A Raspberry Pi based IT infrastructure is an order of magnitude less than typical and

A Raspberry Pi based IT infrastructure is an order of magnitude less than typical and

this means that there is plenty of money left in the budget to ensure that the systems are fully cyber secure.


Best of all you are using British ( and Welsh ) technology ...


TAKE A TOUR OF THE SONY FACTORY IN SOUTH WALES WHERE Raspberry Pi are made and also used in the manufacturing process.


Raspberry Pi-based IT infrastructure can be used for a variety of purposes, including:?

  • Prototyping: Raspberry Pis are cost-effective and low-power, making them ideal for prototyping new ideas?
  • Testing: Raspberry Pis can be used to test concepts and experiment with local AI?
  • Automating: Raspberry Pis can be used to automate environments?
  • Disaster relief: Raspberry Pis can be used to create scalable software-defined network infrastructures for disaster relief communication?
  • Cloud computing: Raspberry Pis can be used to build bare metal clouds and cloud servers?

How Raspberry Pis can be used for IT infrastructure

  • Building clusters: Raspberry Pis can be used to build clusters for bare metal clouds?
  • Creating cloud servers: Raspberry Pis can be used to create cloud servers?
  • Building NAS boxes: Raspberry Pis can be used to build NAS boxes?
  • Creating software-defined networks: Raspberry Pis can be used to create software-defined networks for disaster relief communication?

What's needed to build a Raspberry Pi-based IT infrastructure??

  • Raspberry Pi computers
  • A switch with enough ports
  • A router with access to the internet
  • SD cards for each Raspberry Pi
  • USB sticks for each Raspberry Pi
  • A powered USB hub

We work with Rob Knight MBCS - Sustainable IT Champion ?? and here is his RPi based offer ...


Example of a RPi based solution done by one IT Company.


I have added this comment of Ken C. into this article ....


AND…. reduced bloatware and futzware and vendor-spyware/tracking. AND reduced junkware shrinks your attack surface, and reduced count of software on each end user node also reduces the number of machines needing s/w updates on a monthly (weekly?) basis. I have worked in professional offices where even the non-technical workers were using Unix on their desktops for everything. (and NO they were NOT using vi/emacs/vim, etc).It can work.

Tim Strutt

Independent Consultant (Retired - Pro Bono work only)

1 个月

Within certain limitations, they are very capable. I have several pro bono systems for for simple internet browser use by retirees - A 2GB Pi5, microSD card, and a passively cooled case (Flirc) with a repurposed screen, mouse and keyboard. Each one has a users' account and an admin account. They require almost no maintenance other than with the inbuilt tools. The performance of the 2GB Pi is more than adequate for this use and has the advantage of running 4-5C cooler than the 4 and 8GB versions, allowing the use of passive cooling. Just to be on the safe side, I added "temp_limit=60" to "/boot/firmware/config.txt" (Older people, including me, have fragile skin). I've just tried the 16GB Pi - It, too, like the 2GB, runs cool.

回复
Ashley Whittaker

Confident, creative communications professional with experience managing international B2G, B2B and B2C relationships. Unflappable social media and digital content specialist with a penchant for crisis comms.

1 个月

Plenty more success stories if you're interested in reading about how businesses have implemented Raspberry Pi: https://www.raspberrypi.com/success-stories/

Scott Sorel

Strategic Leader | Driving Growth Across Start-Up, Telecommunications, Healthcare, Automotive, and Government Sectors.

1 个月

Thanks for posting, informative!

Rob Knight MBCS - Sustainable IT Champion ??

Design & implements secure Intune/MDM/BYOD, secure smartphones/tablets, lower the carbon footprint of your end user device estates, re-purposing laptops/PC services. Cornwall Ambassador. ??

1 个月

Simon Burgess Samantha Snyder Using Raspberry Pi as Cyber Security tools - another great use case!

Ken C.

? Technical infrastructure engineering, integration, operations, support, analysis & cyber security for datacenters, databases, networks & data. ex-Bloomberg, ex-Reuters, ex-Harvard, ex-NBER. ?? ??

1 个月

AND…. reduced bloatware and futzware and vendor-spyware/tracking. AND reduced junkware shrinks your attack surface, and reduced count of software on each end user node also reduces the number of machines needing s/w updates on a monthly (weekly?) basis. I have worked in professional offices where even the non-technical workers were using Unix on their desktops for everything. (and NO they were NOT using vi/emacs/vim, etc). It can work.

要查看或添加评论,请登录

Chris Windley的更多文章

社区洞察

其他会员也浏览了