Flawless Execution: Computing At The Edge
Edge computing – what is it? How does it work? Where does it apply? Tyler Kern discusses the possibilities and use cases with Bill Pfeifer, Edge Message Director of Dell Technologies. “At Dell, we define the edge as the place where data is acted on, near its point of creation, to generate immediate essential value,” said Pfeifer. The edge gathers data that could otherwise be compromised in the cloud or has a short-term value.
A recent Forbes article described it as “edge computing goes beyond the traditional type of computing, such as existing mobile phones or personal computers.” The concept is that edge captures data, runs it through AI algorithms to gain insights, then runs it through a processor to trigger the desired action. The distributed computers sense local environments and enable devices to perform actions independent of humans but consistent with wants. “We’re capturing this streaming data. Again, it’s usually privacy-sensitive, or speed-sensitive, or size-sensitive,” said Pfeifer.
The autonomous vehicle is a prime example of edge computing. An immense amount of video data is collected, processed, and triggers the desired action. “Five minutes later, that video is worth nothing. But in sub-second response time type stuff, it’s immensely valuable,” said Pfeifer.
The use of the edge is unique to a range of industries. “It’s getting much more vertical-specific, and it’s custom tailored,” said Pfeifer. Streamlining operations, implementing AI, improving energy management, enhancing employee safety, and site management are a few uses evaluated in a recent article from Enterprise Project. Pfeifer discussed streamlining a traffic camera system. Before implementing edge computing, the intersection had six different cameras for processing different information. One was for facial recognition, another for speeding, and another to register license plates. The edge computing solution reduced the camera to one and processed the information six times. Listen to the entire episode now for additional insights on the exciting possibilities of edge computing.
Latest
Identifying Lightning Damage on Pecan Trees: Tips from TreeNewal
Join ISA Certified Arborist Wes Rivers from TreeNewal as he examines the aftermath of lightning damage on a pecan tree. In this insightful video, Wes highlights the path taken by the lightning bolt through the tree, causing superheating of the water inside. The resulting vapor expansion creates visible damage to the tree. The tree’s survival […]
Transforming Coverage to Meet Healthcare Needs with SCAN Health Plan
John Petito, SVP of Transformation at SCAN Health Plan joins the podcast to share his story and how his work is helping enable new types of healthcare coverage for diverse populations. Join us to hear how Health Plans are beginning to evolve their approach to addressing the needs of older adults and the LGBTQ+ community […]
Finding Your Identity with Dustin Odham
In an era where screens dominate our time, finding your personal identity becomes a challenge. Our generation is shaping itself based on an increasingly virtual world, often losing touch with the inner self. In fact, a recent study suggests that we could end up spending at least ten years of our life in front of […]