Open Telekom Cloud for Business Customers

< Back to products and services

Intelligent Edge Fabric (IEF)             Coming soon

Computer on-site easy and secure

Cloud computing is optimized for the centralized processing of data. In many applications scenarios, however, the user still needs computers to perform local tasks, be it for processing image data from cameras or measured values from sensors. In any of these cases, insufficient bandwidth or latency have prevented the cloud from being used effectively.

For these scenarios, the Open Telekom Cloud offers customer a solution with the Intelligent Edge Fabric. IEF combines the computing power and security of the Open Telekom Cloud with the requirements that are placed on on-site processing. With IEF you can optimally combine the advantages of both worlds the cloud with the requirements on site. IEF allows easy management of computers and programs on site, while data is still stored securely in the cloud.

Intelligent Edge Fabric (IEF) Intelligent Edge Fabric (IEF) connects a large number of edge nodes and manages the life cycle of edge applications.

Computer on-site easy and secure

Cloud computing is optimized for the centralized processing of data. In many applications scenarios, however, the user still needs computers to perform local tasks, be it for processing image data from cameras or measured values from sensors. In any of these cases, insufficient bandwidth or latency have prevented the cloud from being used effectively.

For these scenarios, the Open Telekom Cloud offers customer a solution with the Intelligent Edge Fabric. IEF combines the computing power and security of the Open Telekom Cloud with the requirements that are placed on on-site processing. With IEF you can optimally combine the advantages of both worlds the cloud with the requirements on site. IEF allows easy management of computers and programs on site, while data is still stored securely in the cloud.

Intelligent Edge Fabric (IEF) Intelligent Edge Fabric (IEF) connects a large number of edge nodes and manages the life cycle of edge applications.

Edge Computing with the Open Telekom Cloud
 

Artificial Intelligence

Artificial Intelligence

IEF extends AI and big data features, such as video analysis, OCR, image recognition, and big data stream processing, to where it is needed, and provides real-time intelligent edge services.

Multiple Runtime Environments

Multiple Runtime Environments

Applications can be started up or upgraded quickly as IEF is compatible with Kubernetes and Docker ecosystems. IEF also supports function engines such as Python and Node.js to address quick response to events at the edge.

Hardware compatibility

Hardware compatibility

IEF supports a wide variety of hardware architectures such as x86, ARM, NPU and GPU.

Open Compatibility

Open Compatibility

IEF supports heterogeneous hardware access – x86, ARM, NPU, and GPU are all supported. Open source KubeEdge project, the first edge computing project elected into CNCF, has become the standard architecture in the intelligent edge computing domain.

Security and Reliability

Security and Reliability

Edge nodes are securely connected to the cloud, and application data is securely transmitted to the cloud. High availability of edge services ensures reliability of edge applications.

Application Scenarios

Public Safety Monitoring

Edge-side video pre-processing through real-time surveillance can predict incidents, take appropriate actions, monitor the situation, and track the results. Traditional video surveillance systems only store videos without analysing them. In addition, a large amount of data needs to be transmitted for video processing and analysis. However, those traditional systems cannot respond in a timely manner, and therefore they cannot meet the growing security requirements.

With IEF, edge nodes pre-process videos in real time and send processed video data back to the cloud. Analysis services in the cloud, such as Video Analysis Service (VAS) and Machine Learning Service (MLS), use the data to implement face recognition, personnel track management, and event alarm management. In this way, passive monitoring is changed to proactive analysis and prewarning. As a result, in video surveillance scenarios such as campuses, residential areas, shopping malls, and supermarkets, users can predict incidents, take appropriate action, monitor the situation, and track the results.
 

Intelligent Edge Fabric (IEF): Public Safety Monitoring Public Safety Monitoring


Advantages:

  • Flexible Customization
    Through edge-cloud synergy, edge intelligence capabilities can be customized, and intelligent algorithms can be quickly deployed for optimal services.
  • High Efficiency and Intelligence
    Edge-side video pre-processing, combined with intelligent cloud video analysis, accurately and efficiently locates suspicious situations.
  • Centralized Control
    The lifecycle of edge applications can be managed in the cloud, reducing O&M costs.
  • Related Services
    Face, Dis

Visual Product Inspections

Traditional approaches in industrial manufacturing relied on naked eyes to detect product defects. This method was inefficient and often failed to detect flaws and even ejected products without defects from the pool of qualified products, causing losses in revenue and brand image. IEF combines cloud modelling and edge decision-making to achieve automatic visual inspection, moving away from traditional manual visual inspections.
 

Intelligent Edge Fabric (IEF): Visual Product Inspections Visual Product Inspections


Advantages:

  • Optimal Model
    Model training in the cloud, data processing at the edge, and incremental model training optimization achieve optimal model
  • High Efficiency
    Edge-side deployment of visual models trained in the cloud enables real-time product prediction, improving detection efficiency and product quality
  • Unified Control
    IEF delivers models and monitors node status in a unified manner
  • Related Services
    ModelArts

Optical Character Recognition (OCR)

Optical Character Recognition (OCR) scenarios, such as character recognition on invoices and receipts, require high data security and application performance.

To meet the preceding requirements, IEF is used to provide a flexible, scalable, and highly available end-to-end solution. In this solution, the edge and cloud collaborate with each other. To be specific, the cloud has powerful computing capabilities to deliver high application performance. IEF ensures data security by delivering applications to edge nodes. In this way, edge nodes anonymize data and process and store key and privacy data locally. Then, the edge nodes upload the processed images to the cloud for OCR, and the cloud sends recognition results back to the edge nodes.
 

Optical Character Recognition (OCR) Optical Character Recognition (OCR)


Advantages:

  • High Security
    With edge-cloud synergy, data is anonymized at the edge and OCR occurs in the cloud to protect user privacy
  • High Efficiency
    Unified management of edge nodes and applications reduces the application deployment and upgrade time from days to just 30 minutes
  • Unified O&M
    The cloud monitors edge nodes and applications, and manages their logs in a unified manner, which helps you locate faults efficiently
  • Related Services
    OCR

Public Safety Monitoring

Edge-side video pre-processing through real-time surveillance can predict incidents, take appropriate actions, monitor the situation, and track the results. Traditional video surveillance systems only store videos without analysing them. In addition, a large amount of data needs to be transmitted for video processing and analysis. However, those traditional systems cannot respond in a timely manner, and therefore they cannot meet the growing security requirements.

With IEF, edge nodes pre-process videos in real time and send processed video data back to the cloud. Analysis services in the cloud, such as Video Analysis Service (VAS) and Machine Learning Service (MLS), use the data to implement face recognition, personnel track management, and event alarm management. In this way, passive monitoring is changed to proactive analysis and prewarning. As a result, in video surveillance scenarios such as campuses, residential areas, shopping malls, and supermarkets, users can predict incidents, take appropriate action, monitor the situation, and track the results.
 

Intelligent Edge Fabric (IEF): Public Safety Monitoring Public Safety Monitoring


Advantages:

  • Flexible Customization
    Through edge-cloud synergy, edge intelligence capabilities can be customized, and intelligent algorithms can be quickly deployed for optimal services.
  • High Efficiency and Intelligence
    Edge-side video pre-processing, combined with intelligent cloud video analysis, accurately and efficiently locates suspicious situations.
  • Centralized Control
    The lifecycle of edge applications can be managed in the cloud, reducing O&M costs.
  • Related Services
    Face, Dis

Visual Product Inspections

Traditional approaches in industrial manufacturing relied on naked eyes to detect product defects. This method was inefficient and often failed to detect flaws and even ejected products without defects from the pool of qualified products, causing losses in revenue and brand image. IEF combines cloud modelling and edge decision-making to achieve automatic visual inspection, moving away from traditional manual visual inspections.
 

Intelligent Edge Fabric (IEF): Visual Product Inspections Visual Product Inspections


Advantages:

  • Optimal Model
    Model training in the cloud, data processing at the edge, and incremental model training optimization achieve optimal model
  • High Efficiency
    Edge-side deployment of visual models trained in the cloud enables real-time product prediction, improving detection efficiency and product quality
  • Unified Control
    IEF delivers models and monitors node status in a unified manner
  • Related Services
    ModelArts

Optical Character Recognition (OCR)

Optical Character Recognition (OCR) scenarios, such as character recognition on invoices and receipts, require high data security and application performance.

To meet the preceding requirements, IEF is used to provide a flexible, scalable, and highly available end-to-end solution. In this solution, the edge and cloud collaborate with each other. To be specific, the cloud has powerful computing capabilities to deliver high application performance. IEF ensures data security by delivering applications to edge nodes. In this way, edge nodes anonymize data and process and store key and privacy data locally. Then, the edge nodes upload the processed images to the cloud for OCR, and the cloud sends recognition results back to the edge nodes.

Optical Character Recognition (OCR) Optical Character Recognition (OCR)


Advantages:

  • High Security
    With edge-cloud synergy, data is anonymized at the edge and OCR occurs in the cloud to protect user privacy
  • High Efficiency
    Unified management of edge nodes and applications reduces the application deployment and upgrade time from days to just 30 minutes
  • Unified O&M
    The cloud monitors edge nodes and applications, and manages their logs in a unified manner, which helps you locate faults efficiently
  • Related Services
    OCR

Contact us

Please fill in this field correctly.
Please choose an option.
Please fill in this field correctly.
Please fill in this field correctly.
Please fill in this field correctly.
Please enter your e-mail address correctly.
Please enter a valid phone number!
* required fields

Find out more

Book now and claim starting credit of EUR 250* (code: 4UOTC250)
24/7 Service
Take advantage of our consulting services!

Our experts will be happy to help you.

We will answer any questions you have regarding testing, booking and usage – free and tailored to your needs. Try it out today!

Hotline: 24 hours a day, seven days a week 

0800 33 04477 from Germany
+800 33 04 47 70 from abroad

* Voucher can be redeemed until December 31, 2020. Please contact us when using the voucher for booking. The discount is only valid for customers with a billing address in Germany and expires two months after conclusion of the contract. The credit is deducted according to the valid list prices as per the service description. Payment of the credit in cash is excluded.

  • The Open Telekom Cloud Community

    This is where users, developers and product owners meet to help each other, share knowledge and discuss.

    Discover now

  • Telefon

    Free expert hotline

    Our certified cloud experts provide you with personal service free of charge.

    0800 33 04477 (from Germany)

    +800 33 04 47 70 (from abroad)

    24 hours a day, seven days a week

  • E-Mail

    Our customer service is available free of charge via E-Mail

    Write an E-Mail

  • Arrange an appointment

    Our Open Telekom Cloud experts provide you with free, non-binding and idividual support

    Arrange an appointment