Virtual Networks are Air Gapped

The definition of traditional security technologies must evolve to meet new use cases. Networks that use virtual constructs to segregate traffic are just as air gapped as physical separation. In this episode, Tom Hollingsworth is joined by Carole Warner Reece, John Osmon, and Jason Gintert discuss why the standard for hyper secure systems has always been physical separation. They look at how the terminology is being changed to support new use cases with virtual separation and whether or not those new networks can meet the high standards of the older versions. They also discuss the need for precision in terminology and how to avoid falling back on marketing terms that can create confusion with unsuspecting consumers.

Edge Computing is a Melting Pot of Technology

Edge computing is one of the areas where we see startup vendors offering innovative solutions, enabling applications to operate where the business operates rather than where the IT team sit. This episode of the Tech Field Day podcast focuses on the melting pot of edge computing and features Guy Currier, John Osmon, Ivan McPhee, and host Alastair Cooke, all of whom attended the recent Edge Field Day in September. To accommodate the unique nature of the diverse and unusual locations where businesses operate, many different technologies are brought together to form the melting pot of edge computing. Containers and AI applications are coming from the massive public cloud data centres to a range of embedded computers on factory floors, industrial sites, and farm equipment. ARM CPUs, sensors, and low-power hardware accelerators are coming from mobile phones to power applications in new locations. Enterprise organizations must still control and manage data and applications across these locations and platforms. Security must be built into the edge from the beginning; edge computing often happens in an unsecured location and often with no human oversight. This melting pot of technology and innovation makes edge computing an innovative part of IT.

Miscreants in Action: Edge Computing (Or Something)

John Osman recaps his experience as a delegate at Edge Field Day. Despite engaging discussions and presentations from Solidigm, StorMagic, and NodeWeaver, he admits to remaining unclear on the precise definition of Edge Computing, expressing that it may be too vast and varied to reduce to a strict definition. Ultimately, the author settles on the understanding of Edge Computing as an optimization strategy that involves distributed computing, recognizing the breadth of its applications.

John Osmon

Holding no certs, people often wonder why anyone listens to John. His attempts to raise involvement and awareness by channeling the Bad Idea Fairy is often seen as disruptive.

Sign up for updates to
Tech Field day events

Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.

We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.

Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!