David Linthicum
Contributor

When not to use edge computing

analysis
May 07, 20213 mins
Cloud ComputingCloud Security

Enterprises are pushing the edge—edge devices, edge clouds, local systems on the edge. Proceed with your eyes wide open.

covering his eyes bu004744 100266305 orig
Credit: Thinkstock

Big companies such as General Electric, Siemens, and Robert Bosch are using edge computing technology to optimize production. Manufacturing is a large consumer of edge approaches and technology.

Typically, these edge systems are powered by artificial intelligence (AI) systems that parse production data at the source of the data. This enables them to make instantaneous decisions, such as adjusting the cooling systems in a factory so the welding robots can make more precise welds.

Although the value of edge computing is well understood at this point, it’s still being used to solve problems where it’s not needed. We’re back to ensuring that whatever technology is being hyped right now is still a good choice.

So, when is edge a good fit and when is it not? That’s really something to determine yourself, but I do have some general guidance.

The first and larger mistake that I’m seeing is deploying edge computing out of a desire for control more than need. If you think back to when private clouds were popular, they were the desired end state of those who pushed back on giving up physical control to public cloud providers.

The same seems to be occurring now. Some are using edge computing for control reasons, to keep most data local and off a public cloud. Also to keep the source of data closer to the processing for efficiency, which is the primary objective.

The reality is that edge computing is not cheap. In most cases, you need to purchase, maintain, and fix your own hardware and software stack (the edge). Multiply this times the number of edge systems, and the edge computing bill is likely to be much higher than non-edge systems.

Security is the second concern. It is easier and cheaper to secure data on the public cloud than on most edge-based systems. The more edge computing you have, the more the data is distributed, and the more difficult and costly it becomes to secure properly. Normally this means a higher risk of breach.

Many justified the additional security risks because of the physical proximity of the data. I mean if I can see and touch the storage device then it’s secure, right? That’s not the way it works; most major breaches during the past year have been on systems the owners were standing next to.

I’m not saying you need to be overly cautious. Just that you need to evaluate any new technology with both eyes open and an objective view of the technology’s value and purpose. Edge is just our latest challenge.

David Linthicum
Contributor

David S. Linthicum is an internationally recognized industry expert and thought leader. Dave has authored 13 books on computing, the latest of which is An Insider’s Guide to Cloud Computing. Dave’s industry experience includes tenures as CTO and CEO of several successful software companies, and upper-level management positions in Fortune 100 companies. He keynotes leading technology conferences on cloud computing, SOA, enterprise application integration, and enterprise architecture. Dave writes the Cloud Computing blog for InfoWorld. His views are his own.

More from this author