Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Edge Computing with Amazon Web Services
  • Table Of Contents Toc
  • Feedback & Rating feedback
Edge Computing with Amazon Web Services

Edge Computing with Amazon Web Services

By : Sean Howard
5 (10)
close
close
Edge Computing with Amazon Web Services

Edge Computing with Amazon Web Services

5 (10)
By: Sean Howard

Overview of this book

The surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures. This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You’ll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you’ll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you’ll delve into essential security and operational considerations to maximize the value delivered by AWS services. By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.
Table of Contents (21 chapters)
close
close
Free Chapter
1
Part 1: Compute, Network, and Security Services at the Edge
5
Part 2: Introducing AWS Edge Computing Services
10
Part 3: Building Distributed Edge Architectures with AWS Edge Computing Services
15
Part 4: Implementing Edge Computing Solutions via Hands-On Examples and More

Tactical edge

Tactical edge refers to edge computing environments that support military operations. Such situations are characterized by limited connectivity, high mobility, and the most intense security requirements.

At the tactical edge, the most common needs include deploying, managing, and securing the following technologies:

  • IoT: Cameras and sensors of every description get cheaper every day. The number of data-gathering devices is growing just as quickly on the battlefield as it is back home. These devices need to either facilitate immediate/local decision-making or move the data they collect to an aggregation point where those things can be done.

    Compared to prior decades, when such things would have been done using proprietary protocols and architectures specific to each system, nowadays, the same IoT protocols used in the civilian world are used at the tactical edge.

    For example, consider a UAV that drops thousands of LoRaWAN-capable vibration sensors over several...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY