https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

IoT/Smart X


Partner content

The Edge vs. Cloud debate: Unleashing the potential of on-machine computing

The Edge vs. Cloud debate: Unleashing the potential of on-machine computing

  • Written by Krishna Rangasayee / IoT World Today
  • 5th August 2023

Edge computing is at a tipping point – it’s time to unleash the potential of the edge. The cloud is dead and long live the era of the edge.

Ten years ago, technology transformation meant embracing a move to the cloud for decentralized computing and processing of the massive amounts of data enterprises generate and manage to run their businesses. Since then, computing has evolved dramatically, swinging back and forth between more centralized or on premise approaches to hybrid models in the cloud. All that’s changing. 

The most exciting developments in compute architecture are happening at the edge as software innovation moves away from the cloud. By 2028, a majority of enterprises will be using edge computing, according to the Linux Foundation. In addition, Gartner predicts that by 2025 more than 50% of enterprise-generated data will be processed outside a traditional centralized data center or cloud. This prediction is already playing out as the cloud begins to lose its hold and relevance, evidenced by the slowing of its previously sustained growth. Most recently in the first half of 2023, the largest hyperscalers reported for the first time a slowdown in their cloud businesses. 

With the recent rapid rise of AI services and systems creating a demand for more optimized and efficient computing, this makes sense. It is estimated that up to 20% of the world’s total power will go to computing by the end of the decade unless new compute paradigms are created. We can’t afford the power consumption data centers require and we are reaching a limitation of what they can effectively process. Ultimately, we need to move closer to where the data is created for real-time insight, review, security and feedback. 

And this need is only accelerating. According to Gartner, in 2018, 25% of enterprise-generated data was created and processed at the edge. In 2025, Gartner expects that 75% of enterprise-generated data will be created and processed at the edge. 

If the future of software innovation is AI; AI and the advancement of machine intelligence will only be accelerated by the edge. This opportunity is massive with the expectation that enabling AI and ML for these edge devices will be a $76 billion market by 2031. This is the foundation of the biggest technological shift we will see this decade, modernizing industries into the 21st century with endless, transformative applications that touch every aspect of our lives.

Why Is the Tide Turning Back to “on-Machine Computing”?

There are three core benefits in returning to centralized computing at the edge – the instantaneous speed to process and analyze data, the additional control and security over an enterprise’s information and the ability to manage costs more efficiently.

Enterprises can no longer afford the latency of the cloud. We have to get closer to the compute. More than ever before, enterprises run on access to real-time insights. Any business process that requires seamless speed of information must bring the compute to the data at the point of its creation and consumption. This is even more evident when leveraging AI and ML as seconds and minutes matter most in the moment of analysis and decision-making. There is a limitation in the cloud for immediate feedback. Most processes cannot wait the time it takes to send the information to the cloud and have it return a result. Imagine an autonomous vehicle’s reaction time to avoid running into an unexpected pedestrian. The AV does not have the luxury of time to wait for the cloud to return an insight on the unforeseen obstacle in its path.

In addition, the edge offers companies more opportunity to keep the data within their own walls. As concerns of software supply chain hacks and security threats continue to grow, the edge removes the need to constantly move large amounts of data. This also increases reliability, privacy, and compliance with ever-evolving regulatory requirements. Ultimately, the edge gives enterprises an additional layer of self-governance and autonomy over their information. 

Finally, if an enterprise owns its compute, it can be more cost-efficient than managing it in the cloud. The edge requires less bandwidth and network resources. Devices do not have to continually connect to the internet for data transfers and the edge reduces the costs of network usage. The ongoing movement of data within cloud hosting services is one of the largest operating costs for an organization. Also, the more data that’s moved, the more it costs. The edge eliminates the need to move data since it’s processed within the location it’s generated and reduces the bandwidth required to manage the data load.

To read the complete article, visit IoT World Today.

Tags: Alerting Systems Analytics Applications Artificial Intelligence Coverage/Interference Critical Infrastructure Cybersecurity Drones/Robots Enterprise Federal Government/Military Funding Incident Command/Situational Awareness Internet of Things Internet of Things Interoperability IoT/Smart X News Policy Public Safety Public-Safety Broadband/FirstNet Security Software State & Local Government Subscriber Devices System Design System Installation System Operation Tracking, Monitoring & Control Partner content

Most Recent


  • Cyberattack closes emergency rooms in three states
    Ardent Health says it was the target of a cyberattack over Thanksgiving, in an incident that shut down the hospital operator’s emergency rooms in three states. The hospital operator, which oversees 30 hospitals in the U.S., said the attack was detected on the morning of Nov. 23 and was identified as a ransomware attack impacting […]
  • General Electric, DARPA hack claims raise national-security concerns
    General Electric and the Defense Advanced Research Projects Agency (DARPA) have reportedly been breached, according to claims on the Dark Web that the organizations’ highly sensitive stolen data is up for sale. A screen capture from the Dark Web ad shows a threat actor named IntelBroker selling access credentials, DARPA-related military information, SQL files, and more. GE confirmed to […]
  • More 2G and 3G shutdowns loom in the U.S.
    UScellular and Cellcom recently set dates to shutter their aging wireless networks. The smaller network operators are following in the footsteps of their bigger, nationwide rivals, which are making similar moves. On its website, UScellular said it would shutter its 3G CDMA network on January 14, 2024. “Major wireless carriers have already shut down their […]
  • Report: Local cybersecurity programs are facing headwinds as threats, technologies evolve
    The evolving technological landscape isn’t just changing the nation’s social and economic norms, it’s also pushing local governments to adapt. A new analysis from the Public Technology Institute provides a snapshot of the challenges local cybersecurity programs are facing, and the priorities of city and county administrators as they guide organizations through an unprecedented era […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Autonomous, sustainable robot cleans solar panels
  • AT&T, Intrado launch new school-safety solution
  • Lessons not learned from software supply-chain attacks
  • Security roundup: AT&T, Verizon, Lumen join forces in security coalition

Commentary


Land mobile radio (LMR) systems are just as vulnerable to cyberattacks as any other networks used in the public-safety sector. Here’s what to do about it.

  • 1
7th November 2023

September 3GPP Plenary meetings feature Release 18 progress, Release 19 beginnings

13th October 2023

Better technology can help solve the public-safety staffing crisis

26th June 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.