Flawless Execution – Computing At The Edge

Edge computing – what is it? How does it work? Where does it apply? Tyler Kern discusses the possibilities and use cases with Bill Pfeifer, Edge Message Director of Dell Technologies. “At Dell, we define the edge as the place where data is acted on, near its point of creation, to generate immediate essential value,” said Pfeifer. The edge gathers data that could otherwise be compromised in the cloud or has a short-term value.

A recent Forbes article described it as “edge computing goes beyond the traditional type of computing, such as existing mobile phones or personal computers.” The concept is that edge captures data, runs it through AI algorithms to gain insights, then runs it through a processor to trigger the desired action. The distributed computers sense local environments and enable devices to perform actions independent of humans but consistent with wants. “We’re capturing this streaming data. Again, it’s usually privacy-sensitive, or speed-sensitive, or size-sensitive,” said Pfeifer.
The autonomous vehicle is a prime example of edge computing. An immense amount of video data is collected, processed, and triggers the desired action. “Five minutes later, that video is worth nothing. But in sub-second response time type stuff, it’s immensely valuable,” said Pfeifer.

Recent Episodes

As the security integration industry contends with rapid technological advancement and increasing business complexity, many integrators are looking for the tools, training, and guidance to keep pace. At the center of this evolution is AI—transforming not just the products integrators deploy but also the way they operate their businesses. Meanwhile, the shift to mobile credentials…

Facial recognition technology has long hovered on the fringe of mainstream adoption—promising futuristic solutions but often shackled by high costs, limited applications, and public skepticism. In 2024, however, a pivotal shift is underway. Thanks to advances in edge devices, reduced price points, and changing attitudes toward digital identity, biometric authentication—particularly facial recognition—is now finding a…

The security industry is experiencing a quiet revolution—one led not by technology alone, but by a new wave of passionate young professionals. As legacy systems give way to modern, cloud-based platforms and mobile-first solutions, the need for fresh perspectives, diverse skill sets, and energized leadership is more pressing than ever. One organization at the forefront…