Edge computing works by selectively moving cloud-compute processing from cloud data centers to edge and end node processing platforms. Edge computing also helps to guarantee user’s privacy and security by sanitizing traffic to the Cloud, filtering personally identifiable information where necessary.
Edge computing systems often operate over public networks, consequently they require integration of both wired and wireless network connectivity and importantly, they require being built with a hardware root of trust. Hardware root of trust is an approach to computing where the processing of security algorithms as well as key and certificate storage are performed in trusted hardware. Hardware-based trust systems are much more robust than software-based systems against cyber-attacks seeking to compromise software-based systems.
So, what do you think: Will Edge Computing Transform IoT as Cloud Computing Transformed Enterprise IT?
(If you aren't sure, then please join me as I host our first (of many) edge computing webinars: IoT Webinar: Computing at the Edge - When, Why and How )
Top Comments