Making Sense Of The Edge

According to Google Trends data, worldwide searches for ‘edge computing’ have increased tenfold in the last five years. Google alone boasts 340 million search results for the phrase - hardly simple revision for those curious about the technology.

Among the noise and the varying definitions of Edge Computing. the technology has become somewhat misunderstood. 

Edge computing describes a distributed version of computation that brings data analysis closer to the source of data. In a factory setting, this could see data processing take place at the machine level. Unlike centralised models, where information would be sent to a data centre or the cloud, edge computing allows data capture, analysis, and action to be performed on the edge of a process - hence the name. 

Despite its capabilities, edge computing is not a replacement for centralised data storage methods, or an alternative to other data processing and management technologies. In fact, these architectures must work together to be truly beneficial. So, are edge devices just a new brand of the same technology? Not exactly.  

Latency Reduction

Edge devices are unique in the sense that they provide first-stage processing of data before sending this information elsewhere. Edge devices can also act on this data within the realms of the device itself, thanks to their intelligent capabilities. This can be achieved using forms of artificial intelligence (AI) and machine learning to help in decision making. 

Because everything is taking place on the device, this method can significantly reduce latency, removing the time spent between sharing this information with distant data centres and awaiting feedback.

In practice, this could help a manufacturer to avoid critical failures and downtime. In an oil and gas application, for example, an edge device could detect dangerously high pressure in pipes. Rather than waiting for this data to be processed elsewhere and sent back to a site manager, the device could trigger instant shut offs or adaptations to avoid a disaster. Similarly, this same method can be used to make automated adjustments to a process to improve the outcome - this could be related to energy efficiency, accuracy or productivity.

The ability to effect change based on real-time data does exist in current software platforms. COPA-DATA’s zenon, for instance, can be deployed across an entire facility to monitor operations. Compatible with most communication protocols, the software can pull data from a variety of equipment, sensors and vertical systems to provide operators with a real-time dashboard of facility-wide insights. This can alert users to disruptions in production and highlight potential problems.  

Streamlining Data

IIoT technologies have resulted in a huge increase in data across the industry. Today, it is not unusual for manufacturers to produce data on everything from energy efficiency and productivity, right through to operational insights and predictive maintenance. In fact, research suggests that the average smart factory produces five petabytes of data every week - that’s five million gigabytes, or the equivalent of more than 300,000 16 gigabyte iPhones. 

Manufacturing’s big data has quickly become colossal, and edge computing provides a way to reduce the volume of data being sent to a centralised space.

For industries that rely on data integrity for compliance, deploying edge computing to manage some data analysis can become a vital part of a data management strategy. Pharmaceutical manufacturers, for example, must comply with the Food and Drug Administration (FDA) 21 CFR part 11 regulation. This standard applies to drug manufacturers and bio tech companies and requires these organisations to keep an accurate audit trail and electronic records. EU GMP Annex 11 is the European equivalent. 

In these industries, on-edge analysis of some data can reduce the volume of information being sent to the cloud or data centre. Crucially, this ensures that time sensitive data is not lost in the flood of information.

Scaling The Edge

While some processes do benefit from instant data analysis, smart factories cannot work in silos. The rise of the edge does not mark the downfall of other data management technologies. In fact, it reinforces their necessity. 

Software platforms that can communicate with edge devices are essential for making edge technology scalable. Moreover, platforms that can collect, analyse, and visualise data from the edge - while compiling this with a variety of other types of equipment - are essential for constructing a holistic view of a factory’s operations. 

Realistically, most manufacturing facilities are not in a position for the widespread deployment of edge devices, or edge platforms to converge these technologies. Instead, manufacturers need scalable options in their journey to digitalisation and independent software can be the glue that makes this possible.

Martyn Williams is Managing Director of industrial software expert COPA-DATA UK 

You Might Also Read:

The Importance Of Securing OT Platforms:

 

« Microsoft Exchange Exploited By ‘Cuba’
A Cyber Attack On NATO Could Trigger Article 5 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Maveris

Maveris

Maveris is an IT and cybersecurity company committed to helping organizations create secure digital solutions to accelerate their mission.