Edging towards sustainable business benefits

Issue 4 2023 Infrastructure, Security Services & Risk Management

Organisations are increasingly moving workloads to the network edge. According to a report from IDG/Foundry, an average of 35% of computing resources in the United States now reside at the edge.

The rationale behind moving workloads to the edge is the analysing of data as quickly as possible. This requires establishing computing, networking and storage capabilities close to the endpoints that generate data, whether it’s mobile devices, factory machinery or AI-enabled vehicles.

However, this also requires additional energy resources which in turn consume power. In a country that is already taking considerable strain with unstable energy supply, this can be a dealbreaker. The good news is that the edge can be implemented sustainably and, in fact, save energy.

Buildings energy optimised

Enterprises in most industries consume vast quantities of energy. Lighting, heating, cooling, ventilation and asset operation all require reliable power, often around the clock. Cooling alone accounts for 40% of total data centre energy consumption. Transporting data from endpoints to a centralised data centre uses energy.

Sensors at the edge and software in network operations centres allow organisations to easily monitor and control energy consumption across all remote sites. Like any data generating device, these tools constantly produce information about building efficiency, which can then be used to further improve energy usage.

Using edge computing may even save 60% of data transport energy consumption. Smart building technology can yield 5-25% energy savings on HVAC systems and nearly 50% savings for lighting. Optimal use of smart building tools is not possible without the edge.

Bandwidth optimisation

Edge computing reduces the networking traffic coming in and out of centralised servers, reducing bandwidth and energy drains. This frees up bandwidth at the data centre and the organisational bandwidth of any of the centralised servers on-premises.

Data that does need processing in the cloud tends to be critical, limited by the constraints of the edge device itself. The device handles what it can and sends only important data to the cloud. These natural limitations prevent unnecessary processing and subsequent energy usage.

Use what you have

With the edge, many companies have already deployed sensors and devices that are currently underutilised. By moving data processing back to the edge instead of sending everything to the cloud, companies reduce their dependence on the central cloud and their contributions to energy drains.

Every single piece of the edge stack is optimised to work efficiently. Many can run even without Internet connection, allowing processing to continue offline which saves on energy consumption.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Cyber resilience – protect, defend, recover
Infrastructure
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Top bets for backup and business continuity
Infrastructure
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...