February 19, 2020 By Jeffrey Palmer 3 min read

Learn how autonomous management will revolutionize your edge computing approach.

If you’re a CIO in retail, manufacturing, distribution, banking, or just about any other industry, you’re building a strategy that will empower your lines of business to increase revenue and cost savings by adopting a massively decentralized computing architecture, otherwise known as edge computing.   

However, you’re concerned that traditional management approaches aren’t designed to manage and secure a topology with tens of thousands of edge servers and hundreds of thousands of edge devices in a cost-effective manner.  

How to handle the scale, variability, and rate of change of 5G and enterprise edge applications

As computing expands, the scale, variability, and rate of change of edge environments present a challenge that traditional management software was not designed for. It was originally built for centralized topologies with many servers (often standardized) in a few data centers or public cloud regions, with infrequent changes to the environment.

Now with edge, you have tens of thousands of servers and hundreds of thousands of edge devices that are much more heterogeneous, deployed in thousands of remote locations, with new locations or edge devices and servers being continuously added.  It’s nearly impossible for an administrator to understand the topology and relevant differences, which is critical when attempting to deploy new applications to the edge.

“Developing a successful edge strategy requires taking into consideration the complexity of management endpoints and recognizing that scale and variability are dramatically different from traditional on-premises or public cloud deployments.”

IDC White Paper, sponsored by IBM, “The Importance of Effective Operations in Unlocking Edge IT Value,” January 2020

Move to autonomous management

The massive scale, variability, and rate of change of edge environments requires a new approach—an autonomous management approach. Management actions such as deployment negotiation, agreement, execution, and on-going validation of workloads must be offloaded from the human administrator and onto autonomous management software.

This is achieved by asynchronous communication between software agents on edge endpoints and a management hub that constitute the autonomous management software. The actions carried out are based on the administrator intent but without his or her intervention, even during new endpoint onboarding.

Watch to learn more about autonomous management:

Administrators express an intent and autonomous management software executes in line with the intent

Here’s an example: “Deploy this application on any edge server with OpenShift 4.2, 8 cores free, 2GB of memory, 1TB of storage, not located in Toronto, Canada, not running an application owned by dept ABCD.”

Edge software agents autonomously decide if the edge endpoints they represent meet the intent set by the administrator, and if so, automatically initiate the installation of the application. The software agents continuously check for agreement validity over time. For instance, if the version of Red Hat OpenShift is later upgraded to 4.3, the agent can notify the administrator that the agreement is no longer valid, or it can automatically shut down the application, all without administrator initiation or intervention.  

With autonomous management, a single administrator can manage tens of thousands of endpoints without human initiation or intervention. 

Your house is becoming autonomous, isn’t it time your management software did?

Take your next steps in edge computing

This is truly an amazing time. The convergence of 5G, edge computing, and AI will spark a level of innovation that hasn’t been seen before. IBM believes enterprises can use edge IT to enable faster insights and actions, maintain continuous operations, and provide new customer experiences.  

Was this article helpful?

More from Cloud

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Attention new clients: exciting financial incentives for VMware Cloud Foundation on IBM Cloud

4 min read - New client specials: Get up to 50% off when you commit to a 1- or 3-year term contract on new VCF-as-a-Service offerings, plus an additional value of up to USD 200K in credits through 30 June 2025 when you migrate your VMware workloads to IBM Cloud®.1 Low starting prices: On-demand VCF-as-a-Service deployments begin under USD 200 per month.2 The IBM Cloud benefit: See the potential for a 201%3 return on investment (ROI) over 3 years with reduced downtime, cost and…

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters