Whitepaper: The New Clouds on the Block
نویسندگان
چکیده
We believe that the availability of capable devices at the edge is providing a unique but mostly overlooked opportunity to overcome the traditional cloud computing limitations without the cost of deploying local clouds (cloudlets). We back up this assertion with the four observations. First, while the gap remains between truly mobile devices (handhelds, wearable) and high capacity servers, mobile devices have grown increasingly powerful, especially when laptops are included. Second, the devices at the edge are mostly idle or underutilized and can be clustered together to provide significant compute resource. Third, in many scenarios the aggregate capacities of these idle devices exceed the capabilities of the deployed cloudlet servers. Finally, efficiently utilizing the available devices at the edge as compute resources to assist neighboring devices have a natural scaling property not enjoyed by a cloudlet, which must be provisioned ahead of time. We include in our vision of “new clouds on the block” those that comprise handheld and laptop user devices as well as the increasing number of capable Internet of Things (IoT) devices that are found in homes and industrial settings and will see future application in Smart City civic initiatives. We see these clouds as present in homes; public spaces such as public transportation, libraries and parks; and commercial spaces such as coffee shops. To truly leverage the devices at the edge and introduce them as a significant part in the computing ecosystem, We believe further questions need to be addressed including (1) How to provide a stable interface with these clouds, overcome their dynamic nature, and provide their users with performance guarantees? (2) How to efficiently discover and utilize the available resources in devices without affecting their main user experiences or disrupting their main functionalities? (3) How to provide users with proper incentive to share their resources? (4) How mobile device clouds fit in the cloud computing ecosystem and how can they interact with one another and with data center clouds?
منابع مشابه
Let’s Take it to the Clouds: The Potential of Educational Innovations, Including Blended Learning, for Capacity Building in Developing Countries
In modern decentralised health systems, district and local managers are increasingly responsible for financing, managing, and delivering healthcare. However, their lack of adequate skills and competencies are a critical barrier to improved performance of health systems. Given the financial and human resource, constraints of relying on traditional face-to-face training to upskill a large and dis...
متن کاملEffects of Structure and Partially Localization of the π Electron Clouds of Single-Walled Carbon Nanotubes on the Cation-π Interactions
A C102H30 graphene sheet has been rolled up to construct Single-Walled Carbon NanoTube Fragments (SWCNTFs) as parts of armchair carbon nanotubes by computational quantum chemistry methods. Non-covalent cation-π interactions of the Na+ cation on the central rings of SWCNTFs have investigated. The binding energies of the Na+-SWCNTF complexes versus ...
متن کامل3D Detection of Power-Transmission Lines in Point Clouds Using Random Forest Method
Inspection of power transmission lines using classic experts based methods suffers from disadvantages such as highel level of time and money consumption. Advent of UAVs and their application in aerial data gathering help to decrease the time and cost promenantly. The purpose of this research is to present an efficient automated method for inspection of power transmission lines based on point c...
متن کاملThe Effect of Using Word Clouds on EFL Students’ Long- Term Vocabulary Retention
Vocabulary is an important component in all four skills of language. Issue of vocabulary retention has great importance to EFL teachers in instructional contexts because they always ...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کامل