|
everything from facial scanning and recognition on smartphones to the emergence of refrigerators that place orders for products that are out of stock. Some steps must be implemented for the system to make a successful transition . The first is to build an IT culture that facilitates edge computing. and find quality partners that also help in building this new culture. It is also necessary to eliminate excessive use of cloud computing and develop the necessary security to avoid possible attacks. It is important to remember that experts have not yet reached a consensus on the actual security of edge computing.
Some believe that there is less vulnerability in the system when data is Fax Lists not transported over long distances, meaning a lower likelihood of attacks. Others believe that gateways, because they are end devices, are less secure. They also explain that Edge Computing, since it has networks with less infrastructure and less cost, intrinsically has less security. There are protection technologies for Edge Computing, such as a VPN, that must be implemented to ensure system security. It is necessary for the IT sector of companies to evaluate the possibility of implementing Edge Computing , taking into account the impacts that the change would
cause in the infrastructure and the benefits of the implementation, to make a correct decision in this regard. The need for security and maintenance, among other requirements, are other factors that must be evaluated. Either way, making a quick decision is not advisable. Edge Computing is both the result of digital transformation and cloud marketing, which uses cloud computing to optimize brand strengthening strategies. To better understand the topic and incorporate new information about it, consult this article on Cloud computing . Share Ana ArboledaRock author vector Author Ana Arboleda Subscribe and receive the contents
|
|