Making Sense Of The Edge

According to Google Trends data, worldwide searches for ‘edge computing’ have increased tenfold in the last five years. Google alone boasts 340 million search results for the phrase - hardly simple revision for those curious about the technology.

Among the noise and the varying definitions of Edge Computing. the technology has become somewhat misunderstood. 

Edge computing describes a distributed version of computation that brings data analysis closer to the source of data. In a factory setting, this could see data processing take place at the machine level. Unlike centralised models, where information would be sent to a data centre or the cloud, edge computing allows data capture, analysis, and action to be performed on the edge of a process - hence the name. 

Despite its capabilities, edge computing is not a replacement for centralised data storage methods, or an alternative to other data processing and management technologies. In fact, these architectures must work together to be truly beneficial. So, are edge devices just a new brand of the same technology? Not exactly.  

Latency Reduction

Edge devices are unique in the sense that they provide first-stage processing of data before sending this information elsewhere. Edge devices can also act on this data within the realms of the device itself, thanks to their intelligent capabilities. This can be achieved using forms of artificial intelligence (AI) and machine learning to help in decision making. 

Because everything is taking place on the device, this method can significantly reduce latency, removing the time spent between sharing this information with distant data centres and awaiting feedback.

In practice, this could help a manufacturer to avoid critical failures and downtime. In an oil and gas application, for example, an edge device could detect dangerously high pressure in pipes. Rather than waiting for this data to be processed elsewhere and sent back to a site manager, the device could trigger instant shut offs or adaptations to avoid a disaster. Similarly, this same method can be used to make automated adjustments to a process to improve the outcome - this could be related to energy efficiency, accuracy or productivity.

The ability to effect change based on real-time data does exist in current software platforms. COPA-DATA’s zenon, for instance, can be deployed across an entire facility to monitor operations. Compatible with most communication protocols, the software can pull data from a variety of equipment, sensors and vertical systems to provide operators with a real-time dashboard of facility-wide insights. This can alert users to disruptions in production and highlight potential problems.  

Streamlining Data

IIoT technologies have resulted in a huge increase in data across the industry. Today, it is not unusual for manufacturers to produce data on everything from energy efficiency and productivity, right through to operational insights and predictive maintenance. In fact, research suggests that the average smart factory produces five petabytes of data every week - that’s five million gigabytes, or the equivalent of more than 300,000 16 gigabyte iPhones. 

Manufacturing’s big data has quickly become colossal, and edge computing provides a way to reduce the volume of data being sent to a centralised space.

For industries that rely on data integrity for compliance, deploying edge computing to manage some data analysis can become a vital part of a data management strategy. Pharmaceutical manufacturers, for example, must comply with the Food and Drug Administration (FDA) 21 CFR part 11 regulation. This standard applies to drug manufacturers and bio tech companies and requires these organisations to keep an accurate audit trail and electronic records. EU GMP Annex 11 is the European equivalent. 

In these industries, on-edge analysis of some data can reduce the volume of information being sent to the cloud or data centre. Crucially, this ensures that time sensitive data is not lost in the flood of information.

Scaling The Edge

While some processes do benefit from instant data analysis, smart factories cannot work in silos. The rise of the edge does not mark the downfall of other data management technologies. In fact, it reinforces their necessity. 

Software platforms that can communicate with edge devices are essential for making edge technology scalable. Moreover, platforms that can collect, analyse, and visualise data from the edge - while compiling this with a variety of other types of equipment - are essential for constructing a holistic view of a factory’s operations. 

Realistically, most manufacturing facilities are not in a position for the widespread deployment of edge devices, or edge platforms to converge these technologies. Instead, manufacturers need scalable options in their journey to digitalisation and independent software can be the glue that makes this possible.

Martyn Williams is Managing Director of industrial software expert COPA-DATA UK 

You Might Also Read:

The Importance Of Securing OT Platforms:

 

« Microsoft Exchange Exploited By ‘Cuba’
A Cyber Attack On NATO Could Trigger Article 5 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Dig Security

Dig Security

Dig Security offers the first data detection and response (DDR) solution, providing real-time visibility, control and protection of your data assets across any cloud.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.