This page contains a Flash digital edition of a book.
PUBLICIDADE


The Operating System for the Edge


Building Out the IoT Edge with Ubuntu Core


The Internet of Things (IoT) is driving massive innovation and growth. Yet many continue to assume that feeding raw data from billions of things directly to enterprise data centers or the cloud is a workable model. Cost alone would suggest otherwise. What’s more, network and cloud resources are simply not big or fast enough to collect, process, and act on the immense amounts of data. Latency is too high, and connectivity interruptions can put resiliency at risk.


What’s needed is more intelligence at the edge. Extending intelligence to the things that produce and act on IoT data, edge computing solves the collection, storage, latency and resiliency issues of relying on the cloud. With the right operating system (OS), applications, device intelli- gence and storage, virtually any connected device can be an edge node.


The Right Operating System For a wide range of verticals, Ubuntu Core is an easy-to-use, secure, open source edge OS. Running on intelligent devices like IoT gateways based on Intel®


IoT Gateway Technology, it can unleash IoT application innovation like never before (Figure 1).


User Interface Devices Control and Monitoring


According to the OpenStack Foundation’s latest survey, 55 percent of production clouds today run on Ubuntu. On the edge, hundreds of millions of IoT gateways, on-premise servers, network switches, self- driving cars, smart phones, drones, digital signage players, and robots boot up with it every day. Ubuntu is a top choice for Fortune 500 compa- nies, hardware manufacturers, content providers, software developers, individual technologists, and the maker community.


Ubuntu Core


Ubuntu Core is the smallest, safest Ubuntu ever on devices and the cloud. It features a minimal server image, but shares the same libraries as today’s Ubuntu. This allows you to reuse code and save on development costs.


Ubuntu Core runs each application in isolation with its own dedi- cated data space and restricted capabilities. Application confi nement enables developers to easily and securely add multiple apps and func- tionalities onto a single device, doing more work with fewer devices and future proofi ng these devices. For added security, each applica- tion fi le is only available as a read-only image with signature authentication ensuring that what is running is exactly what developers have published.


Cloud


Data Analytics & Building Automation Software


Tablet, Smart Watch, etc.


Intel® IoT Gateway Technology Wi-Fi


Ethernet


RFID Tag


Video Camera


HVAC Control


Energy Meter


RFID Wi-Fi Wi-Fi Router


Smoke Sensor


Light Light Sensor


Temp/Humid Sensor


F igure 1. Running on intelligent devices like IoT gateways based on Intel® IoT Gateway


Technology, Ubuntu can unleash IoT application innovation in building automation and many other IoT applications.


Developers can easily create snaps thanks to Snapcraft, the tool that assembles code from different sources in a package


Ubuntu Core solves these issues with “snaps,” the Linux universal application packaging format. A minimal setup requires a set of three snaps: kernel, gadget, and OS. All application software sits on top of this base system as individual snaps (Figure 2). Each snap is a self-contained, protected, and isolated piece of code that performs a well-defi ned set of functions.


3G/4G Ethernet


Module ZigBee* RFID


The Right Applications Applications are the fabric of the IoT revolution. Just as apps turned mobile phones into versatile computers, Ubuntu Core enables apps on any type of intelligent device. Imagine apps on a home gateway, top-of-rack switch, industrial gateway, drone, car, or robot. Suddenly, imagination becomes the lim- iting factor, not technology.


In the past, developers had to build a different version of a software application for every version of Linux – especially across the embedded world. All these different versions made it diffi cult to maintain an application over time. Many systems never received updates, creating security issues and support nightmares.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72