How 5G will change cloud computing

| February 12, 2020

article image
A technology that has more misinformation around it than anything I have seen before. Much of this bad data is focused on cloud computing.The reality is that it will take a while to roll out 5G. We need to upgrade our phones, cell towers, network devices, and more, and that will not happen overnight. Moreover, the dollars it will require will not be easily extracted from most enterprises.Of course, there are many predictions about how cloud computing will change in a 5G world, most of which are dead wrong. Tech pundits are calling for 5G to light edge computing on fire and take share away from the public clouds. Both will grow rapidly.Any technology change, including 5G, will transform the use of other technologies along with cloud computing. However, what is likely to change is not as disruptive as most 5G fanboys think. Here are two ways 5G will change cloud computing.First, cloud access will spread everywhere. We have bandwidth deserts out there in mostly rural, less populated areas, where access to the Internet is non-existent or sub-10Gb/s down, with 1Gb/s up. You cannot do much with that as a business connected to an IaaS cloud provider; data transfer latency will just be too high. 5G holds the promise of eliminating bandwidth deserts and freeing business now in rural, underserved areas to leverage cloud computing, and thus expand the cloud computing market with 5G.

Spotlight

Meridian Knowledge Solutions

Meridians award-winning learning management system is designed and tailored to fulfill the specialized needs of our clients. We uniquely offer a choice of single or multi-tenant SaaS (cloud) or on-premise secure deployment models.

OTHER ARTICLES

Need to define outcomes before making data centre software defined

Article | March 4, 2020

In the new age IT, mobile, cloud era, the expectations of the functional users from IT is changing rapidly. The desire is to get services with efficiency, agility and security. In this backdrop it’s necessary to take a step by step approach to build gradually. The IT should have two prerequisites to become an enabler for business and it should become a service broker for both the private and public cloud services by establishing a unified operations environment and framework.Software defined IT infrastructure can serve the purpose of being an enabler and easing resource provisioning and management. Maruti Suzuki began its software defined journey long back with server virtualisation . We shall be implementing software defined networking solutions in the near future.

Read More

NetFoundry Extends Edge Computing and Private 5G Use Cases via Integration with Azure Edge Zones

Article | March 4, 2020

NetFoundry has announced a new embedded networking solution within Microsoft Azure Edge Zones. According to NetFoundry, the integration will allow businesses to easily and securely tap into the power of edge compute and optional private 5G for use cases, including industrial IoT, near-real time video processing, and analytics.Microsoft Azure Private Edge Zones enable application workloads to span edges and clouds with a common Azure experience, APIs, and security. NetFoundry's integration facilitates direct connections between businesses and Azure Private Edge Zones without deploying extra network gear. This capability is particularly important at edge sites that often lack space, power, and cooling. With the NetFoundry embedded networking solution, all applications, from edge to cloud, can use any Internet connection, instantly joining a NetFoundry-powered zero trust, high-performance network. Zero trust security is an industry-accepted architecture that assumes "zero trust" of actors and protocols both outside and inside an organization.The NetFoundry platform enables businesses to securely and reliably connect distributed compute environments, providing zero trust, high-performance networking as a service (NaaS) from edge to cloud, and everywhere in between.

Read More

How to be Compliant When Switching Email Vendors

Article | March 4, 2020

Switching email vendors is usually no small task. There are a lot of things to remember; email templates, images, segmentation, forms, etc. all need to be moved. Users will need to get acquainted with the new system and interface. You will also want to think about compliance, and what you need to consider may depend on where you recipients are located.

Read More

In the Face of a Pandemic, Cyberattackers Seek to Take Advantage

Article | March 4, 2020

Cyberattackers live for moments of crisis and confusion. Government agencies and companies already stretched thin are at their most vulnerable, and cyberattackers are all too willing to apply overwhelming pressure to maliciously disrupt operations or gain some financial benefit. As the world struggles to address the mounting challenges of the pandemic, we have already seen early examples of this. For example, news broke this week that the Department of Health and Human Services (HHS) had been hacked over the weekend.

Read More

Spotlight

Meridian Knowledge Solutions

Meridians award-winning learning management system is designed and tailored to fulfill the specialized needs of our clients. We uniquely offer a choice of single or multi-tenant SaaS (cloud) or on-premise secure deployment models.

Events