5g
Factories of the Future
Media & Entertainment
Smart Cities
Smart Energy
Smart Ports
SME Opportunities
Societal Impacts
Technology Development
Telecoms Providers
5G CAM
5G Automotive
5G CAM KPIs
5G CAM Standardisation
5G Corridors
5G Multimodal Connectivity
5G Transport Network
Artificial Intelligence & Machine Learning
Artificial Intelligence & Machine Learning in big data
Artificial Intelligence & Machine Learning technologies
Big data
Big data algorithms
Big data analytics
Collaborative Classification and Models
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Collaboration Risk and Value Sharing
Collaborative Planning and Synchromodality
Customs & Regulatory Compliance
Environmental Performance Management
Logistics Optimisation
Stock Optimisation
Supply Chain Corrective and Preventive Actions (CAPA)
Supply Chain Financing
Supply Chain Visibility
Common Information Objects
Booking
Customs Declarations
Transport Service Description
Transport Status
Waybills
Computing and Processing
Big Data Management and Analytics
Cloud
Edge
Fog
Knowledge Graphs
Machine Learning
MIST
Stream Processing
Connectivity
Architecture
Blockchain
Connectivity Interfaces
Technologies (Bluetooth, Ethernet, Wifi)
Data Management, Simulation and Dashboards
Dashboards
Data Fusion
Data Governance, Integrity, Quality Management and Harmonization
Event Handling
Open Data
Simulation
Statistics and Key Performance Indicators (KPIs)
Data market
Data ecosystem
Data marketplace
Data Platform
Data Providers
Devices
IoT Controllers
IoT Gateways
IoT Sensors
Tracking Sensors
Digitisation Frameworks
Control Towers
Data Pipelines
e-Freight
e-Maritime
National Single Windows
Port Community Systems
Federation
Data Federation
Platform Federation
Industrial IoT Sectors
Rail Sector Active Predictive Maintenance
Interoperability
Data interoperability
Data interoperability mechanisms
Interoperability solutions
Platform interoperability
IoT Secuirty, Privacy and Safety Systems
PKI Technology
Privacy-preservation
Data privacy preserving technologies
Privacy preserving technologies
Project Results
5G-SOLUTIONS Deliverables
5G-SOLUTIONS Publications
CHARIOT Capacity Building and Trainings
CHARIOT Deliverables
CHARIOT Publications
SELIS Deliverables
SELIS Publications and Press Releases
Project Results - 5g Routes
5G-ROUTES Deliverables
5G-ROUTES Innovation
5G-ROUTES Publications
Project Results - TRUSTS
TRUSTS Deliverable
TRUSTS Publications
Safety, Security and Privacy Systems
Access Management
Coordinated Border Management
Information Security
International Organisations
Risk Assessment and Management
Risk Management
Safety and Security Assessment
Source Code Analysis
Sectors and Stakeholders
Airports and Air Transport
Banks, investors and other funding providers
Custom Authorities
Facilities, Warehouses
Freight Forwarders
Inland Waterways
Multimodal Operators
Ports and Terminals
Railway
Retailers
Road Transport
Shippers
Shipping
Smart Buildings
Trusties and other Intermediary Organizations
Urban and Countryside Logistics
Urban Logistics
Sectors and Stakeholders - TRUSTS
Audit & Law firms
Corporate offices
Enterprises
Financial Institutions
Telecommunications
Security
Secured Data
Secured Infrastructure
Secured Platform
Sovereignty
Data sovereignty
Standards
Good Distribution Practices
International data standards
International Organization for Standardization (ISO)
UN/CEFACT
World Customs Organization (WCO)
Supply Chain Management
Business Models, Process Improvement, Contract Management, KPIs and Benchmarking Indexes
Risk Management
Risk-Based Controls
Screening and tracking
Supervision Approach
Technologies
5g
Agile Deployment, Configuration Management
Business Applications
Business Integration Patterns, Publish-Subscribe
Cloud Technologies/Computing, Services Virtualisation
Cognitive
Community Node Platform and Application Monitoring
Connectivity Technologies (Interfaces and Block Chain)
Hybrid S/T Communication and Navigation Platforms
IoT (Sensors, platforms)
Mobile
Physical Internet (PI)
Public key infrastructure (PKI)
Radio-frequency identification (RFID)

Edge

Why edge computing is critical for the IoT
Raj Talluri 24/10/2017 00:00:00

While many of today’s always-connected tech devices take advantage of cloud computing, Internet of Things (IoT) manufacturers and application developers are starting to discover the benefits of doing more compute and analytics on the devices themselves.


This on-device approach helps reduce latency for critical applications, lower dependence on the cloud, and better manage the massive deluge of data being generated by the IoT. An example of this trend is the recently announced Nest Cam IQ indoor security camera, which uses on-device vision processing to watch for motion, distinguish family members, and send alerts only if someone is not recognized or doesn’t fit pre-defined parameters. By performing computer vision tasks within the camera, Nest reduces the amount of bandwidth, cloud processing, and cloud storage used versus the alternative of sending raw streams of video over the network. In addition, on-device processing improves the speed of alerts while reducing chances of annoying, recurrent false alarms.


The ability to do advanced on-device processing and analytics is referred to as “edge computing.” Think of the “edge” as the universe of internet-connected devices and gateways sitting on the field — the counterpart to the “cloud.” Edge computing provides new possibilities in IoT applications, particularly for those relying on machine learning for tasks such as object detection, face recognition, language processing, and obstacle avoidance.

The rise of edge computing is an iteration of a well-known technology cycle that begins with centralized processing and then evolves into more distributed architectures. The internet itself started with a limited number of connected mainframes in government facilities and universities — it didn’t reach mass scale and affordability until “dumb” terminals that interfaced with mainframes were replaced by more capable PCs, which were able to render the graphics-rich pages of an emerging world wide web. Likewise, the mobile revolution largely accelerated when smartphones substituted feature phones at the edge of the cellular network. Edge computing will have a similar effect on the IoT, fueling strong ecosystem growth as end devices become more powerful and capable of running sophisticated applications.

Edge computing delivers tangible value in both consumer and industrial IoT use cases. It can help reduce connectivity costs by sending only the information that matters instead of raw streams of sensor data, which is particularly valuable on devices that connect via LTE/cellular such as smart meters or asset trackers. Also, when dealing with a massive amount of data produced by sensors in an industrial facility or a mining operation for instance, having the ability to analyze and filter the data before sending it can lead to huge savings in network and computing resources.

Security and privacy can also be improved with edge computing by keeping sensitive data within the device. For example, new retail advertising systems and digital signage are designed to deliver targeted ads and information based on key parameters set on field devices, such as demographic information. Edge computing in these solutions helps protect user privacy by anonymizing, analyzing, and keeping the data at the source rather than sending identifiable information to the cloud.

Processing at the edge also reduces latency and makes connected applications more responsive and robust. Avoiding device-to-cloud data round trips is critical for applications using computer vision or machine learning — for instance, an enterprise identity verification system or a drone tracking and filming its owner or an object. On-device machine learning can enhance natural language interfaces as well, allowing smart speakers to react more quickly by interpreting voice instructions locally, run basic commands such as turning lights on/off, or adjust thermostat settings even if internet connectivity fails. Moreover, edge computing brings “future proofing” to these systems by allowing over-the-air updates for the device software and the list of local commands it can run.

The proliferation of machine learning for IoT applications is a powerful driver for increased edge compute capabilities. Devices not only need to run complex deep learning networks quickly, they need to do so while consuming very little power since many IoT devices run on battery. This is prompting adoption of heterogeneous compute architectures — integrating diverse engines such as CPUs, GPUs and DSPs — in IoT devices so that different workloads are assigned to the most efficient compute engine, thus improving performance and power efficiency. In fact, DSPs have shown a 25X improvement in energy efficiency and an 8X improvement in performance versus running the same workloads on a CPU.

With edge computing, the opportunity for system architects is to learn how to harness the benefits of the available distributed computing power from end to end — tapping into the capabilities of field devices, gateways, and cloud altogether. Edge devices are being created with increasingly sophisticated compute capabilities. Couple that with not-so-far-off advanced connectivity technologies such as 5G, which will deliver faster, more robust, and massive connectivity, and it becomes obvious that we are about to witness the emergence of a new breed of smart devices and applications. It’s truly a fascinating time to watch and participate in this space.


This article is published as part of the IDG Contributor Network. Want to Join?

 

 

Reference Link

Attached Documents

The “CHARIOT IoT Search Index” aims to provide a web location where publications, articles, and relevant documents can be centralized hosted in a well-structured and easily accessed way.

Tags

Contact Us
Enter Text
Contact our department
123movie