Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / How to Sharpen the Blurriness in Edge Computing

How to Sharpen the Blurriness in Edge Computing

February 20, 2020 by cbn Leave a Comment

IT and end users need to collaborate and agree on policies and procedures for edge security, software updates, asset management and technology deployment.

Image: Shutterstock

Image: Shutterstock

From networks and integration to failover, asset management, and security, there will be plenty for IT to do to ensure adequate support for edge technology. Here are 10 key areas of critical work:

1. Zero-trust networks and security. Passwords are shared on the production floor; and physical cages, intended to secure equipment, will be left open. These are inevitable occurrences in settings where most business users (and their managers) aren’t IT-savvy.

If you are IT, you have a responsibility to manage security across the enterprise. That includes what goes on at the edge. One approach to edge security is implementing zero-trust networks that automatically verify IP addresses and authenticate users from both inside and outside corporate walls. Zero-trust networks are well suited to the edge because they don’t depend upon end users to administer daily security. For physical security, video cameras around storage cages and technology deployment points can help.

2. Coordination with end business areas. Production, engineering, and operational managers are judged by the competencies and services they provide, not by their IT. But that doesn’t change the fact that appropriate security, governance, integration, data handling, and communication are needed at the edge. IT needs to do this, as well as provide technology support. These tasks should be performed in a cooperative and enabling spirit, not in a “big hammer” enforcement approach. The more IT and end users can work together harmoniously and cooperatively, the better life will be at the technological edge.

3. Vendor management. End users might initially contact and contract with edge vendors, but IT ultimately manages these vendor relationships. SLAs should be enumerated and monitored for performance and for uptime. Vendors should also be vetted for product support and enhancements. These are all areas IT is well suited for. To do this, IT must identify and keep pace with edge software, hardware, devices and network vendors to make sure that all the products and vendor relationships are documented and covered.

4. Vetting vendors. Vendors at the edge, like any other supplier, should be financially stable, have excellent and scalable solutions, and be willing to stand behind the technology they deliver. Equally important is vendor commitment to enterprise security, as all too many edge products are installed with default security based upon the minimal requirements of the technology. Because of this, IT should be actively involved in ensuring that new edge technology is properly secured to meet enterprise security standards.

5. DR planning and testing. Enterprise disaster recovery plans should be continuously updated for edge computing as it is being deployed. This is difficult to plan, budget, develop, and test for, since DR has historically been a background project that waits until other mission-critical projects with greater visibility are completed.

This shouldn’t be the case with edge technology, as it presents more risks and vulnerabilities than IT that is managed 24/7 in the data center.

Organizations lag when it comes to updating DR plans for edge computing,” said Dan Olds, partner at research firm OrionX Network. “Mission-critical systems, networks and devices that exist at the edge should be identified and planned for . . . You should also test your DR plan on a regular basis.”

6. Equipment tracking and asset management. Misplaced smart phones are a major issue in the consumer world and in companies. Other types of equipment and supplies can also be misplaced internally or in the field. In some cases, IT may not even be aware that these items belong to the company, especially when users at the edge are provisioning it.

An asset management system with sensor-tracking attached to devices can be a real help, with IT serving as the command center.

7. Have a strategy to deal with timely software updates and unusual operating systems. A diversity of edge technology and devices, many with proprietary operating systems, means that IT must find a way to keep all software updates current. This is especially important when vendors issue OS updates to correct security deficiencies.

An automated software distribution system with “push” settings for updates can help in this process.

8. Systems sunsetting. When new technology is deployed at the edge, it often displaces older technology. At remote edge facilities, end business users tend to stow old equipment away in closets and bays and then forget about it. They might not think about sensitive data that could be stored on that equipment. By regularly checking technology inventory and instituting “sunset” policies and procedures that decommission and disburse antiquated equipment, IT can address this problem.

9. Bandwidth strategy. Have you revisited your IT data, networks, storage and processing architecture for best of class performance at the edge as well as in the data center?

Your strategy might entail storing data locally at edge locations, and then either importing the data to a central data repository or leaving the data where it is. Alternately, cloud services can be used for storage and processing. In other cases, real-time data must be sent to remote and central sites around the company.

In all cases, planning for the edge is likely to disrupt former bandwidth allocations, since data payloads to and from the edge will increase.

You also must plan for 5G, as the communications protocol won’t work with a number of edge and mobile devices that are already in production. Financially, 5G deployments may also need to be timed with asset retirement and replacement cycles.

10. Integration and investment protection. In one use case, a company had thousands of legacy scanners at the edge that it needed to integrate with its ERP, manufacturing, and supply chain systems. With each scanner costing several thousands of dollars, the company couldn’t afford to just throw the scanners away. The company hired a data integration specialist (HULFT) to link all of the scanners into its systems with the use of HTML calls that HULFT developed.

This is just one example of the need for companies to modernize and onboard new technologies at the edge, without disrupting the investments in systems that they’ve already made.

Summing up

The growth of shadow IT and end user insertions of new technologies at the edge without IT’s knowledge suggest that IT might not be involved, but ultimately, IT will be. There simply isn’t any department better positioned or qualified to do the work of system, network, data and device integration, security, performance and tracking.

To do this at the edge, IT and end users need cooperative and collaborative relationships, with agreed upon policies and procedures in place for edge security, software updates, asset management and technology deployment.

It isn’t easy to achieve, but it’s a necessity when you live and deploy at the edge.

Mary E. Shacklett is an internationally recognized technology commentator and President of Transworld Data, a marketing and technology services firm. Prior to founding her own company, she was Vice President of Product Research and Software Development for Summit Information … View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.

More Insights

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: Uncategorized

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • How Azure Cobalt 100 VMs are powering real-world solutions, delivering performance and efficiency results
  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,322)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in