<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Edge Computing</title><link>http://www.sei.cmu.edu/feeds/topic/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Edge Computing</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/topic/edge-computing/rss/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 Aug 2022 00:00:00 -0400</lastBuildDate><item><title>Networking at the Tactical and Humanitarian Edge</title><link>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post details networking challenges in edge environments that stem from uncertainty and solutions to overcome them.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marc Novakouski, Jacob Ratzlaff</dc:creator><pubDate>Mon, 08 Aug 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/networking-at-the-tactical-and-humanitarian-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Edge-Enabled Systems</category><category>Tactical Systems</category><category>Edge Computing</category></item><item><title>Internet-of-Things (IoT) Security at the Edge</title><link>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Assuring the security of any hardware device is a hard problem. In particular, Internet-of-Things (IoT) devices have increasingly been the target of malicious attacks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastián Echeverría, Grace Lewis</dc:creator><pubDate>Mon, 04 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/internet-of-things-iot-security-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Internet of Things</category></item><item><title>Containerization at the Edge</title><link>https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Containerization is a technology that addresses many of the challenges of operating software systems at the edge.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Kevin Pitstick, Jacob Ratzlaff</dc:creator><pubDate>Mon, 21 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/containerization-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Edge-Enabled Systems</category><category>Tactical Systems</category><category>Edge Computing</category></item><item><title>Operating at the Edge</title><link>https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Concepts and challenges for operating in remote locations away from central computing resources where resources are constrained (the edge).</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Marc Novakouski, Grace Lewis</dc:creator><pubDate>Mon, 29 Nov 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/operating-at-the-edge/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cloud Computing</category><category>Handheld Devices</category><category>Tactical Systems</category><category>Edge-Enabled Systems</category><category>Edge Computing</category></item><item><title>KalKi: Solution for High Assurance Software-Defined IoT Security</title><link>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Commercial Internet of things (IoT) devices are evolving rapidly, providing new and potentially useful capabilities. These devices can be a valuable source of data....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sebastián Echeverría</dc:creator><pubDate>Mon, 15 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/kalki-solution-for-high-assurance-software-defined-iot-security/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cyber-Physical Systems</category><category>Internet of Things</category></item></channel></rss>