Rutgers Classifieds>Rutgers Online Courses>Business Considerations for Edge Computing

Business Considerations for Edge Computing

About this Course

From cars that drive themselves to robots that restock the warehouse and sensors that know when it’s time to water or fertilize crops, our world is changing right before our eyes. This is digital transformation and it includes the convergence of 5G, IoT, AI, machine learning and the Edge. Edge Computing is part of the decentralized model of computing that focuses on real-time processing and analysis of data near the edge of the network, or nearest the device or user. It is considered the most significant enterprise trend since Cloud Computing. In this course you will learn about what Edge Computing is, what problems it’s solving and how it is supporting the rise of 5G, AI and IoT. We’ll review the data privacy and security considerations and share examples of where we see business innovation with Edge. We’ll also review the influencers and open source projects that are defining the future of Edge and the hybrid computing world.

Created by: The Linux Foundation

Level: Introductory


Related Online Courses

This course is part of W3C's "Front-End Web Developer" Professional Certificate. Have you just begun your journey into Web development? This course introduces you to the basics of Web design and... more
Please Note: Learners who successfully complete this IBM course can earn a skill badge — a detailed, verifiable and digital credential that profiles the knowledge and skills you’ve acquired in thi... more
It’s now time to continue your captivating journey through the history of gaming. In this second course, you will learn about the technological advancements of the early 1990s and the development o... more
In this fully immersive course, you will learn to master the Ethereum ecosystem through a series of hands-on demonstrations. You will gain an in-depth knowledge of the technology underlying various... more
Network security plays a vital role in most organizations. It is the process of preventing and detecting unauthorized use of an organization’s networking infrastructure. Network Defense E... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL