The 'dumber' the intelligent edge the better
Blog:Edge computing is rapidly gaining popularity. Not surprising, because there are countless conceivable situations in which you want to calculate something, but for one reason or another (latency, costs, security) you cannot use the cloud. There is a lot of attention for fast applications such as image recognition, but practice shows that most value is generated by applications that are actually quite 'dumb'. An exploration of the opportunities and threats.
An intelligent edge is the application of logic to data where it is generated. So in a factory, train, tunnel or stable, or on a wind or solar park, flood barrier or airport. The word 'intelligent' can be discussed at length, says Robbrecht van Amerongen, Head of Strategy at AMIS Conclusion. "We consider a solution to be 'intelligent' if it is able to return data and commands to the physical device, which then makes independent decisions based on this data. These may well be 'stupid' decisions, or rather, simple logic is applied. For example, at 100 pieces, the crate is full and a new crate must be placed under the machine."
“An intelligent edge is the application of logic to data where it is generated.”
Robbrecht van Amerongen
Head of Strategy bij AMIS Conclusion
The complexity depends entirely on the application, says Robbrecht. "The longer the IT chain, the more complicated it is to have a complete overview of everything and the more places there are where something can go wrong." Sometimes all it takes is one relay not working properly to cause wrong decisions. Robbrecht concludes: "The complexity is usually not in developing the algorithm, but in ensuring that everything continues to go well in all parts of the chain. In addition, you must be able to prove what happened. More and more processes require an audit trail, software bill of materials and version management from a compliance perspective. You must be able to mathematically demonstrate at any time which logic led to a particular (wrong) decision. The more logic - and certainly artificial intelligence - there is, the more difficult it becomes to subsequently deduce how a decision was made. You also need to consider that different versions of this logic may run side by side, for example, if not all updates are installed at the same time. You must also be able to guarantee that all components continue to communicate well with each other after such an update."
As with any application, with intelligent edge solutions, the output depends on the input. The problem with a lot of locally generated input is that the quality can be very variable. Examples include camera images that become blurred due to water vapour or sensors that produce many outliers in their measurements.
You also have to be careful with self-learning algorithms that form a black box, says Robbrecht. "As I emphasized earlier, you must still be able to explain how the algorithm arrives at a certain outcome. If you make everything smart, devices can start to work against each other. 'Dumb' devices have predictable behaviour via a clear if-then-else decision tree. If many more devices start working smartly and are therefore less predictable, this could also have the opposite effect. Consider smart energy devices in combination with an energy contract with flexible prices. There is a chance they will all switch on at the same time, exceeding your grid connection limit. If all companies in the area react the same, this could even lead to serious disruptions in the network."
Another point of attention are the unhappy flows. "It's generally not that difficult to fully automate a happy flow. But does the algorithm also make the right decisions in the event of a very rare unhappy flow? And if a wrong decision is made, what are the consequences? Especially when it comes to automatically intervening in physical processes, things can go very wrong with unhappy flows. If you don't think through these processes very well, you simply run great risks. After all, risk is chance times impact", Robbrecht warns.
Securing the edge computer can also be an issue. After all, it is often located in a cabinet somewhere in a factory hall, or even in a cabinet somewhere in the open field. "Physically, an edge computer like this is not easy to secure; you can just walk up to it, attach a device to it and take over a large part of the operational systems. The starting point should always be that every edge device must be treated as a potentially unfriendly guest in the network. A guest who must continuously prove that his behaviour is safe. Sometimes things go wrong unintentionally, like the edge computer on a ship that had a USB port. The employee on the ship used that port to charge his phone, resulting in a virus contamination in the primary process", says Robbrecht.
A final point of interest he brings to our attention is what happens to the data and algorithms when the device is sold. "If you sell your Tesla, what happens to the data that's still on the edge? You need to legally record these things. For example, think of a business unit that is being sold, but you don't want your IP to suddenly become part of that deal", Robbrecht warns.
Would you like to respond quickly and effectively
in your market?