Challenges of edge computing
2:27:44 2024-12-16 540

Although edge computing has the potential to provide compelling benefits across a multitude of use cases, the technology is far from foolproof. Beyond the traditional problems of network limitations, there are several key considerations that can affect the adoption of edge computing:

  • Limited capability. Part of the allure that cloud computing brings to edge -- or fog -- computing is the variety and scale of the resources and services. Deploying an infrastructure at the edge can be effective, but the scope and purpose of the edge deployment must be clearly defined -- even an extensive edge computing deployment serves a specific purpose at a pre-determined scale using limited resources and few services
  • Connectivity. Edge computing overcomes typical network limitations, but even the most forgiving edge deployment will require some minimum level of connectivity. It's critical to design an edge deployment that accommodates poor or erratic connectivity and consider what happens at the edge when connectivity is lost. Autonomy, AI and graceful failure planning in the wake of connectivity problems are essential to successful edge computing.
  • Security. IoT devices are notoriously insecure, so it's vital to design an edge computing deployment that will emphasize proper device management, such as policy-driven configuration enforcement, as well as security in the computing and storage resources -- including factors such as software patching and updates -- with special attention to encryption in the data at rest and in flight. IoT services from major cloud providers include secure communications, but this isn't automatic when building an edge site from scratch.
  • Data lifecycles. The perennial problem with today's data glut is that so much of that data is unnecessary. Consider a medical monitoring device -- it's just the problem data that's critical, and there's little point in keeping days of normal patient data. Most of the data involved in real-time analytics is short-term data that isn't kept over the long term. A business must decide which data to keep and what to discard once analyses are performed. And the data that is retained must be protected in accordance with business and regulatory policies.

 

Why Do We Learn?   2025-08-15
Reality Of Islam

A Mathematical Approach to the Quran

10:52:33   2024-02-16  

mediation

2:36:46   2023-06-04  

what Allah hates the most

5:1:47   2023-06-01  

allahs fort

11:41:7   2023-05-30  

striving for success

2:35:47   2023-06-04  

Imam Ali Describes the Holy Quran

5:0:38   2023-06-01  

livelihood

11:40:13   2023-05-30  

silence about wisdom

3:36:19   2023-05-29  

MOST VIEWS

Importance of Media

9:3:43   2018-11-05

Illuminations

your character

2:33:4   2023-02-15

overcoming challenges

5:57:34   2023-03-18

the effect of words

5:58:12   2021-12-18

good people

11:34:48   2022-06-29

be yourself.

8:30:23   2022-03-03

smiling

1:38:41   2021-12-08

life temptations

10:35:40   2022-05-26



IMmORTAL Words
LATEST Your Heart Is Vulnerable. These 4 Things Will Help You Protect It. Your Phone Is Covered in All Kinds of Germs. Here is The Solution. Study Confirms Abrupt Changes in Antarctica – And the World Will Feel Them Rationalizing Reactions Interpretation of Sura Maryam - Verses 9-10 Outcomes of being Adhered to Responsibility There is a Surprisingly Easy Way to Remove Microplastics in Your Drinking Water NASA Probe Could Intercept Interstellar Comet, Scientists Say Ants Are Superefficient at Teamwork, Scientists Discover Improving Quality of Life Interpretation of Sura Maryam (Mary) - Verses 6-8 Let us Not Abuse the Blessings of Allah to Commit Sins