SlideShare a Scribd company logo
Data Decentralisation
Efficiency, Privacy and Fair Monetisation
Angelo Corsaro, PhD


Chief Technology Officer


ADLINK Technologies Inc.
The Cloud or The Internet?
Cloud computing had made it easy to
provide a large class of “Internet Services”,
yet we should not confuse a speci
fi
c
architectural style with the service itself


This essential difference is important as the
value is provided by the Service not by the
underpinning architecture (i.e. the cloud).
Example:


Cloud Storage is just a way of implementing an “Internet
Storage Service”
Cloud Computing Challenges
The privacy abuses revealed by
Snowden have been heavily
covered by the press


What is not so much known, is
that today the vast majority of
servers powering clouds suffer
from MDS and are as a
consequence inherently insecure.
[Security and Privacy]
Cloud Computing Challenges
As a consequence of centralisation Cloud vendors
have the lion share on data monetisation
opportunities.


This leads to an extremely biased market in which a
few control too much


If individuals have full ownership and control over
their digital footprint they have higher chance to
monetise it — if desired.
[Monetisation]
Example:


Your browsing history, your electrical consumption, your
running data, etc., is (often) owned, controlled and
monetised by third parties.
Cloud Computing Challenges
Cloud computing poses major
energetic challenges not simply
because of data-center but more
importantly for the traf
fi
c it generates.
All data gets in and out of a remote
data center — that consumes energy
[Energy Consumption]
The Austerity Dilemma
Whilst there there a growing
community advocating data austerity,
the solution is not simply is being
conscious on our use of precious
resources — such energie — but we
need to realise that the current
architectures, infrastructures and
technologies where not designed for
addressing the data age
The solution relies combining innovation to improve the
ef
fi
ciency of data distribution technologies with the
sensibilisation of European on the value of parsimony
[Energy Consumption]
Challenges Cloud Computing in Europe
© H-CLOUD Consortium 2020-2022 Page 8 of 93
processing, ensuring, for example, compliance with GDPR, is a central element to enable data
spaces as envisioned in EUSD.
Key challenges for edge computing:
S-E Challenge 1: Concern about stranded edge investments. Investing in the wrong
emerging technology is a risk. The supply side should facilitate edge adoption and deployment
by mitigating the risk of lock-in.
H-CLOUD analysis highlights that this challenge should be supported by: strategies helping edge
technology maturation and skills development (S-E Recommendation 2), creation of an
ecosystem of interoperable and/or federated public edge infrastructure offering (S-E
Recommendation 3), investing on automation and openness edge solutions (S-E
Recommendation 4), and promoting development of common edge standards across the
different industries (S-E Recommendation 5).
S-E Challenge 2: Edge is complex and expensive for SMEs. Help smaller organisations to
improve their readiness and maturity, and reduce the complexity of edge computing adoption,
while making it affordable.
This challenge should be supported by strategies helping edge technology maturation and skills
development (S-E Recommendation 2) and investing on automation and openness of edge
solutions (S-E Recommendation 4).
S-E Challenge 3: Uncertain return on edge investments. Facilitate the widespread use of
edge technology, so it reaches critical mass as a public edge capability.
This could create an opportunity for Tier 2 providers, notably those associated with mobile
networks, to take a more prominent role in edge infrastructure build out, leveraging their existing
footprint of distributed facilities. Research and Innovation initiatives should investigate solutions,
for example leveraging federation and multi-edge approaches, to allow the creation of
widespread edge infrastructure across different providers (S-E Recommendation 3).
S-E Challenge 4: Ensure scalability and affordability of edge computing solutions and
deployments to cope with the demands of the foreseen usage scenarios, also by small players.
Research should continue to explore automation of cloud continuum from infrastructure layer up
to the final application, taking into account different scenario-specific demands and contributing
to open source initiatives (S-E Recommendation 4).
S-E Challenge 5: Concerns about edge interoperability. Edge computing research and
innovation solutions are coming from the telecommunications sector as well as multiple Industry
4.0 initiatives, but their approaches are diverging. This will create interoperability issues and
increase the complexity of adoption and management.
The analysis highlights the relevance of promoting development of common edge standards
across the different industries and sustaining them by including them as requirements in public
tenders (S-E Recommendation 5).
S-E Challenge 6: Limited investment on trusted data access solutions for the edge. As of
today, most of the solutions available for trusted access to data rely on specific hardware facilities
- software based solutions are still lacking. This limits a lot the flexibility and potential adoption
of public edge infrastructure offering where guarantees about trusted access to data are
required.
Research should explore open reference solutions for trusted computing at the edge supporting
multi tenants in isolation and compatible with the different EU privacy and security regulations
(S-E Recommendation 6).
Back to Distributed Systems
Cloud architectures have introduced a major element
of centralisation and have promoted an ecosystem of
technologies that
fi
ts and supports this model


The only way to overcome the limitations posed by this
model is to innovate by providing distributed
internet services to power the Digital Society.


We can’t continue relying and promoting architectural
styles and technologies that make data travel around
half globe when the source and the interested party
are in close proximity. Neither we continue promoting
technologies that have inherently security and privacy
implications and far from optimal energy use
Technology Stack
We have established the
Edge Native Working
Group in Eclipse to incubate
technologies to address the
aforementioned problems


Two key projects in this
context are zenoh which
implements a data plane for
the edge and fogOS which
de
fi
nes the control and
management plane
[Open Infrastructure]
Going Forward, Going Distributed
The way for Europe to innovate
and disrupt the market is not to
try to compete with the GAFAM,
but to make them obsolete

For EU economic interest, digital
sovereignty and sustainability
we should Go Distributed
References
• https://mdsattacks.com


• https://zombieloadattack.com


• https://theshiftproject.org/


• https://www.aceee.org/
fi
les/proceedings/2012/data/papers/0193-000409.pdf


• https://fortune.com/2019/09/18/internet-cloud-server-data-center-energy-
consumption-renewable-coal/


• https://edgenative.eclipse.org


• http://zenoh.io


• http://fog05.io

More Related Content

PDF
Vortex II -- The Industrial IoT Connectivity Standard
Angelo Corsaro
 
PDF
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Angelo Corsaro
 
PDF
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
PDF
Smart, Secure and Efficient Data Sharing in IoT
Angelo Corsaro
 
PDF
Data Sharing in Extremely Resource Constrained Envionrments
Angelo Corsaro
 
PDF
The Data Distribution Service
Angelo Corsaro
 
PDF
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 
PDF
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Angelo Corsaro
 
Vortex II -- The Industrial IoT Connectivity Standard
Angelo Corsaro
 
Breaking the Edge -- A Journey Through Cloud, Edge and Fog Computing
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
Smart, Secure and Efficient Data Sharing in IoT
Angelo Corsaro
 
Data Sharing in Extremely Resource Constrained Envionrments
Angelo Corsaro
 
The Data Distribution Service
Angelo Corsaro
 
Cyclone DDS: Sharing Data in the IoT Age
Angelo Corsaro
 
Building IoT Applications with Vortex and the Intel Edison Starter Kit
Angelo Corsaro
 

What's hot (20)

PDF
Micro services Architecture with Vortex -- Part I
Angelo Corsaro
 
PDF
DDS in Action -- Part I
Angelo Corsaro
 
PDF
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
PDF
The Data Distribution Service: The Communication Middleware Fabric for Scala...
Angelo Corsaro
 
PDF
The Data Distribution Service Tutorial
Angelo Corsaro
 
PDF
zenoh: The Edge Data Fabric
Angelo Corsaro
 
PDF
Fluid IoT Architectures
Angelo Corsaro
 
PDF
DDS Everywhere
Angelo Corsaro
 
PDF
Fog Computing Defined
Angelo Corsaro
 
PDF
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Angelo Corsaro
 
PDF
Distributed Algorithms with DDS
Angelo Corsaro
 
PDF
fog05: The Fog Computing Platform
Angelo Corsaro
 
PDF
Vortex Tutorial -- Part I
Angelo Corsaro
 
PDF
IoT Protocols Integration with Vortex Gateway
Angelo Corsaro
 
PDF
Vortex 2.0 -- The Industrial Internet of Things Platform
Angelo Corsaro
 
PDF
DDS and OPC UA Explained
Angelo Corsaro
 
PDF
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
PDF
High Performance Distributed Computing with DDS and Scala
Angelo Corsaro
 
PDF
Reactive Data Centric Architectures with DDS
Angelo Corsaro
 
PDF
The Data Distribution Service Tutorial
Angelo Corsaro
 
Micro services Architecture with Vortex -- Part I
Angelo Corsaro
 
DDS in Action -- Part I
Angelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
Angelo Corsaro
 
The Data Distribution Service: The Communication Middleware Fabric for Scala...
Angelo Corsaro
 
The Data Distribution Service Tutorial
Angelo Corsaro
 
zenoh: The Edge Data Fabric
Angelo Corsaro
 
Fluid IoT Architectures
Angelo Corsaro
 
DDS Everywhere
Angelo Corsaro
 
Fog Computing Defined
Angelo Corsaro
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Angelo Corsaro
 
Distributed Algorithms with DDS
Angelo Corsaro
 
fog05: The Fog Computing Platform
Angelo Corsaro
 
Vortex Tutorial -- Part I
Angelo Corsaro
 
IoT Protocols Integration with Vortex Gateway
Angelo Corsaro
 
Vortex 2.0 -- The Industrial Internet of Things Platform
Angelo Corsaro
 
DDS and OPC UA Explained
Angelo Corsaro
 
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
High Performance Distributed Computing with DDS and Scala
Angelo Corsaro
 
Reactive Data Centric Architectures with DDS
Angelo Corsaro
 
The Data Distribution Service Tutorial
Angelo Corsaro
 
Ad

Similar to Data Decentralisation: Efficiency, Privacy and Fair Monetisation (20)

DOCX
Edge Computing.docx
SVITSEEERK
 
PDF
Edge Computing.pdf
RemoMarconzini1
 
PDF
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
PPTX
nmawdawjndjnejenjgnujnuenfgunennfnn.pptx
miftahulcse202002040
 
PDF
What Is Edge Computing? Everything You Need to Know
Digital Carbon
 
PDF
Tutorial 4 francisco garcia moran
egovernment
 
PDF
Nancy Pascall digital_trends_11
Hellenic Professionals Informatics Society
 
PPTX
Edge computing parth vaghasiya edge computing.pptx
yagniksojitra241
 
PDF
The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and ...
negriihabobi
 
PDF
Edge Computing: NTT Offerings in Japan and Use Cases by Katsuhiro Ohki, NTT L...
MyNOG
 
PPTX
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Deepak Shankar
 
PDF
Future Connected Technologies Growing Convergence And Security Implications M...
ekufulshibad
 
PDF
8. 9590 1-pb
IAESIJEECS
 
PPTX
Edge Comp.pptx
NileshNagrale1
 
PPTX
Edge Comp.pptx
drth5
 
PPTX
Edge comp
mahendra665237
 
PPTX
A theory on basics of edge computing notes
RajeshYadav710264
 
PPT
The European Cloud Computing Strategy
Carl-Christian Buhr
 
PPTX
The Distributed & Decentralized Cloud
Margaret Dawson
 
PPTX
EDGE SEMINAR.pptx
SachuS16
 
Edge Computing.docx
SVITSEEERK
 
Edge Computing.pdf
RemoMarconzini1
 
5G Edge Computing Whitepaper, FCC Advisory Council
DESMOND YUEN
 
nmawdawjndjnejenjgnujnuenfgunennfnn.pptx
miftahulcse202002040
 
What Is Edge Computing? Everything You Need to Know
Digital Carbon
 
Tutorial 4 francisco garcia moran
egovernment
 
Nancy Pascall digital_trends_11
Hellenic Professionals Informatics Society
 
Edge computing parth vaghasiya edge computing.pptx
yagniksojitra241
 
The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and ...
negriihabobi
 
Edge Computing: NTT Offerings in Japan and Use Cases by Katsuhiro Ohki, NTT L...
MyNOG
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Deepak Shankar
 
Future Connected Technologies Growing Convergence And Security Implications M...
ekufulshibad
 
8. 9590 1-pb
IAESIJEECS
 
Edge Comp.pptx
NileshNagrale1
 
Edge Comp.pptx
drth5
 
Edge comp
mahendra665237
 
A theory on basics of edge computing notes
RajeshYadav710264
 
The European Cloud Computing Strategy
Carl-Christian Buhr
 
The Distributed & Decentralized Cloud
Margaret Dawson
 
EDGE SEMINAR.pptx
SachuS16
 
Ad

More from Angelo Corsaro (15)

PDF
Zenoh: The Genesis
Angelo Corsaro
 
PDF
Zenoh Tutorial
Angelo Corsaro
 
PDF
zenoh: zero overhead pub/sub store/query compute
Angelo Corsaro
 
PDF
Eastern Sicily
Angelo Corsaro
 
PDF
fog05: The Fog Computing Infrastructure
Angelo Corsaro
 
PDF
Programming in Scala - Lecture Four
Angelo Corsaro
 
PDF
Programming in Scala - Lecture Three
Angelo Corsaro
 
PDF
Programming in Scala - Lecture Two
Angelo Corsaro
 
PDF
Programming in Scala - Lecture One
Angelo Corsaro
 
PDF
The DDS Security Standard
Angelo Corsaro
 
PDF
RUSTing -- Partially Ordered Rust Programming Ruminations
Angelo Corsaro
 
PDF
DDS In Action Part II
Angelo Corsaro
 
PDF
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Angelo Corsaro
 
PDF
Microservices Architecture with Vortex — Part II
Angelo Corsaro
 
PDF
Happy 2016!
Angelo Corsaro
 
Zenoh: The Genesis
Angelo Corsaro
 
Zenoh Tutorial
Angelo Corsaro
 
zenoh: zero overhead pub/sub store/query compute
Angelo Corsaro
 
Eastern Sicily
Angelo Corsaro
 
fog05: The Fog Computing Infrastructure
Angelo Corsaro
 
Programming in Scala - Lecture Four
Angelo Corsaro
 
Programming in Scala - Lecture Three
Angelo Corsaro
 
Programming in Scala - Lecture Two
Angelo Corsaro
 
Programming in Scala - Lecture One
Angelo Corsaro
 
The DDS Security Standard
Angelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
Angelo Corsaro
 
DDS In Action Part II
Angelo Corsaro
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
Angelo Corsaro
 
Microservices Architecture with Vortex — Part II
Angelo Corsaro
 
Happy 2016!
Angelo Corsaro
 

Recently uploaded (20)

PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Doc9.....................................
SofiaCollazos
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
The Future of Artificial Intelligence (AI)
Mukul
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 

Data Decentralisation: Efficiency, Privacy and Fair Monetisation

  • 1. Data Decentralisation Efficiency, Privacy and Fair Monetisation Angelo Corsaro, PhD Chief Technology Officer ADLINK Technologies Inc.
  • 2. The Cloud or The Internet? Cloud computing had made it easy to provide a large class of “Internet Services”, yet we should not confuse a speci fi c architectural style with the service itself This essential difference is important as the value is provided by the Service not by the underpinning architecture (i.e. the cloud). Example: Cloud Storage is just a way of implementing an “Internet Storage Service”
  • 3. Cloud Computing Challenges The privacy abuses revealed by Snowden have been heavily covered by the press What is not so much known, is that today the vast majority of servers powering clouds suffer from MDS and are as a consequence inherently insecure. [Security and Privacy]
  • 4. Cloud Computing Challenges As a consequence of centralisation Cloud vendors have the lion share on data monetisation opportunities. This leads to an extremely biased market in which a few control too much If individuals have full ownership and control over their digital footprint they have higher chance to monetise it — if desired. [Monetisation] Example: Your browsing history, your electrical consumption, your running data, etc., is (often) owned, controlled and monetised by third parties.
  • 5. Cloud Computing Challenges Cloud computing poses major energetic challenges not simply because of data-center but more importantly for the traf fi c it generates. All data gets in and out of a remote data center — that consumes energy [Energy Consumption]
  • 6. The Austerity Dilemma Whilst there there a growing community advocating data austerity, the solution is not simply is being conscious on our use of precious resources — such energie — but we need to realise that the current architectures, infrastructures and technologies where not designed for addressing the data age The solution relies combining innovation to improve the ef fi ciency of data distribution technologies with the sensibilisation of European on the value of parsimony [Energy Consumption]
  • 7. Challenges Cloud Computing in Europe © H-CLOUD Consortium 2020-2022 Page 8 of 93 processing, ensuring, for example, compliance with GDPR, is a central element to enable data spaces as envisioned in EUSD. Key challenges for edge computing: S-E Challenge 1: Concern about stranded edge investments. Investing in the wrong emerging technology is a risk. The supply side should facilitate edge adoption and deployment by mitigating the risk of lock-in. H-CLOUD analysis highlights that this challenge should be supported by: strategies helping edge technology maturation and skills development (S-E Recommendation 2), creation of an ecosystem of interoperable and/or federated public edge infrastructure offering (S-E Recommendation 3), investing on automation and openness edge solutions (S-E Recommendation 4), and promoting development of common edge standards across the different industries (S-E Recommendation 5). S-E Challenge 2: Edge is complex and expensive for SMEs. Help smaller organisations to improve their readiness and maturity, and reduce the complexity of edge computing adoption, while making it affordable. This challenge should be supported by strategies helping edge technology maturation and skills development (S-E Recommendation 2) and investing on automation and openness of edge solutions (S-E Recommendation 4). S-E Challenge 3: Uncertain return on edge investments. Facilitate the widespread use of edge technology, so it reaches critical mass as a public edge capability. This could create an opportunity for Tier 2 providers, notably those associated with mobile networks, to take a more prominent role in edge infrastructure build out, leveraging their existing footprint of distributed facilities. Research and Innovation initiatives should investigate solutions, for example leveraging federation and multi-edge approaches, to allow the creation of widespread edge infrastructure across different providers (S-E Recommendation 3). S-E Challenge 4: Ensure scalability and affordability of edge computing solutions and deployments to cope with the demands of the foreseen usage scenarios, also by small players. Research should continue to explore automation of cloud continuum from infrastructure layer up to the final application, taking into account different scenario-specific demands and contributing to open source initiatives (S-E Recommendation 4). S-E Challenge 5: Concerns about edge interoperability. Edge computing research and innovation solutions are coming from the telecommunications sector as well as multiple Industry 4.0 initiatives, but their approaches are diverging. This will create interoperability issues and increase the complexity of adoption and management. The analysis highlights the relevance of promoting development of common edge standards across the different industries and sustaining them by including them as requirements in public tenders (S-E Recommendation 5). S-E Challenge 6: Limited investment on trusted data access solutions for the edge. As of today, most of the solutions available for trusted access to data rely on specific hardware facilities - software based solutions are still lacking. This limits a lot the flexibility and potential adoption of public edge infrastructure offering where guarantees about trusted access to data are required. Research should explore open reference solutions for trusted computing at the edge supporting multi tenants in isolation and compatible with the different EU privacy and security regulations (S-E Recommendation 6).
  • 8. Back to Distributed Systems Cloud architectures have introduced a major element of centralisation and have promoted an ecosystem of technologies that fi ts and supports this model The only way to overcome the limitations posed by this model is to innovate by providing distributed internet services to power the Digital Society. We can’t continue relying and promoting architectural styles and technologies that make data travel around half globe when the source and the interested party are in close proximity. Neither we continue promoting technologies that have inherently security and privacy implications and far from optimal energy use
  • 9. Technology Stack We have established the Edge Native Working Group in Eclipse to incubate technologies to address the aforementioned problems Two key projects in this context are zenoh which implements a data plane for the edge and fogOS which de fi nes the control and management plane [Open Infrastructure]
  • 10. Going Forward, Going Distributed The way for Europe to innovate and disrupt the market is not to try to compete with the GAFAM, but to make them obsolete For EU economic interest, digital sovereignty and sustainability we should Go Distributed
  • 11. References • https://mdsattacks.com • https://zombieloadattack.com • https://theshiftproject.org/ • https://www.aceee.org/ fi les/proceedings/2012/data/papers/0193-000409.pdf • https://fortune.com/2019/09/18/internet-cloud-server-data-center-energy- consumption-renewable-coal/ • https://edgenative.eclipse.org • http://zenoh.io • http://fog05.io