Challenges of edge computing
2:27:44 2024-12-16 492

Although edge computing has the potential to provide compelling benefits across a multitude of use cases, the technology is far from foolproof. Beyond the traditional problems of network limitations, there are several key considerations that can affect the adoption of edge computing:

  • Limited capability. Part of the allure that cloud computing brings to edge -- or fog -- computing is the variety and scale of the resources and services. Deploying an infrastructure at the edge can be effective, but the scope and purpose of the edge deployment must be clearly defined -- even an extensive edge computing deployment serves a specific purpose at a pre-determined scale using limited resources and few services
  • Connectivity. Edge computing overcomes typical network limitations, but even the most forgiving edge deployment will require some minimum level of connectivity. It's critical to design an edge deployment that accommodates poor or erratic connectivity and consider what happens at the edge when connectivity is lost. Autonomy, AI and graceful failure planning in the wake of connectivity problems are essential to successful edge computing.
  • Security. IoT devices are notoriously insecure, so it's vital to design an edge computing deployment that will emphasize proper device management, such as policy-driven configuration enforcement, as well as security in the computing and storage resources -- including factors such as software patching and updates -- with special attention to encryption in the data at rest and in flight. IoT services from major cloud providers include secure communications, but this isn't automatic when building an edge site from scratch.
  • Data lifecycles. The perennial problem with today's data glut is that so much of that data is unnecessary. Consider a medical monitoring device -- it's just the problem data that's critical, and there's little point in keeping days of normal patient data. Most of the data involved in real-time analytics is short-term data that isn't kept over the long term. A business must decide which data to keep and what to discard once analyses are performed. And the data that is retained must be protected in accordance with business and regulatory policies.

 

Forgive Others   2025-07-23
Reality Of Islam

A Mathematical Approach to the Quran

10:52:33   2024-02-16  

mediation

2:36:46   2023-06-04  

what Allah hates the most

5:1:47   2023-06-01  

allahs fort

11:41:7   2023-05-30  

striving for success

2:35:47   2023-06-04  

Imam Ali Describes the Holy Quran

5:0:38   2023-06-01  

livelihood

11:40:13   2023-05-30  

silence about wisdom

3:36:19   2023-05-29  

Gold remains perfectly solid wh

read more

MOST VIEWS

Importance of Media

9:3:43   2018-11-05

Illuminations

noah & his ark

7:59:14   2018-06-21

your actions

2:5:14   2023-01-28

the effect of words

5:58:12   2021-12-18

never answer to your lusts

7:0:55   2022-05-17

hud & his people

7:45:39   2018-06-21

their choice

11:11:59   2023-02-01

be creative

8:25:12   2022-03-09



IMmORTAL Words
LATEST How Can You Save Your Marriage? Interpretation of Sura Hud - Verses 111-113 Importance of Patience in the Light of Traditions Just One Diet Soda a Day May Raise Your Type 2 Diabetes Risk by 38% Gold Does Something Unexpected When Superheated Past Its Melting Point Scientists Found a Mysterious Barrier in The Ocean That Jellyfish Will Not Cross Take Responsibility for Your Choices Interpretation of Sura Hud - Verses 108-110 Patience in Islamic Codices Study Reveals the Shocking Amount of Plastic We Breathe in Every Day Third Phase of AI Is Here. Here is How Agents May Impact Our Lives. Yellowstone Aspen Forests Are Already Responding to The Return of Wolves