Enterprises are pushing the edge—edge devices, edge clouds, local systems on the edge. Proceed with your eyes wide open. Credit: Thinkstock Big companies such as General Electric, Siemens, and Robert Bosch are using edge computing technology to optimize production. Manufacturing is a large consumer of edge approaches and technology. Typically, these edge systems are powered by artificial intelligence (AI) systems that parse production data at the source of the data. This enables them to make instantaneous decisions, such as adjusting the cooling systems in a factory so the welding robots can make more precise welds. Although the value of edge computing is well understood at this point, it’s still being used to solve problems where it’s not needed. We’re back to ensuring that whatever technology is being hyped right now is still a good choice. So, when is edge a good fit and when is it not? That’s really something to determine yourself, but I do have some general guidance. The first and larger mistake that I’m seeing is deploying edge computing out of a desire for control more than need. If you think back to when private clouds were popular, they were the desired end state of those who pushed back on giving up physical control to public cloud providers. The same seems to be occurring now. Some are using edge computing for control reasons, to keep most data local and off a public cloud. Also to keep the source of data closer to the processing for efficiency, which is the primary objective. The reality is that edge computing is not cheap. In most cases, you need to purchase, maintain, and fix your own hardware and software stack (the edge). Multiply this times the number of edge systems, and the edge computing bill is likely to be much higher than non-edge systems. Security is the second concern. It is easier and cheaper to secure data on the public cloud than on most edge-based systems. The more edge computing you have, the more the data is distributed, and the more difficult and costly it becomes to secure properly. Normally this means a higher risk of breach. Many justified the additional security risks because of the physical proximity of the data. I mean if I can see and touch the storage device then it’s secure, right? That’s not the way it works; most major breaches during the past year have been on systems the owners were standing next to. I’m not saying you need to be overly cautious. Just that you need to evaluate any new technology with both eyes open and an objective view of the technology’s value and purpose. Edge is just our latest challenge. Related content analysis Strategies to navigate the pitfalls of cloud costs Cloud providers waste a lot of their customers’ cloud dollars, but enterprises can take action. By David Linthicum Nov 15, 2024 6 mins Cloud Architecture Cloud Management Cloud Computing analysis Understanding Hyperlight, Microsoft’s minimal VM manager Microsoft is making its Rust-based, functions-focused VM tool available on Azure at last, ready to help event-driven applications at scale. By Simon Bisson Nov 14, 2024 8 mins Microsoft Azure Rust Serverless Computing how-to Docker tutorial: Get started with Docker volumes Learn the ins, outs, and limits of Docker's native technology for integrating containers with local file systems. By Serdar Yegulalp Nov 13, 2024 8 mins Devops Cloud Computing Software Development news Red Hat OpenShift AI unveils model registry, data drift detection Cloud-based AI and machine learning platform also adds support for Nvidia NIM, AMD GPUs, the vLLM runtime for KServe, KServe Modelcars, and LoRA fine-tuning. By Paul Krill Nov 12, 2024 3 mins Generative AI PaaS Artificial Intelligence Resources Videos