Making Sense Of The Edge

According to Google Trends data, worldwide searches for ‘edge computing’ have increased tenfold in the last five years. Google alone boasts 340 million search results for the phrase - hardly simple revision for those curious about the technology.

Among the noise and the varying definitions of Edge Computing. the technology has become somewhat misunderstood. 

Edge computing describes a distributed version of computation that brings data analysis closer to the source of data. In a factory setting, this could see data processing take place at the machine level. Unlike centralised models, where information would be sent to a data centre or the cloud, edge computing allows data capture, analysis, and action to be performed on the edge of a process - hence the name. 

Despite its capabilities, edge computing is not a replacement for centralised data storage methods, or an alternative to other data processing and management technologies. In fact, these architectures must work together to be truly beneficial. So, are edge devices just a new brand of the same technology? Not exactly.  

Latency Reduction

Edge devices are unique in the sense that they provide first-stage processing of data before sending this information elsewhere. Edge devices can also act on this data within the realms of the device itself, thanks to their intelligent capabilities. This can be achieved using forms of artificial intelligence (AI) and machine learning to help in decision making. 

Because everything is taking place on the device, this method can significantly reduce latency, removing the time spent between sharing this information with distant data centres and awaiting feedback.

In practice, this could help a manufacturer to avoid critical failures and downtime. In an oil and gas application, for example, an edge device could detect dangerously high pressure in pipes. Rather than waiting for this data to be processed elsewhere and sent back to a site manager, the device could trigger instant shut offs or adaptations to avoid a disaster. Similarly, this same method can be used to make automated adjustments to a process to improve the outcome - this could be related to energy efficiency, accuracy or productivity.

The ability to effect change based on real-time data does exist in current software platforms. COPA-DATA’s zenon, for instance, can be deployed across an entire facility to monitor operations. Compatible with most communication protocols, the software can pull data from a variety of equipment, sensors and vertical systems to provide operators with a real-time dashboard of facility-wide insights. This can alert users to disruptions in production and highlight potential problems.  

Streamlining Data

IIoT technologies have resulted in a huge increase in data across the industry. Today, it is not unusual for manufacturers to produce data on everything from energy efficiency and productivity, right through to operational insights and predictive maintenance. In fact, research suggests that the average smart factory produces five petabytes of data every week - that’s five million gigabytes, or the equivalent of more than 300,000 16 gigabyte iPhones. 

Manufacturing’s big data has quickly become colossal, and edge computing provides a way to reduce the volume of data being sent to a centralised space.

For industries that rely on data integrity for compliance, deploying edge computing to manage some data analysis can become a vital part of a data management strategy. Pharmaceutical manufacturers, for example, must comply with the Food and Drug Administration (FDA) 21 CFR part 11 regulation. This standard applies to drug manufacturers and bio tech companies and requires these organisations to keep an accurate audit trail and electronic records. EU GMP Annex 11 is the European equivalent. 

In these industries, on-edge analysis of some data can reduce the volume of information being sent to the cloud or data centre. Crucially, this ensures that time sensitive data is not lost in the flood of information.

Scaling The Edge

While some processes do benefit from instant data analysis, smart factories cannot work in silos. The rise of the edge does not mark the downfall of other data management technologies. In fact, it reinforces their necessity. 

Software platforms that can communicate with edge devices are essential for making edge technology scalable. Moreover, platforms that can collect, analyse, and visualise data from the edge - while compiling this with a variety of other types of equipment - are essential for constructing a holistic view of a factory’s operations. 

Realistically, most manufacturing facilities are not in a position for the widespread deployment of edge devices, or edge platforms to converge these technologies. Instead, manufacturers need scalable options in their journey to digitalisation and independent software can be the glue that makes this possible.

Martyn Williams is Managing Director of industrial software expert COPA-DATA UK 

You Might Also Read:

The Importance Of Securing OT Platforms:

 

« Microsoft Exchange Exploited By ‘Cuba’
A Cyber Attack On NATO Could Trigger Article 5 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

Kivera

Kivera

Kivera enforces your organisation governance and security policies across cloud deployments preventing misconfigurations turning into attack vectors.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.