The Zen V15 embedded database is designed to address the demanding needs of today’s on-premise, cloud, mobile, and IoT application developers by providing persistent local and distributed data across intelligent applications deployed in enterprise, branch, and remote field environments. The Zen V15 database, says the company, delivers breakthrough levels of performance and has been certified to work with the Intel OpenNESS and Smart Edge MEC platforms.
"Edge applications and devices increasingly rely on unsupervised machine learning inference at the edge to improve automation and real-time decision-making," says Lewis Carr, Senior Director of Product Marketing at Actian. "Actian Zen V15 edge data management delivers against a broad and demanding set of requirements including leveraging a variety of hardware architectures, operating environments, networks, communications interfaces, and languages to offer comprehensive support, performance, and the flexibility modern enterprises need to stay competitive."
The third generation of the company’s Zen database family, Zen V15 software connects mobile and IoT devices to gateways, the cloud, and traditional on-premise databases. The offering is a cloud-ready edge database that embraces the cloud ecosystem, harnessing the power of advanced architecture to eliminate extract, transform, and load (ETL) and latency, while also reducing security risks associated with decryption and vulnerable or exposed code.
In addition, says the company, its Zen V15 database delivers breakthrough modularity and performance on IoT and mobile devices, gateways, laptops, desktops, servers, and cloud platforms, redefining modern edge computing and maintaining backward compatibility for remote and branch office environments. Users can use the Zen database to leverage the power of 5G wireless broadband for fast and secure data processing at the edge and in the cloud.
"The flexibility to run the same database with local AES 256-bit encryption and underlying file formats at the device, gateway, edge server, and cloud environments provides a way to avoid decrypting until actual operations are performed at the point of action without transformations or added security vulnerabilities," says Desmond