Skip to main content

Cities are combining edge computing and IoT data collection to improve services and save money

There is no one-size-fits-all solution, but government leaders will need systems integrators to make these IoT projects a success.

Government agencies managing multiple sources of Internet of Things (IoT) data are most likely to launch edge computing projects to save money and improve city services, according to an IDC government analyst.

Shawn P. McCarthy, research director for IDC Government Insights, predicts that local governments and the military will lead the way in adopting artificial intelligence (AI) to reduce fraud, improve services, and increase compliance. McCarty discussed these predictions as well as the current market during a webinar, "Edge Computing, 5G & AI: Government's Exponential Perfect Storm."

SEE: Research: Why Industrial IoT deployments are on the rise (TechRepublic Premium)

"Integrating this data can save money, and that's where you're going to see most of the growth happen," he said.

The benefits of distributed AI are a positive return on investment, lower costs, focused efficiencies and data-driven decision making, but the required processing power is a significant challenge, he added. 

Artificial intelligence is already improving government operations from fine-tuning maintenance schedules for Air Force planes to reducing pedestrian deaths on city streets. Other use cases for edge computing and IoT projects include:

  • Monitoring river flow levels
  • Optimizing building temperature by adjusting AC and venting
  • Improving crowd control and response
  • Collecting public health data
  • McCarthy said some data analysis must be done at the edge to get the benefit of real-time analysis. 

     "When processing is done at the data center or in the cloud, you don't gain speed, you don't boost agility, and you have fewer options for fast automated responses," he said. 

    He described the AI opportunities along the entire spectrum of IoT platform elements as "small footprint AI," a smart device that does one task very well, as compared to Alexa, an AI device that has many capabilities.

    No one-size-fits-all solution

    IDC's Global IoT Decision Maker Survey 2019 found that federal government agencies are doing the most edge computing with about 25% of all IoT data collected and processed at the edge. Cities have the most edge-based computation requirements and process about 20% of the data collected at the edge. States and territories are lagging in this area but they also don't have to be outfront because they are not collecting the data. Across federal, state, and local governments, most data is processed through a hybrid model with some processed at the edge and the rest sent to a data center.

    SEE: IoT: Major threats and security tips for devices (free PDF) (TechRepublic)    Because of the complexity of the systems that these entities are managing, city managers will need systems integrators to make these projects a success. 

    McCarthy also shared these major IoT trends across all industries:

  • Platforms will become more verticalized with an increased focus on the use case instead of general purpose offerings.
  • Edge computing will become more important due to the need for real-time insight, cost reduction, and increased security.
  • Security and privacy will continue to be the top data management concerns as improving data sharing and governance.
  • Government agencies will need a specialized systems integrator to manage complex multi-vendor deployments and infrastructure modernization.
  • McCarthy said progress in edge computing is moving at different rates across different levels of government, reinforcing the idea that there is no one-size-fits-all solution.

    "The best growth opportunities are at agencies with multi-structured data sources that can be used to create new solutions, build better services, and optimize operations," he said.

    To make the case for IoT investments, city leaders should determine whether the project could reduce existing IT costs and whether the solutions could improve service levels to residents.  

    McCarthy also suggested this list of questions for government agencies trying to figure out how to get started with IoT projects:

  • What data lives within current facilities, and what data do you want that exists at other locations?
  • How much data is there, and how fast is it growing?
  • How much time does it take for those data collections to traverse the network?
  • What additional data sources do you plan to add?
  • Will the volume of the new data make it necessary to move processing power out into the network?
  • Can you do your analysis and make decisions near where the data lives?
  • Is distributed processing needed at multiple locations?
  • Is the data stored in a way that makes it easily available for AI and machine learning or is secondary data prep needed?
  • Are you not using some of the data that would otherwise  be useful to save time effort and network stress?
  • Understanding these issues is a major step toward deciding if distributed AI is needed, he added.

    Smart Cities and IoT Newsletter

    Stay informed about smart cities tech, which includes innovations in IoT, 5G, security, data analytics, mobile apps, and more. Thursdays

    Sign up today Also see

    Internet of Things (IoT): A cheat sheet (TechRepublic) 5G: What it means for IoT (free PDF) (TechRepublic download)IoT security: A guide for IT leaders (TechRepublic Premium)What is the Internet of Things? Everything you need to know about the IoT right now (ZDNet)These smart plugs are the secret to a seamless smart home (CNET)Internet of Things and smart cities: More must-read coverage (TechRepublic on Flipboard)

    idc-internet-of-things-and-edge-computing.jpg

    Shawn P. McCarthy, research director for IDC Government Insights, said some data analysis must be done at the edge to get the benefit of real-time analysis. 

    Image: IDC

    Comments

    Popular posts from this blog

    Why Now Is The Time For Industry To Unlock The Full Potential Of IoT

    When British technologist Kevin Ashton coined the phrase “internet of things” (IoT) in 1999, the world was only just getting acquainted with the nascent network of networks and how to access and use its many applications. In the more than two decades since, it has grown increasingly difficult to imagine a world in which our economies and communities were not supported and connected via the World Wide Web and the devices we use to access it. The number of firms that have incorporated IoT technologies into their businesses grew from 13% in 2014 to about 25% globally in 2019. In countries such as the United States, Germany, France and China, the rate of IoT adoption among enterprise-size commercial organizations exceeded 85%, according to a 2019 survey by Microsoft. And recent analyses from IDC predicted there will be 41.6 billion internet-connected devices by 2025, as worldwide commercial and consumer spending on IoT will exceed $1 trillion within the next three years. But the diffusion ...

    Smartphones, laptops, IoT devices vulnerable to new BIAS Bluetooth attack

    Academics have disclosed today a new vulnerability in the Bluetooth wireless protocol, broadly used to interconnect modern devices, such as smartphones, tablets, laptops, and smart IoT devices. The vulnerability, codenamed BIAS (Bluetooth Impersonation AttackS), impacts the classic version of the Bluetooth protocol, also known as Basic Rate / Enhanced Data Rate, Bluetooth BR/EDR, or just Bluetooth Classic. The BIAS attack The BIAS security flaw resides in how devices handle the link key, also known as a long-term key. This key is generated when two Bluetooth devices pair (bond) for the first time. They agree on a long-term key, which they use to derive session keys for future connections without having to force device owners to go through the long-winded pairing process every time the Bluetooth devices need to communicate. Researchers said they found a bug in this post-bonding authentication process. The flaw can allow an attacker to spoof the identity o a previously paired/bonded devi...

    Programming language Rust: 5 years on from v1.0, here's the good and the bad news

    The open-source project behind Rust has detailed the programming language's milestones over the past five years since releasing Rust version 1.0.  Rust was created at Mozilla and the project boasts that today, "Apple, Amazon, Dropbox, Facebook, Google, and Microsoft [are] choosing to use Rust for its performance, reliability, and productivity in their projects." "Rust is a general-purpose programming language empowering everyone to build reliable and efficient software. Rust can be built to run anywhere in the stack, whether as the kernel for your operating system or your next web app," the project says in a blogpost detailing milestones since 2015. Mozilla developers were using pre-1.0 Rust in 2014 to build its new Servo browser rendering engine for Firefox. A major goal was to eradicate memory-related security bugs in Firefox's Gecko rendering engine, many of which were due to C++'s "unsafe memory model".  Then last year, Microsoft started ex...