Flawless Execution – Computing At The Edge

Edge computing – what is it? How does it work? Where does it apply? Tyler Kern discusses the possibilities and use cases with Bill Pfeifer, Edge Message Director of Dell Technologies. “At Dell, we define the edge as the place where data is acted on, near its point of creation, to generate immediate essential value,” said Pfeifer. The edge gathers data that could otherwise be compromised in the cloud or has a short-term value.

A recent Forbes article described it as “edge computing goes beyond the traditional type of computing, such as existing mobile phones or personal computers.” The concept is that edge captures data, runs it through AI algorithms to gain insights, then runs it through a processor to trigger the desired action. The distributed computers sense local environments and enable devices to perform actions independent of humans but consistent with wants. “We’re capturing this streaming data. Again, it’s usually privacy-sensitive, or speed-sensitive, or size-sensitive,” said Pfeifer.
The autonomous vehicle is a prime example of edge computing. An immense amount of video data is collected, processed, and triggers the desired action. “Five minutes later, that video is worth nothing. But in sub-second response time type stuff, it’s immensely valuable,” said Pfeifer.

Recent Episodes

In today’s fast-evolving security landscape, intelligent video management is no longer a luxury—it’s a necessity. AMAG’s Symmetry CompleteView Video Management System rises to meet this demand with a powerful, scalable solution that adapts to organizations of any size. Designed with open architecture and user-friendliness at its core, the system offers seamless integration and effortless deployment….

In today’s fast-paced, security-conscious environment, managing who has access to what—and when—is more critical than ever. That’s where Symmetry CONNECT Identity Management by AMAG comes in, offering a powerful, streamlined solution for physical identity and access management (PIAM). With growing compliance demands and increasingly complex workforces, organizations need tools that can automate onboarding, simplify credentialing,…

In the world of security technology, vision has long taken precedence—cameras, analytics, and access control have dominated the conversation. But what if we’ve been underestimating our oldest, most human sense of communication: voice? The rise of intelligent audio in security systems marks a turning point in how we protect spaces and people, shifting from…