Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
 

Cloud vendors want companies to use their platforms for the full scope of their IoT deployments, but that might not be their best choice. As edge computing emerges as part of IoT deployments, users must decide not only how often to send data to the cloud, but whether to send it there in the first...

The post Edge devices’ compute demands complicate cloud IoT choices appeared first on The Troposphere.


Cloud vendors want companies to use their platforms for the full scope of their IoT deployments, but that might not be their best choice.

As edge computing emerges as part of IoT deployments, users must decide not only how often to send data to the cloud, but whether to send it there in the first place. These decisions are particularly imperative for industrial customers and other settings where connected devices require more compute power nearby.

For starters, some edge devices have limited or no connectivity, so a steady stream of data transmission back to a cloud platform isn’t feasible. Furthermore, massive cloud data centers are typically located far from the source of IoT data, which can impact latency for data that requires quick analysis and decisions, such as to make an autonomous car change lanes. And some devices must process lots of data quickly or closer to the source of that information for compliance reasons, which in turn necessitates for more compute power at the edge.

AWS and Microsoft have begun to fill those gaps in their services with IoT services that extend from the cloud to the edge. AWS’ addition of Greengrass, its stripped-down software for edge devices, was particularly striking — for the first time in more than a decade of operations, AWS made its compute capabilities available outside its own data centers. That shift in philosophy illustrates just how much potential AWS sees in this market, and also some of the limitations.

With Greengrass and Azure IoT Edge, users now can streamline their IoT operations under one umbrella, and companies dabbling in IoT may find that attractive. Others may be drawn to the emerging collection of IoT vendors that process data as close to the source as possible.

Major cloud providers take a “cloud down” approach that uses existing big data technologies, but that emphasis doesn’t help if the business value of IoT requires decisions in a short timeframe, said Ramya Ravichandar, director of product management at FogHorn Systems. The startup company provides industrial customers machine learning at the edge, in partnerships and competition with those cloud providers.

Ravichandar cited the example of a review of system of assembly lines, where data is sent back to the cloud to run large-scale machine learning models to improve those systems, potentially across global regions.

“[The cloud is] where you want to leverage heavy duty training on large data stores, because building that model is always going to require bigger [compute power] than what is at the edge,” she said.

Users must decide if there’s value to send edge device data to the cloud determine where to store and process the data, weigh latency requirements and risks, and from all that determine costs and how to spread them between the edge and the cloud, said Alfonso Velosa, a Gartner analyst.

“We’re still figuring out how that architecture is going to roll out,” Velosa said. “Many companies are investing in it but we don’t know the final shape of it.”

The post Edge devices’ compute demands complicate cloud IoT choices appeared first on The Troposphere.


Read full article on Cloud Computing from IT knowledge exchange


Powered by Preisvergleich


My Tweets

Last Articles

How to access your Android phone's texts and photos in Windows 10

You can view photos and text messages from your Android device directly in Windows 10. Follow...

Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

The paperclip that everybody loves to hate is back as a sticker for Microsoft Teams, Redmond's...

Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the...

Java 12: What's new in the latest version of the programming language?

The latest release of the language promises a few notable improvements and is available to...

How to add 'Move to' and 'Copy to' to the context menu in Windows 10

Microsoft does not include "Copy to" and "Move to" by default in the Windows Explorer context...

Trello gets 13 new enterprise features to improve team security, productivity

The biggest Trello Enterprise update since 2015 gives organizations more security controls and...

How to see live captions and subtitles of your conversations in Skype

Get step-by-step instructions on how to view real-time captions and subtitles of your Skype calls...

The 3 least secure programming languages

These coding languages have the most open source vulnerabilities, according to a WhiteSource report.

Troubleshoot Outlook connectivity with these quick tips

When Outlook won't connect to the Exchange server, follow these steps before calling IT for help.

How to manage multiple installations of Office 365

It's easy to juggle all of your Microsoft Office 365 installations if you know where to go. Follow...

  • How to access your Android phone's texts and photos in Windows 10

    Wednesday, 20 March 2019 21:30
  • Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

    Wednesday, 20 March 2019 17:30
  • Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

    Wednesday, 20 March 2019 15:30
  • Java 12: What's new in the latest version of the programming language?

    Wednesday, 20 March 2019 14:30
  • How to add 'Move to' and 'Copy to' to the context menu in Windows 10

    Tuesday, 19 March 2019 16:30
  • Trello gets 13 new enterprise features to improve team security, productivity

    Tuesday, 19 March 2019 16:30
  • How to see live captions and subtitles of your conversations in Skype

    Tuesday, 19 March 2019 15:30
  • The 3 least secure programming languages

    Tuesday, 19 March 2019 14:30
  • Troubleshoot Outlook connectivity with these quick tips

    Monday, 18 March 2019 21:30
  • How to manage multiple installations of Office 365

    Monday, 18 March 2019 21:30