Brooks Canavesi Logo
  • Home
  • Blog
  • Contact
Brooks Canavesi Logo

  • Home
  • Blog
  • IoT

Edge Computing: The Future of The Internet of Things

Written by Brooks Canavesi on August 29, 2017. Posted in IoT, Technology trends

During 2017, Gartner expects the total number of Internet of Things (IoT) devices to grow by 31 percent. Currently, most of these devices are connected to the cloud, but that may change soon as enterprises will find it increasingly difficult to meet the computing demands of modern IoT devices and connected applications.

The cloud, the technology that has made it possible to move processing for large in-house data centers and individual devices to infinitely scalable infrastructures owned by third-party companies, such as Microsoft, Google, and Amazon, isn’t without its limits.

Privacy conscientious enterprises don’t like sending all their data outside their premises with no control over what exactly they send and what they keep to themselves or delete altogether. Developers of data-driven intelligent applications require nearly real-time data processing with a single-digit latency—something that the cloud and the current wireless technologies can’t easily provide.

A new enterprise infrastructure is emerging, and industry experts expect that it will become the most preferred architecture for IoT solutions. “The next big thing for enterprise IT comes in the form of edge computing—a paradigm where compute moves closer to the source of data,” writes Janakiram MSV, an analyst, advisor and an architect at Janakiram & Associates.

“Edge computing is a new paradigm in which substantial computing and storage resources—variously referred to as cloudlets, micro datacenters, or fog nodes—are placed at the Internet’s edge in close proximity to mobile devices or sensors,” explains The Emergence of Edge Computing paper by Mahadev Satyanarayanan from Carnegie Mellon University.

The edge is an exciting place full of sensors, modules, actuators, including GPS receivers, valves, motors, temperature and light sensors, and others. These devices receive instructions from applications running in the cloud, and they, in turn, gather various data, creating a complete feedback loop.

With edge computing, the data gathered by edge devices is sorted into two broad categories: hot and cold. Hot data are critical and should be processed as soon as possible. On the other hand, cold data can be processed with a substantial delay because they contribute only to long-term analytics based on historical trends moves.

Because hot data should be processed instantaneously, it makes sense to leverage the computational power of the edge itself, instead of sending them to a public cloud. The processing could be performed by a smart car, a smartphone, or a home automation system. It will be up to complex event processing engines to decide whether to process data locally or let the cloud infrastructure handle it.

Benefits of Edge Computing

Enterprises currently face many problems when running data-centric workloads in the cloud. Even with a direct fiber optics connection, latency is limited by the speed of light. For systems where a few milliseconds could mean the difference between life and death, such as self-driving cars, edge computing is the obvious way how to minimize latency as much as possible.

When the bulk of data generated by edge devices is processed locally, at the edge, the overall bandwidth demand into the cloud is considerably lower. Security video cameras tend to be extremely bandwidth-demanding even though the video footage they capture is usually stored only for a few hours and rarely seen by a human being. This video footage could be stored and analyzed locally, with only metadata being sent to the cloud.

Because edge computing allows enterprises to retain sensitive data on-premises for as long as they want, it addresses growing concerns over data privacy arising from IoT system centralization. It would be up to each enterprise to set privacy policies that govern the release of the data to the cloud.

Finally, the ability of the edge to function independently of the cloud makes it much more resilient to network outages and malicious denial-of-service attacks. As more cities around the world become smarter than ever, they will have to make security one of their priorities to ensure safety and privacy of their residents.

Conclusion

The benefits of edge computing are numerous, but so are the technical challenges. The current edge comprises of countless devices with distinct roles, and managing them in a centralized way seems almost impossible. More realistically, a new generation of connected devices will emerge and make the old generation obsolete.

This presents us with the classic chicken and egg problem: How to convince companies to develop solutions for an infrastructure that’s not here yet. Just like with the web, the technology itself will have to be sufficiently appealing on its own to attract enough early adopters to reach a certain critical mass.

  • Continue Reading
  • No Comments

Ransomware: The Main Enemy of the Connected Era

Written by Brooks Canavesi on April 10, 2017. Posted in Blog, IoT

Three years from now, the number of Internet-connected things will reach 50 billion. According to an IDC forecast, the worldwide market for IoT solutions will grow from $1.9 trillion in 2013 to $7.1 trillion in 2020. More consumers than ever will purchase internet-connected clothing, smart home appliances, fitness trackers, healthcare monitors, and smart cars. These devices could become the target of the next generation of ransomware, a type of malware designed to block access to an electronic device until a sum of money is paid.

Ransomware Works

Recently, a server of a police department in Cockrell Hill, Texas, was encrypted by a group of hackers who used an email with a spoofed address to infect the system and demanded $4,000 to unlock the files, reports Dark Reading. The police ignored the demand of the hackers and lost eight years of documents, photos, and videos.

The police department in Texas wasn’t the only victim of cyber-attacks. According to the 2016/2017 Kroll Annual Global Fraud and Risk Report, 85% of executives say they were hit with a cyber incident in the past year. A survey by Risk Based Security revealed that, in 2016, over 4.2 billion records were exposed in 4,149 cyber incidents.

As illustrated by the rise in ransomware distribution, hackers have apparently finally found an effective way how to make a good living. “2016, also designated as ‘year of ransomware’ has seen enormous growth in Ransomware diffusion, transmission and ransom thieving. So much so, that criminals have made cyberware models and invite amateur crooks to host the Ransomware flag to newer heights. The wreak havoc is seeing no stoppage anytime soon. Until now, Ransomware flow has seen an increase of 500% from the previous year,” writes Minal Khatri.

IoT Under Attack

As the market for IoT devices grows, it will become an increasingly more viable target for a new generation of ransomware attacks. Right now, manufacturers and security researchers spend around $350 million on IoT security. This number is expected to reach $547 million in 2018. An infographic published by GSMA shows that 47% of IoT developers consider security as their top concern. What’s more, 60% of consumers worry about a world of connected things, naming privacy as their main concern and security as their number one worry.

There are two things we can take away from this. First, cyber-attacks, and ransomware, in particular, are real threats that could catastrophically disrupt entire states, let alone the lives of individuals. Second, both manufacturers and consumers are aware of these threats and do their best to fight them. There are now several authoritative IoT security and privacy guidelines, and more will surely appear in the future.

Only time will tell who will gain the upper end in the upcoming cyber-war, but it’s clear that more effective mitigation and prevention methods are needed.

  • Continue Reading
  • No Comments
  • 1
  • 2
  • 3
  • 4

Blog Categories

  • Software & App Sales
    • Sales Strategy
    • Sales Management
  • Mobile App Development
    • User Experience & Interface Design
    • Technology trends
  • Technology Tips & Tricks
  • Personal

Tags

Fill Rate CTR boating icloud ios bigdata robotics ai hearables google cloud azure app dev smart home augmented reality smartdevices fitness virtual reality vr security mobility mobile mobile app mobile apps mobile application development wearables smart devices enterprise mobility ar 5g Xamarin Internet of things microsoft xiaomi smartglasses smartphone hud cellular design ipad wakeboarding 2005 eCPM in-app purchasing

  • Home
  • Blog
  • Contact
  • Home
  • Blog
  • Contact