edge   3983

« earlier    

CES Asia 2018 Showcases the Bleeding Edge in Mobility Tech and More
Held in Shanghai over the course of three days, CES Asia 2018 brings the world’s hottest consumer electronics show to Asia. In its fourth instalment in the Chinese city, CES Asia refined and developed its goal of showcasing the tech of the region in one place. With the main show in Las Vegas held six...

The post CES Asia 2018 Showcases the Bleeding Edge in Mobility Tech and More appeared first on .
CES  Asia  2018  Showcases  the  Bleeding  Edge  in  Mobility  Tech  and  More 
4 days ago by vrzone
The future of computing is at the edge
June 6, 2018 | FT | by Richard Waters in San Francisco.

With so much data being produced, sending it all to cloud does not make economic sense.

The economics of big data — and the machine learning algorithms that feed on it — have been a gift to the leading cloud computing companies. By drawing data-intensive tasks into their massive, centralised facilities, companies such as Amazon, Microsoft and Google have thrived by bringing down the unit costs of computing.

But artificial intelligence is also starting to feed a very different paradigm of computing. This is one that pushes more data-crunching out to the network “edge” — the name given to the many computing devices that intersect with the real world, from internet-connected cameras and smartwatches to autonomous cars. And it is fuelling a wave of new start-ups which, backers claim, represent the next significant architectural shift in computing.....nor.ai, an early-stage AI software start-up that raised $12m this month, is typical of this new wave. Led by Ali Farhadi, an associate professor at University of Washington, the company develops machine learning algorithms that can be run on extremely low-cost gadgets. Its image recognition software, for instance, can operate on a Raspberry Pi, a tiny computer costing just $5, designed to teach the basics of computer science......That could make it more economical to analyse data on the spot rather than shipping it to the cloud. One possible use: a large number of cheap cameras around the home with the brains to recognise visitors, or tell the difference between a burglar and a cat.

The overwhelming volume of data that will soon be generated by billions of devices such as these upends the logic of data centralisation, according to Mr Farhadi. “We like to say that the cloud is a way to scale AI, but to me it’s a roadblock to AI,” he said. “There is no cloud that can digest this much data.”

“The need for this is being driven by the mass of information being collected at the edge,” added Peter Levine, a partner at Silicon Valley venture capital firm Andreessen Horowitz and investor in a number of “edge” start-ups. “The real expense is going to be shipping all that data back to the cloud to be processed when it doesn’t need to be.”

Other factors add to the attractions of processing data close to where it is collected. Latency — the lag that comes from sending information to a distant data centre and waiting for results to be returned — is debilitating for some applications, such as driverless cars that need to react instantly. And by processing data on the device, rather than sending it to the servers of a large cloud company, privacy is guaranteed.

Tobias Knaup, co-founder of Mesosphere, another US start-up, uses a recent computing truism to sum up the trend: “Data has gravity.”....Nor are the boundaries between cloud and edge distinct. Data collected locally is frequently needed to retrain machine learning algorithms to keep them relevant, a computing-intensive task best handled in the cloud. Companies such as Mesosphere — which raised $125m this month, taking the total to more than $250m — are betting that this will give rise to technologies that move information and applications to where they are best handled, from data centres out to the edge and vice versa...Microsoft unveiled image-recognition software that was capable of running on a local device rather than its own data centres.
cloud_computing  decentralization  edge  future  Industrial_Internet  IT  artificial_intelligence  centralization  machine_learning  Microsoft  data_centers 
13 days ago by jerryking
How to Secure Edge Computing
So what are the steps to secure edge computing? (1) Encrypt Everything: By encrypting all data, even if data is stolen an attacker will have limited utility. (2) Use Secure Tunnels: As edge computing isn't all located within a secured data center, connectivity should be hardened with the use of VPNs and secure tunnels. (3) Constant Iteration Beyond Initial Setup: Organizations that are deploying edge computing need to have processes in place to enable constant iteration beyond the initial setup to deal with patching and emerging security issues. (4) Employ Pro-Active Threat Detection: Since edge computing by definition is not centralized, it's critically important for providers to employ proactive threat detection technologies to identify potential issues early. (5) Automated Patching and Assertion: Given that edge computing can potentially involve large numbers of distributed devices, there is a need to make sure that patching is automated that a given patch has been validated and properly implemented.
security  iot  iiot  edge 
19 days ago by dlkinney
Microsoft Is Losing Its Edge in the Browser Efficiency Race
Despite the growing ubiquity of competitors like Chrome in the past few years, Microsoft has been trying to shift more users to adopt Edge as their primary browser. Edge was launched along with Windows 10, back in 2015, replacing the venerable Internet Explorer as the default browser for Windows. While Microsoft retained Internet Explorer’s logo...

The post Microsoft Is Losing Its Edge in the Browser Efficiency Race appeared first on .
Microsoft  Is  Losing  Its  Edge  in  the  Browser  Efficiency  Race 
23 days ago by vrzone

« earlier    

related tags

-  10  2018  55  5g  =  a  adn  ai  algorithm  algorithms  alpha  amd  an  and  angeles  appguard  application  apps  ar  arm  artificial_intelligence  asia  attractor  auth  automation  aws  azure  backing  basicauth  be  beamer  belt  bernut  bestpractice  bleeding  boundaries  boundary  bros  browser  browsers  bug  building  bundling  bypass  c#  california  camera  capital  cases  cdn  center  centralization  ces  chip  chrome  cloud  cloud_computing  cloudflare  cloudfront  collection  come  compatibility  complexity  computing  connected_devices  contributed  css  cssgrid  cyclocomputer  data  data_centers  datacenter  decentralization  defender  denormal  deployment  depth  design  dev  development  diff  digital  distributed  download  driver  dust  e-mail  effect  efficiency  email  embrace  embracing  enterprise  ericsson  erlang  esports  essay  exploit  facebook  fail  feature  featurequeries  festool  figure  file  filter  finder  firefox  five  floating  for  fractal  frax  fridayfrontend  fundamental  future  gains  garmin  geometry  glass  go  gpo  gps  graph  grids  grisp  ground  group  guide  hack  hardcore  hardware  hernandez  home  how  howto  hybridcloud  ibm  ie  ie8  iiot  impedance  improvement  in  industrial_internet  infinite  infinity  input  install  instapaper  intel  internetofthings  interview  into  ios  iot  iphone  is  it  its  javascript  jm  json  juliaset  kaikrause  kdtree  kernel  kmax  l.a.  lambda  laurent  layout  learning  led  lighting  limit  loadbalancer  los  losing  machine  machine_learning  machinelearning  machining  maglev  mainstream  man's  mandelbrot  mantenimiento  manual  marketing  math  mcescher  mec  microscope  microsoft  millingmachine  minutes  ml  mobile  mobility  more  music  nadella  nan  nearestneighbor  networks  neuro  newsletter  node  numerical  on  op-ed  opcua  opera  ovum  own  painting  paper  path  pcb  placeholder  point  policy  polyfill  poor  private  progressivewebapps  punk  pwa  qa  race  radeon  range  rank  raspberrypi  realm  report  research  rest  resx  ripped  router  rs5  safari  samsung  sander  sander:  satya  scale  science  scrollbar  scrolling  search  secure  security  selfsimilarity  sense  sensor  server  serverless  service  shape  sharepoint  shipwright  showcases  skiff  software  spiral  stalag  stalag13  starting  statistics  status  stories  straight  summit  svg  sysadmin  system  tab  tc  tech  techcrunch  telco  telcom  testing  texture  the  thingsconnl  tile  tips  to  top  torn  totalboat  trading  traffic  tricks  ts  updates  usb  user’s  vagrant  video  virtual  virtualbox  vision  visualiser  vm  vulnerability  wdag  web  webdev  wet  why  will  win10  windows  windows10  windows7  windows8  witch  with...  with  wordpress  work!  work  workers  writing  year  youtube  zoom  |     

Copy this bookmark:



description:


tags: