Unlocking edge insights with AI-ready data management

Issue 1 2022 Infrastructure

Solutions marketing manager for Lenovo Infrastructure Group, Bob Nevins, said in a recent blog that artificial intelligence (AI) has the potential to create $9 to $15 trillion of economic value in the coming years, according to a McKinsey report[1].


Jim Holland.

At the same time, data creation and computing at the edge is flourishing. By 2023, over 50% of new enterprise IT infrastructure will be deployed at the edge rather than in traditional data centres, up from less than 10% in January 2021[2]. And according to Gartner, by 2025, 75% of enterprise-critical data will be created and processed outside the data centre or cloud[3].

Companies are embracing the growth of AI and analytics solutions at the edge to gain real-time insights, transform customer experience and gain competitive advantage. Even in South Africa, research shows AI pilots and experimentation are now prolific across local companies, with businesses showing a willingness to embrace AI and experiment using new technology.

Data, whether at the edge or in the core data centre, is the raw material required to derive insights and take action. Data management at the edge has requirements similar to the data centre, including protection and performance. However, edge locations also have unique challenges for simplicity, security and data mobility. Edge data management solutions must integrate into standard edge networks while protecting against the increased potential for security attacks present at the edge. And many edge data locations are not managed, so edge data management must be simple, efficient and optimised to move data from the edge to the core or cloud for end-to-end control.

Deploying effective edge AI requires complete infrastructure solutions. Lenovo enables its customers’ edge AI deployments with a portfolio of edge-optimised, AI-ready servers and storage that work together to unlock the value of edge applications.

Cybersecurity enhancements to protect against ransomware

Security and performance are top considerations when deploying edge storage solutions[4]. By 2025, at least 75% of IT organisations will face one or more attacks[5]. And edge locations can be particularly vulnerable since they lack many of the defences found in traditional data centres. Businesses should be seeking capabilities to detect and remediate ransomware, such as immutable read-only snapshot copies which can be locked via WORM technology – a capability by which information, once written, cannot be modified, so that attackers cannot change or delete the snapshots.

These features typically use machine learning to understand workload patterns and behaviour on the NAS volumes. If unusual activity is detected, the software should take an immediate snapshot to provide a restore point and generate an alert to the administrators so that they can examine the activity and determine whether it’s an attack or a false positive. All this must be done without disrupting normal operation and significantly improves cybersecurity capabilities. Even better, it’s a nondisruptive software-only upgrade.

Accelerated data access to speed application performance

Companies are looking to edge AI solutions for real-time insights, requiring high-speed performance. Lenovo is talking about solutions that support NVMe over TCP, which operates over ubiquitous Ethernet networks. NVMe/TCP provides application acceleration over any Ethernet network, using existing Ethernet switches, cabling and adapters, so that no infrastructure upgrades are required – making it an ideal upgrade for existing edge Ethernet networks to enable high-performance AI applications. Again, this new application acceleration capability comes as a nondisruptive software-only upgrade.

Data protection for edge object workloads

Invest in true unified storage, which supports block, file and object workloads. Integrated S3 object storage capabilities are particularly well-suited for edge AI applications, many of which rely on unstructured object data such as video, voice, etc. Support for replication of object storage provides customers with a familiar interface for fast, efficient backups of object storage to a supported target. This can be used in several ways, including backup for applications and workloads, business continuity applications with site failover or edge-to-core object replication.

Lenovo is helping to 'democratise' AI by bringing AI from the supercomputer to the enterprise and the edge, to organisations of all sizes. We enable edge AI solutions with a complete portfolio of edge-optimised servers, AI-ready all-flash storage and an ecosystem of AI ISV partners, all of which will help customers secure, accelerate and manage their data to unlock the value of edge AI applications.

[1] 'Scaling AI like a tech native: The CEO’s role', McKinsey, October 2021

[2] 'Edge computing solutions powering the fourth industrial revolution', IDC, January 2021

[3] Get ready for data Management at the edge: Key considerations and Actions, Published 24 September 2021 - ID G00725371 - By Ted Friedman

[4] 'Edge computing solutions powering the fourth industrial revolution', IDC, January 2021

[5] 'Detect, protect, recover: How modern backup applications can protect you from ransomware', Gartner, January 2021




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.