订阅 RSS 源

In 2019, the value of the global edge computing market was $3.5 billion. By 2027, it's projected to hit $43.4 billion, according to an edge computing stats and predictions review from The Enterprisers Project.

But the real question is whether organizations are actually adopting its technology, and if so, how?

That how aspect is quite important, being that edge computing does come with a wide variety of architectures with different goals in mind. Here are a couple of innovative use-case applications and architectural considerations for edge computing, as told by software and system experts designing these new architectures.

Edge computing for faster data processing

When someone thinks of the latest cloud computing innovation trends, they're probably not thinking of the retail or fast food industry. However, one very famous fast-food chain, Chick-fil-A, has used edge computing in conjunction with Kubernetes container orchestration and the concept of GitOps, to maintain its long-standing reputation as an industry leader in service and hospitality.

The secret behind the chain's speed and proficiency is running a Kubernetes cluster in every store. Sean Drucker, an executive technologist at Chick-fil-A, says that the chain serves one sandwich every 16 seconds at its peak. With well over 2,000 restaurants nationwide, that level of operational efficiency is achieved by hundreds of Internet of Things (IoT) devices reporting operational data back to the business. The plethora of fryers, grills, and refrigeration systems used for the food sends telemetry back and forth to a three-node cluster with only 8GB of RAM in each system. The cluster processes the data to keep every station stocked and working at max capacity. These "little data centers," as Drucker calls them, drastically increase the speed of these insights and offer a great lesson in edge computing architecture.

Edge artificial intelligence (AI): A risk-prevention tool versus a security concern

Juan Pablo, director of engineering at Artify, a web-based design editor, says he sees the potential of edge computing, though his company is still in the discussion phase of trying to understand just how edge fits the needs of their smaller organization.

"The fast rise of edge computing has shown that it has great potential to be used in any industry, but it's been difficult to implement it in real life due to logistics and infrastructure problems...However, we've been investigating and analyzing edge computing trends because it will be a very useful tool for data analysis," says Juan. "Now, security concerns involving AI technologies can generate a deep debate considering its pros and cons. Nevertheless, I like to see edge computing as a risk-prevention tool rather than as a technological menace. For example, by combining edge systems and new AI models, like DALL·E (an open AI program), new visual platforms can be created to identify real-time risk situations, such as industrial accidents, work accidents, or even car accidents. If AI visual models can understand the risk of a situation after seeing it through video cameras and communicate it to an edge network, high-risk situations can be prevented or attended to on time."

What Pablo is referring to is a kind of symbiotic cloud-to-edge architecture that allows edge computing to boost the processing speed of data through artificial intelligence (AI) to support computing performance and effectiveness. One of the benefits is real-time risk mitigation, where key insights are delivered more rapidly by bypassing the time it takes for data to be transmitted back and forth for processing. This kind of architecture is optimal for troubleshooting issues that can lead to system failures that need to be quickly addressed by the respective IT personnel. A few other real-life applications of edge AI are voice-recognition systems like Siri and Alexa, or highly tailored edge-monitoring solutions for oil rigs streaming data.

What about internal security concerns about implementing edge? "Edge computing, when managed by an effective DevSecOps program, doesn't pose any greater risk than other architectures," says Peter Clay, a former Deloitte & Touche chief information security officer (CISO) and CEO and founder of Cyberopz.

Peter identifies four key edge considerations to keep in mind when implementing your edge strategy:

  1. If a web server gets compromised, drop it and bring up a new one.
  2. Increase security monitoring to prevent surprises.
  3. Don't push mission-critical processes and services to the edge.
  4. Enable the IT team to preconfigure devices for testing prior to deployment.

Wrap up

Clearly, organizations are taking edge computing seriously. There are many ways to realize the advantages of computing capabilities housed at the environment's perimeter, local to the work that needs to be done—just look at the effectiveness of Chick-Fil-A's implementation.

Edge computing will continue to grow over the next decade and become an even more integral part of the cloud computing architecture.

Does your organization have a strategy for edge? Let us know in the poll above.


关于作者

Marjorie Freeman is the Associate Editor for Enable Architect. She has a diverse background ranging in everything from community advocacy, to digital design, and creative writing. Her professional career began a couple of years ago, where she discovered her passion for words and how they can be leveraged as a powerful tool in expressing ideas and connecting with new people. She hopes to develop her creative background professionally by becoming a proficient tech writer -- with a twist of flare. 

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

按频道浏览

automation icon

自动化

有关技术、团队和环境 IT 自动化的最新信息

AI icon

人工智能

平台更新使客户可以在任何地方运行人工智能工作负载

open hybrid cloud icon

开放混合云

了解我们如何利用混合云构建更灵活的未来

security icon

安全防护

有关我们如何跨环境和技术减少风险的最新信息

edge icon

边缘计算

简化边缘运维的平台更新

Infrastructure icon

基础架构

全球领先企业 Linux 平台的最新动态

application development icon

应用领域

我们针对最严峻的应用挑战的解决方案

Virtualization icon

虚拟化

适用于您的本地或跨云工作负载的企业虚拟化的未来