As more devices are generating more data, processing data by the device itself or by a local computer or server is the most efficient thing to do rather than being transmitted to a data center. And this is what edge computing does.

In edge computing, sensors and connected devices transmit data to a nearby edge computing device instead of transporting it back to the cloud or a remote data center. I.e. Instead of centralized data-processing edge computing uses decentralized data processing by enabling mobile computing and Internet of Things (IoT) technologies. Thereby supporting fast and secure access to data and enabling companies to put the right data in the right place at the right time.

In edge instead of transporting data back to the cloud or remote data centers, sensors and connected devices transmit data to a nearby edge computing device

With edge computing as data capture can be handled locally; general data, such as a person’s age and gender may be stored in the cloud for subsequent big data analysis, but actual private information of a person remains in the edge system.

Edge computing is way more secure than cloud computing because data is not traveling over a network, and it’s staying closer to where it was created. As there are fewer data in a corporate data center so there is less chance of being vulnerable if one of those environments is comprised.

Edge computing also saves networking and bandwidth costs because there is no need to move large amounts of data across geographic areas. And it provides an alternative to the limitations of the cloud computing especially in the locations such as an underground mine or an offshore oil platform that make it neither practical nor affordable, to send all data from machines to the cloud.

Due to connectivity issues at an offshore oil platform, it not practical to send all data from machines to the cloud. And it also takes a lot of time even if we send.instead of cloud computing at places like this it’s better to use an edge computing

But the only biggest risk with edge computing is losing physical access to your devices. By denial of service attacks, unsecured devices can be physically tampered. And the good news is there are a number of measures that can be implemented to reduce the risks associated with edge computing.  Security risks can be eliminated by controlling physical access to devices and by encrypting communications between devices. These steps will make it much more difficult for cybercriminals to get their hands on your data.


With the Internet of Things estimated to reach 7.5 billion devices by 2020, in the need of the hour Cloud’s Next Frontier edge computing will allows data produced by Internet of Things devices to be processed closer to where they have been created instead of sending its data across long routes to data centers or clouds in northern Europe, the United States or even arctic circle.

The best example of edge computing is autonomous vehicles. as there is a lot of data to be processed, with the help of edge computing driverless cars can progress towards full autonomy image: Intel

But the only constraint is as edge computing comes organizations may have hundreds of edge data centers to be monitored and managed in the future. Making it a tremendous infrastructure management challenge for us.