JimMontague0609

Six steps to implement effective edge computing

Feb. 26, 2020
Successful edge computing: Part 5
Five parts to successful edge computing

This is the final part in this series about edge computing. Read Parts 1, 2, 3 and 4 now.

  • Part 1: What and where is edge computing?
  • Part 2: Edge computing thrives in increasingly capable, embedded servers
  • Part 3: Edge computing provides flexibility for mobile applications
  • Part 4: How a data separation strategy to edge computing is effective for managing information

Because they all have microprocessors, Ethernet ports and software, practically every sensor, instrument, I/O point, switch, gateway, PLC or server is getting simpler to use and maintain. However, even easier-to-use edge devices still require users to learn and understand how to apply them in individual process applications. Here are some basic steps for implementing effective edge computing:

  1. Strive to identify pain points and  operations that could benefit from edge computing, even though potential opportunities may not be apparent in existing applications and networks;
  2. Recruit OT and IT staffs, who can show where edge computing might  solve problems and improve production, and invite all stakeholders to develop a plan for migrating to edge devices and software;
  3. Draft edge program specifications based on requirements, such as application cycles, lags and turnaround periods, and required response times to determine how close to real-time an edge-computing solution will need to be, or if a cloud service would be sufficient;
  4. Determine what data should be handled by local/edge devices, where to retain  it, and what should be reported to the cloud and administrative/business platforms, and on what schedule to deliver it;
  5. Research and decide which edge components and enabling devices will satisfy the edge project's requirements, such as where to locate computing functions, how to tie in legacy equipment, what Ethernet infrastructure and communication protocols to use, whether to employ wired or wireless, and linking to PLCs and servers; and
  6. Evaluate and enable the most appropriate cybersecurity capabilities are each stage of the edge computing application and its network.
About the author: Jim Montague
About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

2024 Industry Trends | Oil & Gas

We sit down with our Industry Marketing Manager, Mark Thomas to find out what is trending in Oil & Gas in 2024. Not only that, but we discuss how Endress+Hau...

Level Measurement in Water and Waste Water Lift Stations

Condensation, build up, obstructions and silt can cause difficulties in making reliable level measurements in lift station wet wells. New trends in low cost radar units solve ...

Temperature Transmitters | The Perfect Fit for Your Measuring Point

Our video introduces you to the three most important selection criteria to help you choose the right temperature transmitter for your application. We also ta...

2024 Industry Trends | Gas & LNG

We sit down with our Industry Marketing Manager, Cesar Martinez, to find out what is trending in Gas & LNG in 2024. Not only that, but we discuss how Endress...