those sorts of situations. Dave Littman: Okay, great. Todd Thank you. Bruce Kornfeld: David, can I can I jump in here? Yeah, Bruce. Go ahead. Yeah. Yeah. So just to follow on to what Todd just said, I mean, what I would I would just add that think about going to an auto parts dealer just five years ago or ten years ago. None of that would have been there. So I'm you know, what we see is that because technology has advanced so much thanks a lot to AMD and Intel and faster processors and smaller devices and faster memory, the innovation that's happening out there is driving all of this data at the edge. Companies are innovating a new ways to solve business problems and it's just generating a massive amount of processing and data coming out from the edge. And and and that's what we're all about here talking about today.

The conversation revolves around the exponential growth of data at the edge, with Todd Dorsey of DCIG emphasizing the role of more devices, applications, and larger files. He uses a warranty case at an auto dealership as an example of the increasing data richness today. StorMagic's Bruce Kornfeld follows up, contrasting current experiences to those just a decade ago, and credits rapid technological advancements from companies such as AMD and Intel for the burgeoning data landscape at the edge.

Categories:
  • » Data Protection » Backup & Recovery
  • » Cybersecurity
  • » Webinar Library » StorMagic
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • stormagic
  • edge
  • security
  • storage
  • dcig
  • hci
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Edge Computing: Growth Drivers

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version