Monday, December 9, 2019

Word of the Day: edge computing

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | December 9, 2019
edge computing

Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible. The move toward edge computing is driven by mobile computing, the decreasing cost of computer components and the sheer number of networked devices in the internet of things (IoT).

 

The name "edge" in edge computing is derived from network diagrams; typically, the edge in a network diagram signifies the point at which traffic enters or exits the network. The edge is also the point at which the underlying protocol for transporting data may change. For example, a smart sensor might use a low-latency protocol like MQTT to transmit data to a message broker located on the network edge, and the broker would use the hypertext transfer protocol (HTTP) to transmit valuable data from the sensor to a remote server over the Internet.

 

The OpenFog consortium uses the term fog computing to describe edge computing. The word "fog" is meant to convey the idea that the advantages of cloud computing should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground.) Consortium members include Cisco, ARM, Microsoft, Dell, Intel and Princeton University.

 

Why edge computing is important

A major benefit of edge computing is that it improves time to action and reduces response time down to milliseconds, while also conserving network resources. Transmitting massive amounts of raw data over a network puts tremendous load on network resources.

Depending on the implementation, time-sensitive data in an edge computing architecture may be processed at the point of origin by an intelligent device or sent to an intermediary server located in close geographical proximity to the client. Data that is less time sensitive is sent to the cloud for analysis and long-term storage.

 

In many cases, it is much more efficient to process data near its source and send only the data that has long-term value to a remote data center. Instead of continually broadcasting data about the oil level in a car's engine, for example, an automotive sensor might simply send summary data to a remote server on a periodic basis.

 

Challenges of edge computing

 

Despite its ability to reduce latency and network bottlenecks, edge computing can pose significant security, licensing and configuration challenges.

Security challenges: Edge computing's distributed architecture increases the number of attack vectors. The more intelligence an edge client has, the more vulnerable it becomes to malware infections and security exploits.

Licensing challenges: Smart clients can have hidden licensing costs. While the base version of an edge client might initially have a low ticket price, additional functionalities may be licensed separately and drive the price up.

Configuration challenges: Unless device management is centralized and robust, administrators may inadvertently create security holes by failing to change the default password on each edge device or neglecting to update firmware on a consistent basis.

Quote of the Day

 

"Edge computing ranks as a top emerging technology trend for 2020, with leading technologists and tech researchers saying this distributed computing model will advance innovations across all areas of business and society." - Mary K. Pratt

Learning Center

 

What is edge computing, and how can you get started?
Edge computing is forcing IT teams to rethink legacy architectures. In this guide, explore what edge computing is, its pros and cons and how it can change enterprise networks.

The shift to edge computing is happening fast -- here's why
Whether you call it the Fourth Industrial Revolution or digital transformation, enterprise IT is being changed fast, and forever, and edge computing is a big reason why.

The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it.

Fog computing vs. edge computing: What's the difference?
Fog computing vs. edge computing -- while many IT professionals use the terms synonymously, others make subtle but important distinctions between them.

What you need to know about edge computing architecture
In this handbook, networking experts share their thoughts and insights on edge computing and what it means for today's networking professionals. They also address the evolution of multi-access edge computing and how edge computing in IoT can improve network efficiency.

What the future of edge computing means for cloud and networks
IoT and application processing needs are shaping the future of edge computing, driving the growth of micro modular data centers and raising the question of cloud computing's relevance.

Quiz Yourself

 
Test your networking knowledge: What is edge computing?
Edge computing technology isn't new, but it may differ from your expectations. This quiz covers essential edge computing basics, such as pros, cons and differentiators.

Stay in Touch

 

For feedback about any of our definitions or to suggest a new definition, please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: