Skip to content
avassa logo bigger
  • SolutionExpand
    • SOLUTIONExpand
      • Overview
    • INDUSTRIESExpand
      • Retail
      • Industrial & manufacturing
      • Multi-unit restaurants & QSR
      • 5G & Telco
    • defining-edge-computing

      Defining the edge in edge computing

      Read More Defining the edge in edge computing
      Avassa_Calendar_icon

      BOOK A MEETING

  • PlatformExpand
    • PLATFORMExpand
      • Control tower
      • Edge enforcer
      • Product Demo Tour
    • Documentation
    • defining-edge-computing

      Defining the edge in edge computing

      Read More Defining the edge in edge computing
      Avassa_Calendar_icon

      BOOK A MEETING

  • Why Avassa?Expand
    • WHY AVASSA?Expand
      • Avassa and Kubernetes
      • Which edge
      • The Edge Ecosystem
    • defining-edge-computing

      Defining the edge in edge computing

      Read More Defining the edge in edge computing
      Avassa_Calendar_icon

      BOOK A MEETING

  • ResourcesExpand
    • RESOURCESExpand
      • Articles
      • Webinars
      • Customer testimonials
    • TECH BLOGExpand
      • View all
    • defining-edge-computing

      Defining the edge in edge computing

      Read More Defining the edge in edge computing
      Avassa_Calendar_icon

      BOOK A MEETING

  • CompanyExpand
    • COMPANYExpand
      • Partners
      • Contact us
      • Career
    • NEWSExpand
      • Press releases
      • Feature releases
    • defining-edge-computing

      Defining the edge in edge computing

      Read More Defining the edge in edge computing
      Avassa_Calendar_icon

      BOOK A MEETING

  • Docs
  • Sign in
Request Free Trial
What is edge computing?
avassa logo bigger
Offline capabilities at the edge: 4 common design mistakes and how to overcome them
Articles

Offline capabilities at the edge: 4 common design mistakes and how to overcome them

There are many reasons for running applications at the edge. Some of the ones we hear often includes latency, bandwidth, and security requirements. But another very common reason, that might…

Read More Offline capabilities at the edge: 4 common design mistakes and how to overcome themContinue

Fueling the future: How Edge Computing is shaping the energy industry
Articles

Fueling the future: How Edge Computing is shaping the energy industry

In the past years, organisation within the energy industry have faced intense pressure to cut costs, deal with unpredictable shifts in demand, and enhance their competitiveness by making decisions based…

Read More Fueling the future: How Edge Computing is shaping the energy industryContinue

Digging deeper with edge: How mining companies reap the benefits of edge computing
Articles

Digging deeper with edge: How mining companies reap the benefits of edge computing

The mining industry is undergoing a massive transformation to rethink how all aspects of the lifecycle of a mine is implemented. The mine of the future must be fossil-free, safe…

Read More Digging deeper with edge: How mining companies reap the benefits of edge computingContinue

Edge Computing ā¤ļø Platform Engineering
Articles

Edge Computing ā¤ļø Platform Engineering

As digital transformation continues to disrupt industries across the board, platform engineering has emerged as a crucial set of practices and patterns for IT teams to enable self-service capabilities for…

Read More Edge Computing ā¤ļø Platform EngineeringContinue

How to use label matching for application placement
Articles

How to use label matching for application placement

When you have built an application for the edge, it’s time to deploy it to specific sites and hosts with certain characteristics. This would be tedious if you would have…

Read More How to use label matching for application placementContinue

How to distribute site-specific secrets and configurations
Articles

How to distribute site-specific secrets and configurations

In the Avassa system, an application specification defines the container structure and associated application-specific configuration and secrets. You want to aim for keeping one application specification per application. The reason…

Read More How to distribute site-specific secrets and configurationsContinue

CI/CD tools and Avassa: how to build a successful integration
Articles

CI/CD tools and Avassa: how to build a successful integration

All our customers have already invested in CI/CD for their cloud applications and we aim to be a very good citizen in those environments. This article describes in detail what…

Read More CI/CD tools and Avassa: how to build a successful integrationContinue

The extremely short story of how I converted a k8s application to Avassa
Articles

The extremely short story of how I converted a k8s application to Avassa

Converting an application from Kubernetes to Avassa might sound like it has the potential of being a time-consuming maneuver. So when one of our customers asked if it would be…

Read More The extremely short story of how I converted a k8s application to AvassaContinue

Request Free Trial

+46-734 02 16 81
info@avassa.io

Solution
Retail
Industrial & manufacturing
Multi-unit restaurants & QSR
5G & Telco
Platform
Control tower
Edge enforcer
Product Demo Tour
Why Avassa?
Avassa and Kubernetes
Which edge
The Edge Ecosystem
Resources
Articles
Case Studies
Whitepapers
Webinars
Tech Blog
Company
About us
Career
News
More
Docs
Login

Avassa Systems AB
Visiting address:
Torsgatan 26
113 21 Stockholm
Sweden

© 2023 Avassa Systems AB. All right reserved

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Scroll to top
  • Solution
    • Solution overview
    • Retail
    • Industrial & manufacturing
    • Multi-unit restaurants & QSR
    • 5G & Telco
  • Platform
    • Platform
    • Control Tower
    • Edge Enforcer
    • Product Demo Tour
    • Documentation
  • Why Avassa?
    • Why Avassa?
    • Avassa and Kubernetes at the edge
    • The Edge Ecosystem
  • Resources
    • Resources
    • Articles
    • Webinars
    • Customer Testimonials
    • Tech blog
  • Company
    • About us
    • Partners
    • Contact us
    • Career
  • News
    • ALL NEWS
    • Press Releases
    • Feature Releases
  • Docs
  • Sign in