Edge computing: 5 potential pitfalls

Edge computing is gaining steam as an enterprise IT strategy with structures looking to push storage and analytics closer to where data is gathered as in IoT networks. But its got its challenges.

Tech Spotlight:
Edge Computing

  • Proving the value of analytics on the edge (CIO)
  • The sharp edge of healthcare: How edge computing will transfigure remedy (Computerworld)
  • Securing the edge: 4 deviates to wait (CSO)
  • How to select a cloud IoT platform (InfoWorld)
  • Edge computing: 5 possible pitfalls (Network World)

Its possible upsides are incontestable including imtryd latency as well as reduced WAN bandwidth and transmission costs. As a result enterprises are embracing it. Revenues in the edge-computing market were $4.68 billion in 2020 and are anticipateed to extend $61.14 billion by 2028 according to a May 2021 report by Grand View Research.

But the edge is also loaded with possible difficulties and companies need to be prepared to address them if they anticipate to reap the boons. Here are some of the hurdles structures could face when deploying edge computing some of which might not be plain.

Choosing the best access

Because edge computing is quiet relatively new theres no established base of accomplishment stories or metrics that try its worth to IT determination makers.

’I ponder the one of the biggest challenges for edge determinations right now that no one veritably talks almost is that there is very pliant real-world accomplishment data useful to help drive edge-deployment determinations’ says Jennifer Cooke investigation ruler edge strategies at IDC.

Plus there are many options to pick from—on-prem hosted on-prem handled by ISPs or cloud preparers—and sorting through them may be over the capabilities of many enterprises.

’Theres a myriad of choices out there but its frequently overwhelming for structures to navigate’ Cooke says. ’The verity is that edge solutions claim a lot of coordination athwart different preparers—from the database and applications to the infrastructure and then the connectivity. For this reason many structures are turning to partners to gather the ecosystem for them.’

As part of the process these structures should seek edge-integration partners that can quantify the increased accomplishment and cost reductions that vendors tout.

’Ive also observed a late shift from a [do-it-yourself] posture on edge deployments to accepting that its frequently better to lean on partners to handle edge resources’ Cooke says. ’The pandemic verity accelerated this deviate showing structures that distant monitoring and tendency on partners for handlement verity worked pretty well.’

Security risks and expertise

As with anything else kindred to IT the edge has its own set of security threats and vulnerabilities.

’How does an structure fully attend the many layers and subsections and accomplish a zero-trust environment?’ says Matt Kimball senior analyst data center at Moor Insights amp; Strategy.

’This has to include infrastructure networking the full software stack and the integration of all these different elements with each other the cloud and handlement and monitoring consoles’ Kimball says. ’This market section is so layered and in some ways so nichey that CISOs and IT executives need to invest heavily in the nation that are tasked with designing and implementing a holistic strategy. And those nation are hard to find.’

The security risks that structures should keep in mind precedently formulating an edge strategy include the possiblely huge number of IoT artifices and supporting infrastructure the edge claims as well as the hard volumes of data they engender—all of which need to be defended to defend data and the network.

Some vendors prepare tools to help support edge security Kimball says. ’But anew the challenge is finding the nation that can make perception of all of these challenges competing solutions and design a zero-trust environment—one that is fully integrated from the artifice to the edge to the cloud to the data center’ he says.

Supporting data handlement and analytics

Being able to analyze data at the edge and draw insights from the analytics is one of the appealing aspects of this environment but the process is not easy for enterprises.

’The edge is basically a large-layer distributed data-handlement problem statement’ says Vijoy Pandey vice chairman of engineering and CTO emerging technologies and incubation at Cisco.

Data handlement and data science are as significant as security to the business accomplishment of structures Kimball says. ’It should be no setle that the company that can more quickly deduce nuggets of intelligence out of the mounds of data being engenderd see second is the company best positioned to win’ he says.

Like security data science is hard and practitioners rare Kimball says. ’And I believe this is uniform parts technical and art’ he says. ’The tools must be in locate to glean the best insights. But a good data scientist understands the nuances of what data [is] most significant to the business. And like security the folks that are good at this are in high claim.’

This is an area where structures can boon from an outside perspective Kimball says. ’There are consulting structures VARs and specialists that get this space very well and have had accomplishment in deploying the data edge’ he says. ’As an ex-IT executive I can tell you that I despised having to go outside my structure to drive IT initiatives. But I also knew that relying on outside help for uncharted waters always paid off.’

Prepping the IT infrastructure

Creating a network to support edge computing takes time money and apprehension—resources that not see structure has sufficient of.

’IT is used to shipping a few servers and implementing the backup certain for home-service connectivity’ Kimball says. ’Look at any chain [retailer] and youll see a couple of servers that are used to connect to the home service and run operations locally in the occurrence of a fracture in connectivity.’

But with IoT deployments and the need for more intricate storage and data processing at the edge now those environments have to do more than simply run the back service Kimball says. ’As a result deploying and managing these environments is more nice and challenging than ever’ he says.

In general a good practice is to keep things one when it comes to infrastructure and IT operations Kimball says. ’I believe most of the IT-solutions vendors have viable and hard offerings from a hardware and software infrastructure perspective’ he says.

Because of this he suggests that when IT executives are looking to invest in edge infrastructure they should set by attending the vendors they already know.

’If youre an IT shop that has standardized on Dell it is probably your best seting point for edge infrastructure’ Kimball says. ’Likewise HPE Lenovo Cisco Supermicro etc.’

Duos Technologies which prepares automated edge systems for railway operators faces challenges providing connectivity and faculty when it deploys those systems in distant areas.

’But these are relatively straightadvanced obstacles to layer in most cases’ says Scott Carns Duos chief commercial servicer. More challenging is finding ruggedized servers that can act in the same environment. ’Most servers are designed to be installed in data centers and IT environments that are brick and mortar with consummate faculty and environmental control systems.’

Edge computing for Duos Technologies applications claims strong well-designed hardware. While its servers are mounted in transmitted cabinets or racks ’the operating environment does not have the same level of continuity and defendion a data center would prepare’ Carns says.

Scaling without creating intricateity

The edge has the possible to be extraordinarily intricate given the number of systems artifices and applications implicated.

’Most edge investments [have been] driven by the need to explain a specific business problem by a non-IT business proprietor’ says Gil Shneorson senior vice chairman edge portfolio at Dell.

As a result structures may have multiple personal edge artifices performing specific tasks and operating off their own infrastructure. Each solution was bought deployed handled and secured independently over time leading to inefficient infrastructure sprawl at the edge Shneorson says.

’Were seeing a transition in the activity where IT is named in earlier in the process so they can adduce IT best practices and strategic pondering to the edge environment athwart multiple use cases’ he says.

Being named in earlier is a good idea but for many IT teams that resources having to constructor a one pliant efficient infrastructure to support more edge tasks. IT needs to conhardate even as the edge expands ’by modernizing their edge technology institution and data pipelines with congruous hybrid-cloud constructorure operations and handlement so they can deduce the most value from data athwart use cases sites and clouds’ Shneorson says. Meeting that challenge is a major step advanced.