Welcome to the new Energy Central — same great community, now with a smoother experience. To login, use your Energy Central email and reset your password.

How to Deploy Edge Computing Effectively

The computer industry is undergoing a fundamental shift from large central systems to distributed edge devices, which are well suited to mobile workers. As utilities dabble more with the emerging technology, they need help determining how to implement such solutions effectively. Being cautious at the start, establishing central policies, and moving slowly into this area improve their chances of success.

The first step is for utility executives to recognize that edge systems are in an early stage of development. Many energy companies are just trying to understand what edge computing offers, so they can find the best use cases.

Standardize But be Flexible

Next, try to develop central policies. Business units may find novel uses for edge computing, but each energy supplier needs to provide some level of central guidance. The organization does not want to be burdened with supporting a hodgepodge of applications with antithetical designs. That approach only increases their support complexity and costs.

Allow for flexibility. Energy companies need to avoid being draconian and apply the entire edge technology stack to each project. Variations exist across the organization, its locations, and department desired outcomes, so management needs to enable extensibility when required rather than mandate rigid conformance.

How to Begin Deploying Edge Computing

Corporations often wonder where they should begin their implementation. Start small and address simple and clear business goals. Once they have success, they can move to more complicated implementations.

Clearly identify each project’s goals. There is no sense implementing edge technology just to say that you have it. The justification may stem from cost reductions, streamlining business processes, improving resiliency, or strengthening remote communication.  

Spend time and money on edge security. Enterprise security is complex and becomes even more so when processing is spread among a number of devices. Security is often the last item added to any project, and edge is no exception.

A related consideration is that all-encompassing edge security offerings are still in a nascent part of their evolution. Energy companies need to be thorough in examining new possible security shortcomings and then create an architecture that secures each layer of the stack independently.

Recognize the people portion of the equation. Edge implementations are complex due to the diversity of objectives, expected outcomes, scope of technologies, and variety of providers. Mobile employees and support teams need diverse skills. At the start, the organization often lacks such expertise, so reaching out to third party specialists is common. Energy companies then must put processes in place, so their employees assimilate the skills as the project moves forward.

Utilities are embracing edge computing systems to improve operations, reduce costs, and adapt to more dispersed workforces. Developing a central architecture, focusing on security, and adding the human touch helps them ensure maximum returns from these projects.