DRIVING THE
You’ve heard of it – but what is edge computing and what’s driving
its success?
WHAT IS EDGE COMPUTING?
3 KEY TRENDS
SUCCESS OF EDGE COMPUTING
Learn more about edge computing.
READ ARTICLE
1
TREND 1:
Localized computing power
2
TREND 2:
Security Concerns
3
TREND 3:
Configuration, implementation and support
WHAT IS EDGE COMPUTING?
Edge computing allows connected devices to process data closer to where it’s created, or the “edge.” With the proliferation of IoT devices and solutions, both in home as well as at work, this emerging solution offers many advantages.
Latency
Security
Connectivity Costs and Bandwidth
Business Uptime
Devices processing their own data improves overall response time.
It’s harder for attackers to access data when it’s processed locally.
Reduced data stream loads means less congestion on the network and less energy demands for servers.
Disruption can be isolated to single points on the network vs. searching for the problem on the entire system.
READ ARTICLE
Learn more about edge computing.
LOCALIZED
COMPUTING POWER
TREND 1:
Microcontrollers have seen incredible improvement in performance over the last decade. This increase in processing power makes it easier for IoT devices to process data.
Out with the old
In with the new
The standard microcontroller of choice in the past would have been either a PIC16, AVR, or STM8, which would be lucky to perform more than 16 MIPS or have more than 16 KB of RAM.
With the rise of the Arm core, the shrinking size of transistors and the increasing demands from consumers and businesses alike, even the simplest commercial microcontrollers have clocked speeds greater than 80 MHz, include vast amounts of RAM (32 KB is not uncommon) and even feature multiple cores.
READ ARTICLE
Learn more about edge computing.
CONCERNS
TREND 2:
With the increased number of connected devices, there has been a significant rise in malicious data attacks in recent years. This has led to a demand for improved security features in connected devices.
Reduce accessibility
Keeping it local
A device’s reduced online communication with data centers makes them harder to find. What’s more, by not transmitting data, attackers will not be able to perform man-in-the-middle attacks.
With sensitive information kept locally to the device, an attacker must either physically attack the device or access it remotely (assuming that the device accepts incoming requests) – neither of which is easy to do.
SECURITY
READ ARTICLE
Learn more about edge computing.
IMPLEMENTATION AND SUPPORT
CONFIGURATION,
TREND 3:
Edge computing is not a simple plug-and-play solution. It will require major changes to current IT architectures and processes.
Handling growth
Experience resources
Managed services will need to be developed to handle system expansion and evolution—this goes for both hardware and software aspects of the network.
From gateways to AI software and more, there will be a need for experienced resources to develop these changing systems. Engaging resources that have expertise in all these areas will be invaluable to an organization’s success.