Throughout its lifetime, the NuvlaEdge v1 software excelled at supporting businesses and partners in various fields from humanitarian activities to smart cities, open science, earth observation, and much more. With it, we have learned that the high demand for small, portable and low energy edge devices is very often incompatible with the resource-demanding nature of the target applications. But that’s not the only problem with today’s mindset towards Edge Computing.
The NuvlaEdgee v2.0 software tackles today’s edge management limitations with innovative features.
Here are the detailed new key features of the NuvlaEdge v2.0 software:
These features are built on top of an existing Container Orchestration Engine (i.e. Docker Swarm) in the edge device.
It’s not just about new features. All the old good NuvlaEdge v1 software perks are still there… in fact, most of them have been improved.
For a faster and cleaner installation process, the NuvlaEdge v2 software was refactored with some of the old code merged into fewer components, thus optimising its total core size.
Performance was also optimised, making the new NuvlaEdge v2 software the lightest one we have ever created.
The NuvlaEdge v1 ssoftware required your edge device to be running in Docker Swarm mode. Well, that’s not the case anymore for NuvlaEdge v2. All you need is Docker Compose for the installation, and then the NuvlaEdge v2 ssoftware will adapt itself to the underlying host environment, whether that is a standalone Docker machine, or a Swarm cluster node.
What’s not to like? If you want to dive into the details, take a look at our NuvlaEdge documentation. For a demo or more information about how the NuvlaEdge software can transform your activity at the edge, get in touch.
Share this article
16 November 2022
The first ICOS face-to-face meeting took place earlier this month in sunny Vilanova I la Geltru, Catalunya, Spain, uniting more than 20 Consortium ...Read blog
23 August 2022
Thanks to guest author Inna Ushakova for sharing her valuable insights into the state of cyber security in the manufacturing industry. Now more th...Read blog