Making Sense Of The Edge

According to Google Trends data, worldwide searches for ‘edge computing’ have increased tenfold in the last five years. Google alone boasts 340 million search results for the phrase - hardly simple revision for those curious about the technology.

Among the noise and the varying definitions of Edge Computing. the technology has become somewhat misunderstood. 

Edge computing describes a distributed version of computation that brings data analysis closer to the source of data. In a factory setting, this could see data processing take place at the machine level. Unlike centralised models, where information would be sent to a data centre or the cloud, edge computing allows data capture, analysis, and action to be performed on the edge of a process - hence the name. 

Despite its capabilities, edge computing is not a replacement for centralised data storage methods, or an alternative to other data processing and management technologies. In fact, these architectures must work together to be truly beneficial. So, are edge devices just a new brand of the same technology? Not exactly.  

Latency Reduction

Edge devices are unique in the sense that they provide first-stage processing of data before sending this information elsewhere. Edge devices can also act on this data within the realms of the device itself, thanks to their intelligent capabilities. This can be achieved using forms of artificial intelligence (AI) and machine learning to help in decision making. 

Because everything is taking place on the device, this method can significantly reduce latency, removing the time spent between sharing this information with distant data centres and awaiting feedback.

In practice, this could help a manufacturer to avoid critical failures and downtime. In an oil and gas application, for example, an edge device could detect dangerously high pressure in pipes. Rather than waiting for this data to be processed elsewhere and sent back to a site manager, the device could trigger instant shut offs or adaptations to avoid a disaster. Similarly, this same method can be used to make automated adjustments to a process to improve the outcome - this could be related to energy efficiency, accuracy or productivity.

The ability to effect change based on real-time data does exist in current software platforms. COPA-DATA’s zenon, for instance, can be deployed across an entire facility to monitor operations. Compatible with most communication protocols, the software can pull data from a variety of equipment, sensors and vertical systems to provide operators with a real-time dashboard of facility-wide insights. This can alert users to disruptions in production and highlight potential problems.  

Streamlining Data

IIoT technologies have resulted in a huge increase in data across the industry. Today, it is not unusual for manufacturers to produce data on everything from energy efficiency and productivity, right through to operational insights and predictive maintenance. In fact, research suggests that the average smart factory produces five petabytes of data every week - that’s five million gigabytes, or the equivalent of more than 300,000 16 gigabyte iPhones. 

Manufacturing’s big data has quickly become colossal, and edge computing provides a way to reduce the volume of data being sent to a centralised space.

For industries that rely on data integrity for compliance, deploying edge computing to manage some data analysis can become a vital part of a data management strategy. Pharmaceutical manufacturers, for example, must comply with the Food and Drug Administration (FDA) 21 CFR part 11 regulation. This standard applies to drug manufacturers and bio tech companies and requires these organisations to keep an accurate audit trail and electronic records. EU GMP Annex 11 is the European equivalent. 

In these industries, on-edge analysis of some data can reduce the volume of information being sent to the cloud or data centre. Crucially, this ensures that time sensitive data is not lost in the flood of information.

Scaling The Edge

While some processes do benefit from instant data analysis, smart factories cannot work in silos. The rise of the edge does not mark the downfall of other data management technologies. In fact, it reinforces their necessity. 

Software platforms that can communicate with edge devices are essential for making edge technology scalable. Moreover, platforms that can collect, analyse, and visualise data from the edge - while compiling this with a variety of other types of equipment - are essential for constructing a holistic view of a factory’s operations. 

Realistically, most manufacturing facilities are not in a position for the widespread deployment of edge devices, or edge platforms to converge these technologies. Instead, manufacturers need scalable options in their journey to digitalisation and independent software can be the glue that makes this possible.

Martyn Williams is Managing Director of industrial software expert COPA-DATA UK 

You Might Also Read:

The Importance Of Securing OT Platforms:

 

« Microsoft Exchange Exploited By ‘Cuba’
A Cyber Attack On NATO Could Trigger Article 5 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Auriga

Auriga

Auriga create innovative software and have become a benchmark for high quality banking software including cyber security solutions to protect business critical devices.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.