Non-marginal authors of the Deep current Alliance
Day 100, 000 plus true incense, a seal of tears thousands of lines.
In addition to "give the crowd", your writing has more possibilities. Just like February 28, 2019, the Tigers sniffed the reorganization of the deep-flow alliance, as a small organization member who did not use the "brush screen" as the original intention of writing.
Offline closed discussions are an important benefit for members of the Deep Stream Alliance, but the first issue of March 8 is not only open-ended, but even more important. Let's take a peek at each other's "truth"-Deep-flow er has exchanged information with each other, and has talked about topics. It is not only an opponent with different views, but also an old friend seeking common ground while reserving differences. But behind the familiar ID and the original flowers, what kind of people do they really look like?
The interesting soul, of course, only the good-looking skin is worthy.
It is true that there is a beautiful little sister.
Naturally, there is also a small brother with a distinct personality.
In this large-scale netizen's face-based scene, in addition to eating, drinking and lamenting the "what is your long way", the tiger sniffs of course also prepared some valuable dry goods, so that the authors who came to the traffic jam time are worthwhile. .
The theme of the first Deep flow Alliance gathering is what the industry has been talking about recently-Edge Computing (Edge computing).
Tiger Sniff specially invited Yang Jingyu, the head of Alibaba Cloud Edge Computing Technology, to do a small sharing of edge computing.
The recent surge in the concept of "edge computing" has allowed more and more people in stocks, the media, the government and businesses to discuss this unfamiliar term.
As an important derivative application of the 5G era, edge computing has become another important town.
Tech media writers who keep an eye on the development of emerging technologies will certainly not miss this important topic. In this ultra-high saturation of information for an hour and a half, no one leaves the field, the authors stare or ponder, and bow their heads to take notes.
In the beginning of the introductory edge calculation, for the application of the edge calculation, the technical problems facing the future, the audience is unceremoniously asking sharp questions.
Some people even go to the stage to directly confront each other, so that the truth becomes more and more clear.
"Reading" sharing on edge computing
The amount of on-site information is too large to be reviewed. If you want to participate in the on-site seminars, you won't be able to look at the activity records of this half-hanger. Please also ask the authors to work hard and readers to write more.
After the discussion session of this issue, the members of the deep-flow alliance and the tiger sniffers who participated in the conference also wrote a "read-after-sense homework" sharing on edge computing:
Deep League Alliance Member @评论尸
With the rise of Internet of things, edge computing has become a hot topic. However, few people based on the principle of edge computing, its application scenario, business model, landing difficulties in an activity in a clear, so it is difficult to give a very three-dimensional story in the media writing.
One point given in this event, for example, is that it is rare in the media-in edge computing, what the cloud is and why the tangential position of the end appears to be a "technical problem." But behind the scenes is a business game between cloud service providers, telecommunications operators and business solution providers.
Tiger smell author @ Li Zhiyong
Every adjustment to the infrastructure will have an impact on business patterns, such as the free back-end cash-in-the-Internet model in front-end, the pay-on-demand model in cloud platforms, and so on.
AIoT is accompanied by the rise of edge computing, whether it will make cloud platforms more powerful and complex, or whether each enterprise will have to become a business with its own cloud, which we do not know for the time being. But it is time to pay attention to it.
Tiger sniffing author @宁宇
It is inevitable that edge computing becomes a hot spot.
Initially, cloud computing was deployed in a centralized manner, but from the development point of view, centralized transmission costs are high, response time is long, and economic and performance requirements drive cloud computing from centralization to distribution. Edge computing is the trend of the next evolution of cloud computing technology. Centralized platform control and distributed computing / storage are combined to reasonably allocate computing, storage, connectivity, and other functions. More than a simple centralized platform can meet the needs of cloud computing scenarios.
Edge computing has become a hot spot at this time, and it has its contingency.
5G, the digital transformation of the real economy, the rise of industrial Internet, the desire of traditional enterprises to seek upgrading is very strong, forming a huge market space. With the personal Internet dividend running out, the industry enterprise market has become a new hot spot, so edge computing is optimistic, and the enterprise valuation of the concept of edge computing is rising upside-down.
Ali's experts just divided the players in the edge calculation into four categories. In my opinion, these four types of enterprises each have their own advantages, and they charge the edge calculation from different angles.
First is the cloud computing vendor, this aspect advantage from needless to say, based on the centralized cloud computing platform, some connectivity, storage, computing resources are deployed at the far end, forming edge computing nodes. These edge computing nodes and centralized cloud computing platforms form a complete, resource-reasonably allocated IT infrastructure.
The second is to do CDN vendors, they are doing centralized + distributed business, but the previous business is communication connection and content storage and forwarding, and now expand the scope of business to the computing field, it is logical to say that they take the lead.
The third type of players are telecom operators, and the physical resources distributed throughout the country, including the computer room, transmission, and servers, are the foundations of the years. Previously, in the face of centralized control of the Internet, these territorial assets were cost and burden; if they developed edge computing, these became treasures. After losing the opportunity in the mobile Internet and cloud computing era, telecom operators have been looking for opportunities to turn over, and edge computing has become a fighter that must not be missed.
The fourth type of players are chip makers and device manufacturers. These companies believe that the ultimate presentation of edge computing should be a software and hardware integration solution. In other words, the dedicated integrated system is highly efficient and more in line with the trend of edge computing technology. Therefore, based on their own research and development capabilities and in-depth understanding of the industry, these enterprises regard edge computing as the next main battlefield of hardware devices.
Edge computing is about to show a rapid development, which is the consensus of the industry; however, so many genres and forces will eventually win, and now there is no way to give clues.
Deep-flow alliance member @The sun rises as usual
At the first session of the Tiger Sniff Deep Alliance, a number of personal opinions that were not yet mature were formed and shared as follows:
1. With the continuous improvement of network transmission speed and computing speed, the human society has changed from the traditional industrial era to the information age, and this process is still continuing. Edge computing is one of the technical directions.
2. The premise that any technology can be applied on a large scale needs to be based on cost-benefit considerations. Only when the specific information technology can effectively reduce the cost of the application of information technology and bring sufficient benefits to it, this technology will have the practical need of popularization.
The consideration that the app can pay for the technology, in turn, determines the level of commercial revenue from the technology. At present, the different understanding of the implementation of edge computing permeates the different interests of the participants from the basic operators, network equipment providers, software service providers (including Internet platform enterprises), is it competing or merging? It will be up to the final buyer to decide. This process may still be a long time.
3. The technology of edge computing is not aimed at the "industrial Internet." in 2018, after a profound reflection on the development model of Internet platform enterprises in China, from the perspective of Internet enterprises, "Consumer Internet" and "Industrial Internet" as opposed to the concept of "Internet", and from "2C" to "2B" such as the "Internet" discussion of the emergence of "consumer Internet" and "industrial Internet" such as the concept of "Internet".
From the use of the above concepts, it can be seen that domestic Internet platform enterprises have always faced bottlenecks and upper limits in their consumer-oriented business models, and hope to further expand into the industrial field and find new growth points. At the same time, I hope to get the centralization status which was obtained in the 2C era in this process. Edge computing is combined with the Industrial Internet at this time, and hopes are placed on it.
4. The dichotomy of "consumer Internet" and "industrial Internet" is the perspective of Internet platform enterprises, and I do not personally agree with such a distinction. The influence of information technology on manufacturing and other industries is earlier than that on individual consumers. The service to the so-called "industry" has always existed. The enterprise information technology service history of IBM,Oracle,Microsoft,SAP and other industry giants has been for decades.
These global information technology service giants have been able to grow fast and continuously because their customers include large, medium-sized, small and medium-sized enterprises in various industries, with a large revenue base among them. As long as information technology can save a small proportion of its operating costs, the economic value will be very obvious, and these enterprises can also pay for the high cost of information technology services.
In other words, the individual purchasing power of enterprise-level information technology application parties (large or super-large enterprises) is very strong, and it is not as weak as individual consumers, but mainly reflected in the effect of network aggregation.
5. The development of China's enterprise-level information technology services is subject to at least two factors:
First, whether more productive industries with manufacturing at the core can take a firm foothold in the field of high value added and gain more share of the international market, and that is the only way to do so. The level of spending on IT services in these enterprises is likely to increase significantly. In short, only traditional industries can earn more money and earn higher profits, and it is only possible to spend more money on buying IT services. To further improve efficiency.
Second, for low-end and mid-range manufacturing enterprises that are highly dependent on the development of Internet platforms, are Internet platform companies willing to reduce the proportion of platform fees for these enterprises (these costs are not fundamentally different from traditional commercial rents), and more emphasis is placed on protecting high-quality enterprises. The intellectual property rights, and then turned to more to provide information technology services to these enterprises to enhance their efficiency, thus achieving a true win-win situation, which will involve the decision of the Internet platform enterprises on the future development model.
Where there is knowledge, there are people who pursue it-each issue of the Deep Stream Alliance will hold an offline closed seminar in Beijing, East China, and South China, where tiger sniff invites top participants on related topics. Open only to members of the Deep Stream Alliance and invited authors.
Who said that the world is full of feasts, you see the tiger's sniffing text feast, clearly and lively.
A list of the official members of the first "Deep Flow Alliance":
Individual: Mersor, 10 points on the island, comment on the corpse, Raistlin, the sun rises as usual, worm II, Shen Shuaibo, Huang Zhijie, Yu Wei
Organization: Sanli River, Dinner Boss, Economic Watch, ideal, Gun manuscript, Quantum bit, Neuroreality, Fruit Shell, Sea Jump compound, Gronghui (Hong Kong share thing), Machine Heart
* all pictures of this article were taken by tiger sniff
In front of the future, you and I are still children, do not download tiger sniff App sniff innovation!