<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>SEI Blog | Edge Computing</title><link href="http://sei.cmu.edu/feeds/topic/edge-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="alternate"/><link href="http://sei.cmu.edu/feeds/topic/edge-computing/atom/?utm_source=blog&amp;utm_medium=rss" rel="self"/><id>http://sei.cmu.edu/feeds/topic/edge-computing/atom/?utm_source=blog&amp;utm_medium=rss</id><updated>2022-08-08T00:00:00-04:00</updated><subtitle>Updates on changes and additions to the                         SEI Blog for posts matching Edge Computing</subtitle><entry><title>Networking at the Tactical and Humanitarian Edge</title><link href="https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-08-08T00:00:00-04:00</published><updated>2022-08-08T00:00:00-04:00</updated><author><name>Marc Novakouski, Jacob Ratzlaff</name></author><id>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">This blog post details networking challenges in edge environments that stem from uncertainty and solutions to overcome them.</summary><category term="Software Architecture"/><category term="Edge-Enabled Systems"/><category term="Tactical Systems"/><category term="Edge Computing"/></entry><entry><title>Internet-of-Things (IoT) Security at the Edge</title><link href="https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-04-04T00:00:00-04:00</published><updated>2022-04-04T00:00:00-04:00</updated><author><name>Sebastián Echeverría, Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Assuring the security of any hardware device is a hard problem. In particular, Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks.</summary><category term="Internet of Things"/></entry><entry><title>Containerization at the Edge</title><link href="https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2022-03-21T00:00:00-04:00</published><updated>2022-03-21T00:00:00-04:00</updated><author><name>Kevin Pitstick, Jacob Ratzlaff</name></author><id>https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Containerization is a technology that addresses many of the challenges of operating software systems at the edge.</summary><category term="Software Architecture"/><category term="Edge-Enabled Systems"/><category term="Tactical Systems"/><category term="Edge Computing"/></entry><entry><title>Operating at the Edge</title><link href="https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2021-11-29T00:00:00-05:00</published><updated>2021-11-29T00:00:00-05:00</updated><author><name>Marc Novakouski, Grace Lewis</name></author><id>https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Concepts and challenges for operating in remote locations away from central computing resources where resources are constrained (the edge).</summary><category term="Cloud Computing"/><category term="Handheld Devices"/><category term="Tactical Systems"/><category term="Edge-Enabled Systems"/><category term="Edge Computing"/></entry><entry><title>KalKi: Solution for High Assurance Software-Defined IoT Security</title><link href="https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates" rel="alternate"/><published>2020-06-15T00:00:00-04:00</published><updated>2020-06-15T00:00:00-04:00</updated><author><name>Sebastián Echeverría</name></author><id>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</id><summary type="html">Commercial Internet of things (IoT) devices are evolving rapidly, providing new and potentially useful capabilities. These devices can be a valuable source of data....</summary><category term="Cyber-Physical Systems"/><category term="Internet of Things"/></entry></feed>