Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Edge Computing: Growth Drivers

Truth in IT
09/30/2023
84
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: In your research, you are seeing a lot of growth at the edge. And, you know, what do you see as the main drivers of that? I guess not only the growth of edge computing, but but the growth of the data itself as well. Todd Dorsey: Sure. Well, in many ways, the growth of data at the edge is the factor and reflects the growth of data everywhere. More devices, more applications producing more data, use of media files and larger file sizes. But of course, the edge has unique environments there. Video surveillance, for example, for security. And there's automation technologies and IoT and proliferation of sensors and the manufacturing and environmental situations. Mobile devices and smart devices and 5G networks, you know, as a result of mobile field forces and mobile field workforces. I think of a recent example when I was at the auto dealership. We had a AC leak in our vehicle, and it was wasn't clear where it was coming from, and it had extended warranty on it. But so we had to end up submitting a case with the warranty company for them to cover the AC outage. But, you know, as part of that experience, there's, of course, video in the lobby and there's a case being opened. And as part of our historical records and pictures being taken and submitted with that. And it's just a much richer environment than what it was a decade ago. And of course, there's no end in sight with the amount of data growing for those sorts of situations. Dave Littman: Okay, great. Todd Thank you. Bruce Kornfeld: David, can I can I jump in here? Yeah, Bruce. Go ahead. Yeah. Yeah. So just to follow on to what Todd just said, I mean, what I would I would just add that think about going to an auto parts dealer just five years ago or ten years ago. None of that would have been there. So I'm you know, what we see is that because technology has advanced so much thanks a lot to AMD and Intel and faster processors and smaller devices and faster memory, the innovation that's happening out there is driving all of this data at the edge. Companies are innovating a new ways to solve business problems and it's just generating a massive amount of processing and data coming out from the edge. And and and that's what we're all about here talking about today.

The conversation revolves around the exponential growth of data at the edge, with Todd Dorsey of DCIG emphasizing the role of more devices, applications, and larger files. He uses a warranty case at an auto dealership as an example of the increasing data richness today. StorMagic's Bruce Kornfeld follows up, contrasting current experiences to those just a decade ago, and credits rapid technological advancements from companies such as AMD and Intel for the burgeoning data landscape at the edge.

Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Webinar Library » StorMagic
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • stormagic
  • edge
  • security
  • storage
  • dcig
  • hci
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Edge Computing: Growth Drivers

              Upcoming Webinar Calendar

              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention Strategies 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-strategies-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Protecting Data in the AI Era with DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-protecting-data-in-the-ai-era-with-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Is Your Cybersecurity Strategy Prepared for 2026 After 2025's Test?
                https://www.truthinit.com/index.php/channel/1705/is-your-cybersecurity-strategy-prepared-for-2026-after-2025s-test/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: estrategias para asegurar datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-estrategias-para-asegurar-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/10/2026
                12:00 AM
                02/10/2026
                Transforming Secure Access Through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1802/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/
              • 02/19/2026
                01:00 PM
                02/19/2026
                The CISO Dilemma: Fostering Innovation & Security in the Age of AI
                https://www.truthinit.com/index.php/channel/1809/the-ciso-dilemma-fostering-innovation-security-in-the-age-of-ai/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Solutions
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-solutions/

              Upcoming Spotlight Events

              • Jan
                27

                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                01/27/202601:00 PM ET
                • Feb
                  03

                  Evolution of Cloud Adaptability and AI Performance

                  02/03/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention Strategies 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Protecting Data in the AI Era with DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Jan
                          22

                          Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                          01/22/202601:00 PM ET
                          • Jan
                            20

                            Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                            01/20/202601:00 PM ET
                            • Dec
                              10

                              The Next Generation of Managed Data Security Services

                              12/10/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version