In-depth

What is edge computing?

Edge computing is central to making the IoT fast, secure and useful

Edge computing refers to data processing that's done at the edge of a network.

In a network data is typically sent from devices be that computers, smartphones or assembly line robots  back to a central data centre for processing and analysis. For example, a robot arm may send back reports on how many joints it had welded that day or how many gaskets it had picked up and moved onto a conveyor belt. To give a more mundane and everyday example, apps on your phone may relay performance and engagement data back to the developer's data centre (or cloud service) for mass analysis with those of other users of the same product.

The endpoints and data centre in a traditional network may be located quite far apart potentially even on different continents. Historically, this hasn't posed a problem: The "velocity" aspect of Big Data's three vs refers to the torrents of incoming data pouring into the data centre, rather than the speed with which it needs to be analysed and acted upon. Increasingly, however, connected devices the "things" in the Internet of Things (IoT) -- require instantaneous or near-instantaneous feedback.

In these situations, the latency involved in sending data to and from the data centre is too great, even if it's analysed and turned around immediately. This is where edge computing comes in.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Data processing and analysis in edge computing can be done in a small, on-site data centre (such as a micro data centre) or, increasingly, in the "thing" itself.

Real life examples of edge computing

Oil rigs provide a good example of how edge computing is used in the real world. Because of their remote offshore locations, they rely on the technology to mitigate lengthy distances to data centre and poor network connections. It's also costly, inefficient and time-consuming for rigs to send real-time data to a centralised cloud. Having a localised data processing facility helps a rig to run without delay or interruption.

Similarly, autonomous vehicles, which operate with low connectivity, need real-time data analysis to navigate roads. Gateways hosted within the vehicle can aggregate data from other vehicles, traffic signals, GPS devices, proximity sensors, onboard control units and cloud applications, and can process and analyse this information locally.

Security risks at the edge

IDC's report "Edge Computing is Reshaping IoT: Time for European Enterprises to Take Notice" suggests edge computing security is really about IoT security. 

As an extension of a data centre, an edge computing infrastructure naturally increases the surface area exposed to threats. Many edge computing devices aren't built with traditional IT security protocols, meaning that unsecured endpoints can be roped into distributed denial of service (DDoS) attacks, and can even offer hackers access to the wider network they connect to.

Physical security also needs to be a consideration, if devices are accessible to bad actors or people who could tamper with them.

Advertisement - Article continues below

However, if appropriate precautions are taken, edge computing can actually reduce IoT security and privacy risks by limiting the data flow between the collection point and the core storage centre, according to IDC.

What next for edge computing?

According to Gartner's Digital Business Will Push Infrastructures to the Edge report, data generated and processed by enterprises outside of a traditional data centre will increase from less than 10% in 2018 to 75% by 2022.

This is hardly surprising given the increasing popularity of the IoT both in business and consumer use. And while we may still be a way off fully-autonomous vehicles those that are on the road already, or will be shortly, still need this type of technology to operate properly.

The analyst house has also predicted in its Hype Cycle for Emerging Technologies 2019 report that additional edge technologies notably AI and analytics will come to play a key role in this technology in the coming five to 10 years.

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now
Advertisement

Recommended

Visit/network-internet/34596/bt-unveils-barrage-of-new-business-services
Network & Internet

BT unveils barrage of new business services

9 Oct 2019
Visit/network-internet/33885/zyxel-nebula-control-center-2019-review-takes-all-the-pain-out-of-networking
Network & Internet

Zyxel Nebula Control Center 2019 review

21 Jun 2019
Visit/nas/27920/best-nas-drives
network attached storage (NAS)

Best NAS drives 2019

26 Apr 2019
Visit/cloud-storage/32814/dropbox-business-advanced-review-first-rate-filesharing
cloud storage

Dropbox Business Advanced review: First-rate filesharing

22 Jan 2019

Most Popular

Visit/policy-legislation/data-governance/354496/brexit-security-talks-under-threat-after-uk-accused-of
data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/hardware/laptops/354533/dell-xps-13-new-9300-hands-on-review-chasing-perfection
Laptops

Dell XPS 13 (New 9300) hands-on review: Chasing perfection

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020