{"id":6379,"date":"2019-03-26T09:45:52","date_gmt":"2019-03-26T14:45:52","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6379"},"modified":"2019-03-18T12:54:02","modified_gmt":"2019-03-18T17:54:02","slug":"new-horizons-for-mobile-edge-computing-mec-and-iot","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/new-horizons-for-mobile-edge-computing-mec-and-iot\/","title":{"rendered":"New Horizons for Mobile Edge Computing (MEC) and IoT"},"content":{"rendered":"<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture\u2014such as edge computing\u2014to relieve their security and device management burdens.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we\u2019ll be looking at some of the issues and available options.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Edge Computing on the Rise<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Today\u2019s enterprise networks will typically have a dispersed and globalized footprint with mobile and remote workers, various sites, and a diversity of hardware and access points. Rather than a centralized model dependent on a single data warehouse, network management for this new breed of corporate campus must itself adopt a more dispersed management strategy.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><a href=\"https:\/\/www.networkworld.com\/article\/3224893\/what-is-edge-computing-and-how-it-s-changing-the-network.html\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">Edge computing<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\"> allows for this through the setting up of localized management nodes in the vicinity of the group of devices and other network resources that operate in that location. It typically employs distributed, open architecture that features decentralized processing power and allows for the processing of information by individual network devices or local servers.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Having removed the overhead associated with needing to transmit all transactions to a central data center or cloud, edge computing allows for the acceleration of data streams and the real-time processing of information with minimal or near-zero latency. For critical applications such as finance industry transactions, a latency of even milliseconds is unacceptable, and edge computing deployments can ensure data processing rates are fast enough to eliminate this risk.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6384\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained-245x300.jpg\" alt=\"\" width=\"350\" height=\"429\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained-245x300.jpg 245w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained-768x942.jpg 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained-835x1024.jpg 835w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/edge-computing-explained.jpg 1400w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\"><\/a>\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image source: <\/span><a href=\"https:\/\/www.networkworld.com\/article\/3224893\/what-is-edge-computing-and-how-it-s-changing-the-network.html\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">Network World<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">By allowing large amounts of data to be processed near their source, edge computing also reduces internet bandwidth usage.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Mobile Edge Computing (MEC) and IoT<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Now used as a generic term to include almost all edge computing architecture, mobile edge computing (or MEC), supports computational, analytics, and storage capacity at the edge of a network. Its growth has been accelerated due to the increased adoption of Internet of Things or IoT technologies.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">The IoT ecosystem of millions of interconnected and online devices and sensors has generated a need for faster data processing\u2014and the requirement for IoT elements to connect to edge, centralized, and cloud-based data centers. Components may typically be deployed in mission-critical circumstances (e.g., in the healthcare and manufacturing sectors), with an attendant need for low or no-latency data operations.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">MEC applications can typically guarantee a transfer latency of milliseconds or less. They can also provide real-time data analysis, which greatly reduces the amount and frequency of information transfers required to any distant centralized location. Sensitive data can also be confined to local zones and not exposed to the internet, enhancing corporate security.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">As with any IT environment, the devil is in the details. Designing an application or device-specific system for edge computing requires a complex combination of hardware, software, and networking. Early adoption of MEC has been hampered by the cost and complexity of deploying enterprise IoT systems. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Over a dozen standards organizations (including ETSI, OpenFog, EdgeX, and OpenStack StarlingX) are involved with setting up the architecture for mobile edge computing. So MEC architectures have to be designed with flexibility and adaptability to allow for this uncertainty, and for changing business requirements.\u00a0 <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">A number of tools and services are available to assist in MEC deployment, which we shall now discuss.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Kubernetes<\/span><\/h2>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\"> <a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6388\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes-300x193.png\" alt=\"\" width=\"450\" height=\"289\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes-300x193.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes-768x494.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes-1024x659.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/kubernetes.png 1637w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image source: <\/span><a href=\"https:\/\/kubernetes.io\/docs\/concepts\/overview\/what-is-kubernetes\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">Kubernetes.io<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Designed for managing containerized workloads and services, Kubernetes is a portable and extensible open-source platform for the configuration and automation of networked systems. Its name originates from the Greek \u201cKubernetes\u201d\u2014meaning \u201chelmsman\u201d or \u201cpilot\u201d\u2014and is the word from which \u201cgovernor\u201d and \u201ccybernetic\u201d were derived. K8s is an abbreviation commonly used for the platform in the trade literature, which is derived by replacing the 8 letters \u201cubernete\u201d with \u201c8\u201d.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">The Kubernetes project was pioneered at Google, which released it as open source in 2014. It is simultaneously a container platform, a micro-services platform, and a portable cloud platform. The <\/span><a href=\"https:\/\/kubernetes.io\/docs\/concepts\/overview\/what-is-kubernetes\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">Kubernetes management environment<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\"> is based on containers, and it orchestrates computing, networking, and storage infrastructure on behalf of user workloads.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">The Kubernetes control plane is built on the same application programming interfaces (APIs) that are available to developers and users. Users can write their own controllers with their own APIs, which can be targeted by a general-purpose command-line tool. This API functionality has enabled a number of other systems to build on top of the Kubernetes foundation stone, which provides much of the simplicity of Platform as a Service (PaaS). <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">Rancher K3s <\/span><\/h2>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6389\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s-300x146.png\" alt=\"\" width=\"450\" height=\"219\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s-300x146.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s-768x374.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s-1024x499.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/rancher-k3s.png 1249w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image source: <\/span><a href=\"https:\/\/k3s.io\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">K3s.io<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">K3s is an open source project by Rancher Labs, which strips Kubernetes down to the bare essentials for edge computing and other use cases where resources might be constrained. The developer Rancher Labs previously created the Rancher Kubernetes management system and the RancherOS Linux distribution, which is container-based.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">K3s is a play on the Kubernetes abbreviation of K8s, and emphasizes the \u201cbare bones\u201d approach of the new platform, in comparison to its parent suite. Deploying a number of techniques, K3s squeezes a Kubernetes distribution into 512 MB of RAM, using a single 40 MB binary. Rarely used Kubernetes plug-ins are omitted from the installation, and K3s consolidates various functions of a Kubernetes distribution into a single process. <\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Resource-intensive components typically found in the Kubernetes stack are also replaced by less demanding substitutes. For example, instead of a full instance of Docker as the runtime engine for containers, K3s uses Docker\u2019s core container runtime, Containerd. Many of the elements normally included with Docker are thereby eliminated.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/run-k3s.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6392\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/run-k3s-300x150.png\" alt=\"\" width=\"450\" height=\"225\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/run-k3s-300x150.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/run-k3s-768x385.png 768w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/03\/run-k3s.png 926w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-bottom: .0001pt; text-align: center; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">(Image source: <\/span><a href=\"https:\/\/github.com\/rancher\/k3s\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">GitHub<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\">)<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><a href=\"https:\/\/k3s.io\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-family: 'Arial',sans-serif;\">K3s<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-family: 'Arial',sans-serif; color: black;\"> is optimized for the edge computing and standalone device markets. The x86-64, ARM64, and ARMv7 platform architectures are all supported. The project is currently being offered with no official support by Rancher Labs, but the company believes it will begin to offer official support for K3s by the third quarter of 2019.<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">\u00a0<\/span><\/p>\n<p style=\"margin-bottom: .0001pt; line-height: 150%; text-autospace: none;\"><span style=\"font-family: 'Arial',sans-serif; color: black;\">Enterprise users of edge computing for IoT and mobile deployments can use this and other resources to manage their system architecture.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture\u2014such as edge computing\u2014to relieve their security and device management burdens. \u00a0 Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we\u2019ll [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6383,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[405,594,595,28,255,257,247,410,432,450,577,119,34,580,596,578,98,49,241,242,588,584,398,575,199,574,391,188,386,385,430,327,397,579,581,583,261,586,585,576,587,590,589,592,591,582,597,169,593],"class_list":["post-6379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech","tag-api","tag-arm64","tag-armv7","tag-cloud","tag-cloud-computing","tag-cloud-software","tag-cloud-storage","tag-cloud-systems","tag-configuration","tag-container","tag-data-analysis","tag-data-processing","tag-edge-computing","tag-edgex","tag-enterprise-iot","tag-etsi","tag-google","tag-internet","tag-internet-of-things","tag-iot","tag-k3s","tag-kubernetes","tag-linux","tag-mec","tag-mobile","tag-mobile-edge-computing","tag-multi-platform","tag-network","tag-network-admin","tag-network-administration","tag-network-configuration","tag-network-management","tag-open-source","tag-openfog","tag-openstack","tag-openstack-starlingx","tag-paas","tag-platform-as-a-service","tag-portable-cloud","tag-processing","tag-rancher-k3s","tag-rancher-kubernetes","tag-rancher-labs","tag-rancher-linux","tag-rancher-os","tag-starlingx","tag-system-architecture","tag-tech","tag-x86-64"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6379"}],"version-history":[{"count":4,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6379\/revisions"}],"predecessor-version":[{"id":6394,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6379\/revisions\/6394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6383"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}