Introduction

With the rise of IoT, edge computing devices have become a crucial component for modern IIoT infrastructure for:

Data Management

Edge devices can decide which data to keep and which to discard in order to prevent unwieldy datasets full of information that is likely to never be utilized

Offline Capabilities

Edge devices can hold information until a system is able to gain access to a network connection, preventing data loss and allowing for deeper analysis

Complex Event Processing

Some IoT devices now utilize applications that operate on edge devices. One example of this is a monitoring and alerts system that takes advantage of the low-latency nature of edge computing.

AI and ML

Artificial intelligence and machine learning using edge devices can enable real-time, autonomous decision-making processes for manufacturers as well as immediate BI insights

As often happens in such a radical paradigm shift, it is only at the end that we worry about essential aspects such as security and the total cost of ownership, the latter linked to the operations necessary for the management of repetitive activities that can involve tens, hundreds, or even thousands device, such as provisioning, monitoring, Firmware Over The Air (FOTA) and Software Over The Air (SOTA) updates, and decommissioning.

In fact, what has happened is that on the edge of the network, there are not only “smart devices” (small electronics appliances with microcontrollers and firmware), but real computers equipped with an operating system and capabilities that make them comparable to laptops or even small servers.

In other words, an organization has today many more computers than employees, and this is the first time in history.

If we think, for example, of the retail world, we can find in a single shop tens of Linux / Windows systems embedded in automatic tills, digital signage systems, HVAC management systems, alarm systems, and so on…

Given the rising number of IoT innovations, enterprises are in dire need of a solution to monitor, control, provision, and debug large scale IoT edge and fog deployments. Businesses looking to ensure IoT success must select a device management platform at the onset of their IoT journey because designing a system to handle 100 devices is entirely different from designing a system to handle a million. Selecting a device management platform at the design stage allows device manufacturers and system developers to plan for large scale distribution and diversity of devices and avoids time-consuming and costly fixes later.

What are the characteristics of an IoT Edge Device management solution?

Device onboarding

An indispensable part of provisioning is device authentication. It consists in establishing a secure connection between the device and an IoT service or IoT platform. As part of that process, the device presents the credentials to the server and, in case it can be trusted, receives further configuration data. Depending on the specifics of the implementation, details of the process may vary, but usually include authentication methods such as device certificates or pre-shared keys.

Device configuration

Every IoT device on your network must be configured as per your business needs. For example, in the case of a fleet of connected trucks, you might want to group specific devices together as per their usual destination or area of operation.Therefore, one of the key factors in successful management of IoT assets is to be able to fine-tune the provisioned devices beyond their default settings. Of course, you want your devices to behave exactly how they are intended to behave within the scope of your project – a flexible and intuitive configuration mechanism should enable you to design the behaviour of your smart fleet not only in times when devices perform as planned, but also to react on-the-fly in case of any failures that come along the way.

Remote Device Management

Remote device management is a significant reason companies should invest in Edge Device Management (EDM) implementation. When your organization has thousands (or even hundreds) of edge computers, it can be challenging to check on them. Not to mention, if you have a small IT team, it'll be impossible to check the activity status of each device. A modern EDM solution offers a way for effectively and securely managing remote devices avoiding local survey

Low Code / No Code

With or without artificial intelligence, the low code / no code approach is now almost pervasive in any IT field, and even an EDM solution is no exception. Therefore, modern EDM solutions must minimize the effort of writing shell scripts or updating routines, helping the sysadmins to focus on the final result without getting lost in the complexity and reusing the previous know-how. Reusable code snippets and generative AI can help to make faster and easier the whole process.

Firmware and software updates

The new paradigm of edge computing involves the use of real computers equipped not only with firmware but with operating systems. Therefore, it is necessary to periodically update the operating systems and the installed software and libraries to maintain the highest levels of efficiency and safety.

Diagnostic

Diagnostic features are crucial in reducing the impact of device downtime that may occur as a result of firmware bugs or any unexpected operational issues. The diagnostic function must be able to collect metrics and automatically evaluate KPIs and represent them effectively on dashboards. An automatic alarm function must also be available to promptly activate any workflows to notify/correct any anomalies found.

Automation campaigns

A modern Edge Device Management solution must be ready to manage devices at scale.This is where IoT Edge Device Management (EDM) solutions will prove to be beneficial. An EDM solution must be able to design automation campaigns. An automation campaign, in general, is a series of commands and operations performed on a defined target of edge computers (device groups) whose execution is managed by a workflow. The EDM takes care of the management of the campaign schedule, its execution, and monitoring.The majority of EDM solutions provide a detailed activity report to help the admin to manage all the related informations and events. Thanks to their automation support, you'll be able to manage multiple edge computers without any hassle.

End of life

IoT devices that aren’t in use but continue to be part of the enterprise network pose a massive security risk – an external entity could capture data via the device without anyone noticing. Further, an outdated or non-functional device could cause severe operational damage. End-of-life policies and processes specify exactly how an IoT device is to be retired, what decommissioning steps are needed, and how to recycle the materials for a minimal carbon footprint.