Flawless Execution – Computing At The Edge

Edge computing – what is it? How does it work? Where does it apply? Tyler Kern discusses the possibilities and use cases with Bill Pfeifer, Edge Message Director of Dell Technologies. “At Dell, we define the edge as the place where data is acted on, near its point of creation, to generate immediate essential value,” said Pfeifer. The edge gathers data that could otherwise be compromised in the cloud or has a short-term value.

A recent Forbes article described it as “edge computing goes beyond the traditional type of computing, such as existing mobile phones or personal computers.” The concept is that edge captures data, runs it through AI algorithms to gain insights, then runs it through a processor to trigger the desired action. The distributed computers sense local environments and enable devices to perform actions independent of humans but consistent with wants. “We’re capturing this streaming data. Again, it’s usually privacy-sensitive, or speed-sensitive, or size-sensitive,” said Pfeifer.
The autonomous vehicle is a prime example of edge computing. An immense amount of video data is collected, processed, and triggers the desired action. “Five minutes later, that video is worth nothing. But in sub-second response time type stuff, it’s immensely valuable,” said Pfeifer.

Recent Episodes

 In today’s rapidly evolving business landscape, B2B customers expect more than just reliable services—they want proactive partners who deliver personalized value. A Deloitte study found that 62% of B2B customers made additional purchases after a positive customer service experience, underscoring how deeply customer satisfaction influences growth and retention. For security firms, this reinforces…

Despite growing gender diversity in many industries, the security field continues to be largely male-dominated. However, that landscape is evolving as more women in security step into leadership roles, challenge long-standing norms, and contribute to a more inclusive culture. Through mentorship, development programs, and increased visibility, this shift is not only empowering individuals but…

From AI-driven surveillance to dynamic mobile guarding, the way we secure commercial real estate, corporate campuses, and critical infrastructure is undergoing a major transformation. As high-value assets face increasingly complex threats, security is no longer just about cameras and guards—it’s about predictive insights, global awareness, and resilience planning. According to a Securitas discussion,…