{"id":5425,"date":"2018-07-31T09:45:36","date_gmt":"2018-07-31T14:45:36","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5425"},"modified":"2018-09-13T14:00:18","modified_gmt":"2018-09-13T19:00:18","slug":"does-edge-computing-have-the-edge","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/does-edge-computing-have-the-edge\/","title":{"rendered":"Does Edge Computing Have the Edge?"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif; color: #000000;\"><b>by Des Nnochiri<\/b><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/img_2663-1606_sb_pm.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-5428 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/img_2663-1606_sb_pm-300x199.jpg\" alt=\"\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/img_2663-1606_sb_pm-300x199.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/img_2663-1606_sb_pm.jpg 325w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>The use of mobile devices as endpoints for corporate and public networks continues as a prevailing trend, putting an emphasis on the need for readily available internet connections and data-processing capabilities.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Together with the growth and evolution of the so-called Internet of Things (IoT), with its consumer and industry\/infrastructure-level ecosystem of widely dispersed, \u201csmart\u201d, and connected devices, new patterns and techniques for data-handling and resource provision have had to develop to enable these emerging networks to keep pace with the demands of their user bases.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">The Conundrum of Connectivity<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The march of technology has seen the development of smaller but ever more powerful devices, hardware components, and software. This evolution means that there\u2019s now less dependence on \u201ccommand center\u201d style resources like mainframes, in-house application servers, or databases.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As long as a viable internet connection is present and the resources are out there, somewhere, workers today can operate their laptops, tablets, smartphones, and other hardware from home, public spaces, on the road, or anywhere across the globe.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Connectivity is required to provide feedback, timestamps, geolocation, database or software updates, and a host of other functions. It\u2019s gotten to the stage where some devices and a fair proportion of software applications won\u2019t even work properly, unless there\u2019s an active internet connection present.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">So with the increased functionality and mobility of today\u2019s devices and software comes <a href=\"https:\/\/www.information-management.com\/opinion\/edge-computing-and-the-future-of-the-data-center\" rel=\"nofollow\" target=\"_blank\">a critical flaw<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>: if an internet link goes down, so does the hardware, software, or service.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Edge Computing Defined<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Traditional models of information and resource handling for corporate networks have relied on a central store of knowledge, skills, and infrastructure \u2013 typically in the form of an in-house data center, and local IT staffing.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With the emergence of the so-called \u201cInternet of Things\u201d (IoT), corporate networks have the potential to become even more widely dispersed and fragmented. Smart sensors, wearable devices, laboratory or manufacturing components, and numerous other IoT devices make it possible for the perimeter of today\u2019s enterprise network to be both fluid and interactive.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/nw_how_edge_computing_works_diagram_1400x1717-100736111-large.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5430 size-medium\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/nw_how_edge_computing_works_diagram_1400x1717-100736111-large-245x300.jpg\" alt=\"\" width=\"245\" height=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/nw_how_edge_computing_works_diagram_1400x1717-100736111-large-245x300.jpg 245w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/nw_how_edge_computing_works_diagram_1400x1717-100736111-large.jpg 300w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/07\/nw_how_edge_computing_works_diagram_1400x1717-100736111-large.jpg\">\u00a0<\/a><span style=\"font-family: verdana, geneva, sans-serif;\">The prevailing characteristic of these IoT devices is their ability to communicate via the internet with their owners\/operators, and with information and resources resident in remote locations \u2013 be they in the cloud, or at the various sites of an enterprise.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/what-edge-computing-means-for-infrastructure-and-operations-leaders\/\" rel=\"nofollow\" target=\"_blank\">Gartner, Inc. describes edge computing<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> as \u201csolutions that facilitate data processing at or near the source of data generation.\u201d It \u201cserves as the decentralized extension of the campus networks, cellular networks, data center networks or the cloud.\u201d<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Needs Met by Edge Computing<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Edge computing has developed to meet the demands of the growing ecosystem of edge devices. It does this by moving processing and computational power to the edges of the network \u2013 and therefore much closer to its users. Its remit is to back up and provide power to various remote systems, improving overall security for the enterprise and offsetting the demands of enterprise hardware.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Santhosh Rao, principal research analyst at Gartner puts it this way: \u201cAs the volume and velocity of data increases, so too does the inefficiency of streaming all this information to a cloud or data center for processing.\u201d<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Edge computing provides an assortment of mechanisms for data processing and resource provision at network perimeters. Solutions run the gamut from basic event filtering, to complex-event processing or batch processing. Deployments may be mobile (as in the case of a smart vehicle or smartphone) or static (e.g. when incorporated into a building management solution, at an offshore oil rig or manufacturing plant).<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Practical Applications<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A number of complex deployments of edge computing have been put in place, already.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Gateway solutions are possible, such as in a smart vehicle where local data from traffic signals, other vehicles, GPS devices, proximity sensors and the like are aggregated and processed locally, to improve vehicle navigation or safety.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"http:\/\/www.businessinsider.com\/edge-computing-and-fog-computing-explained-2018-2\" rel=\"nofollow\" target=\"_blank\">Self-driving or autonomous vehicles<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> require split-second data processing and decision-making \u2013 and edge computing allows for this real-time response. As Artificial Intelligence (AI) technology evolves, this is being incorporated into on-board computer systems, to further improve vehicle performance.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The emerging 5G mobile communication networks employ edge servers, which host applications and cache content for local telecoms subscribers. This eliminates the need to send information streams through a potentially congested backbone network.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In some retail outlets and offshore oil rigs, edge servers are being used to form clusters or micro data centers and create pools of computational power which can be used locally.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">The Essential Need for Data Centers<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">This last point demonstrates an important issue: with the emergence of edge computing, there\u2019s now a diversifying role for the data center.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Edge computing is all about moving information and computational resources closer to their end users. In practical terms, this requires making data center and infrastructure resources available at numerous locations around a network\u2019s perimeter. But rather than traditional installations of \u201cbig iron\u201d, these edge computing data centers must be more mobile and adaptable in nature.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A number of big players in the cloud sector have recognized this fact, and are offering new services aimed at enabling users to integrate their devices with major platforms such as Google and AWS.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Security Considerations at the Edge<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In any discussion involving mobile computing or devices of the IoT, security (and the current lack thereof) usually tends to come up. Edge computing is no exception \u2013 and there have already been concerns expressed about the risks involved, and what steps may be taken to reduce them. <a href=\"https:\/\/www.networkworld.com\/article\/3224893\/internet-of-things\/what-is-edge-computing-and-how-it-s-changing-the-network.html\" rel=\"nofollow\" target=\"_blank\">The security debate<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> is double-edged.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">On the one hand, there\u2019s the possibility that with localized data not having to travel over a public network, edge computing environments are actually safer than those which rely on a centralized data center or cloud service (which could be compromised by a single attack).<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">On the other hand, edge devices may be inherently vulnerable, a fact that recent breaches of massive numbers of IoT devices have already demonstrated.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In either case, measures such as data encryption (for information in transit and local storage), access control methods, and the use of Virtual Private Networks (VPNs) are advised.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Des Nnochiri \u00a0 The use of mobile devices as endpoints for corporate and public networks continues as a prevailing trend, putting an emphasis on the need for readily available internet connections and data-processing capabilities. \u00a0 Together with the growth and evolution of the so-called Internet of Things (IoT), with its consumer and industry\/infrastructure-level ecosystem [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":5477,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,4,42,6],"tags":[28,36,23,120,119,34,49,29],"class_list":["post-5425","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-general-it","category-security","category-tech","tag-cloud","tag-connectivity","tag-data","tag-data-center","tag-data-processing","tag-edge-computing","tag-internet","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5425"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5425\/revisions"}],"predecessor-version":[{"id":5773,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5425\/revisions\/5773"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/5477"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}