{"id":121903,"date":"2024-04-04T05:03:34","date_gmt":"2024-04-04T05:03:34","guid":{"rendered":"https:\/\/www.controleng.com\/articles\/edge-to-cloud-understanding-new-industrial-architectures\/"},"modified":"2025-04-23T19:03:07","modified_gmt":"2025-04-24T00:03:07","slug":"edge-to-cloud-understanding-new-industrial-architectures","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/","title":{"rendered":"Edge to cloud: Understanding new industrial architectures"},"content":{"rendered":"<p>&nbsp;<\/p>\n<div class=\"learn-obj\">\n<div class=\"top-one\"><\/div>\n<div class=\"top-two\"><\/div>\n<h4>Learning Objectives<\/h4>\n<ul>\n<li>Evaluate technologies and requirements for industrial edge and cloud capabilities, including the continuous coordination of industrial cybersecurity.<\/li>\n<li>Contrast costs of industrial cloud capabilities versus on-premise provisioning and consider clarity of industrial cloud and edge data.<\/li>\n<li>Examine industrial edge device resilience amid cloud reliability concerns with refined integration for edge and cloud technologies.<\/li>\n<\/ul>\n<div class=\"bottom\"><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h2>Industrial edge architecture and cybersecurity insights<\/h2>\n<ul>\n<li>Technologies and requirements for industrial edge and cloud capabilities include the continuous coordination of industrial cybersecurity.<\/li>\n<li>When deciding between cloud or on-premise industrial architectures, contrast costs of industrial cloud capabilities versus on-premise provisioning and consider clarity of industrial cloud and edge data.<\/li>\n<li>Refined integration for edge and cloud technologies can help with industrial edge device resilience and cloud reliability concerns.<\/li>\n<\/ul>\n<hr \/>\n<p>In an era where digital transformation dictates the pace of business innovation, understanding the synergy between edge devices and cloud technology is more than a necessity. It is a strategic imperative. The landscape of data management and processing is undergoing a radical change, marked by the emergence of sophisticated edge devices and seemingly infinite storage and computing power in the cloud.<\/p>\n<figure id=\"attachment_541150\" aria-describedby=\"caption-attachment-541150\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-541150 size-full\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig1-IT-OT_Architecture-EPIC.jpg\" alt=\"Figure 1: Edge architecture bridges operational technology and information technology (OT and IT) for secure integration. Courtesy: Opto 22\" width=\"1000\" height=\"773\" \/><figcaption id=\"caption-attachment-541150\" class=\"wp-caption-text\">Figure 1: Edge architecture bridges operational technology and information technology (OT and IT) for secure integration. Courtesy: Opto 22<\/figcaption><\/figure>\n<h2>Industrial journey from edge to cloud<\/h2>\n<p>However, when it comes to moving critical production and infrastructure data to the cloud, a number of concerns arise; cybersecurity is paramount among them. Add the recurring costs of cloud storage and software tools to fears surrounding network reliability, and it\u2019s easy to understand the hesitancy to select a cloud-based architecture for mission-critical operations. Even putting those considerations to the side, there\u2019s still the issue of contextualizing the enormous swaths of data that cloud servers are capable of storing.<\/p>\n<p>Fear not. New technologies embedded in modern edge devices are transforming the industrial internet of things (IIoT) landscape by enabling secure and seamless data transmission to the cloud. This advancement allows for more than just data collection; it ensures that data is transmitted safely and efficiently, ready for analysis in cloud-based systems. These capabilities are vital in an increasingly connected world, where the quick and secure handling of data is essential for timely and informed decision-making across various industries.<\/p>\n<figure id=\"attachment_541142\" aria-describedby=\"caption-attachment-541142\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541142\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig2-firewalls.jpeg\" alt=\"Figure 2: A firewall in action guards the digital boundaries of a manufacturing site, facility and organization. Courtesy: Opto 22\" width=\"1000\" height=\"659\" \/><figcaption id=\"caption-attachment-541142\" class=\"wp-caption-text\">Figure 2: A firewall in action guards the digital boundaries of a manufacturing site, facility and organization. Courtesy: Opto 22<\/figcaption><\/figure>\n<h2>Industrial cybersecurity: A continuous coordination<\/h2>\n<p>Traditionally, edge devices like input\/output (I\/O) systems and programmable logic controllers (PLCs) were the most vulnerable links in network security. These devices, critical in industrial settings, lacked advanced cybersecurity features, making them easy targets for cyber threats. In stark contrast, modern edge devices are designed with astrong emphasis on cybersecurity. They come equipped with a range of protective features like firewalls, secure socket link\/transport layer security (SSL\/TLS) encryption, virtual private network (VPN) clients, secure authentication, network zoning capabilities and regular updates to guard against evolving threats. This shift marks a significant advancement in securing industrial networks, transforming edge devices from weak points into fortified gateways inthe digital ecosystem.<\/p>\n<p>Alongside the existing cybersecurity features of modern edge devices, the implementation of outbound communication protocols like message queuing telemetry transport (MQTT) adds another layer of security. These protocols facilitate device-originated communication, which inherently reduces vulnerability to external threats. By allowing edge devices to securely initiate and control data exchange, MQTT minimizes the need for open inbound network ports, thus significantly decreasing the risk of cyber-attacks. This proactive approach in data communication reinforces the security framework of industrial networks, further transforming edge devices into robust, secure gateways in the digital infrastructure.<\/p>\n<figure id=\"attachment_541143\" aria-describedby=\"caption-attachment-541143\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541143\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig3-epic_ports_networks.jpeg\" alt=\"Figure 3: Secure segmentation is demonstrated using dual ports for trusted and untrusted networks. Courtesy: Opto 22\" width=\"1000\" height=\"671\" \/><figcaption id=\"caption-attachment-541143\" class=\"wp-caption-text\">Figure 3: Secure segmentation is demonstrated using dual ports for trusted and untrusted networks. Courtesy: Opto 22<\/figcaption><\/figure>\n<h2>Costs contrasted: Industrial cloud capabilities versus on-premise provisioning<\/h2>\n<p>On-premise industrial server solutions come with significant initial capital costs. This includes the expense of purchasing server racks, servers, cooling equipment, software packages and IT administration tools. Beyond these upfront investments, there are also substantial ongoing maintenance costs, encompassing hardware repairs, software updates and energy consumption for operation and cooling systems.<\/p>\n<p>In contrast, cloud-based storage and computing services typically operate on an annual subscription model. While this might seem costly at first glance, it often proves more economical in the long run. The cloud service provider handles much of the management and maintenance, from server upkeep to software updates. This reduces the direct costs associated with physical infrastructure and shifts the burden of ongoing maintenance away from the user. This shift can lead to significant savings in time and resources, allowing businesses to focus on core activities rather than IT management.<\/p>\n<p>An additional advantage of cloud-based storage is its scalability. Starting with a small virtual setup at a minimal cost, scaling up as needed is remarkably easier and cost-effective compared to on-premise solutions. With cloud services, increasing storage or computational power doesn\u2019t require physical hardware additions, but a simple adjustment in the service plan, offering flexibility and efficiency in resource management. This scalability feature makes cloud solutions not only economical but also adaptable to evolving business needs.<\/p>\n<figure id=\"attachment_541144\" aria-describedby=\"caption-attachment-541144\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541144\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture.jpeg\" alt=\"Figure 4: Robust security architecture helps to safeguard data at every layer. Courtesy: Opto 22\" width=\"1000\" height=\"720\" \/><figcaption id=\"caption-attachment-541144\" class=\"wp-caption-text\">Figure 4: Robust security architecture helps to safeguard data at every layer. Courtesy: Opto 22<\/figcaption><\/figure>\n<h2>Context clarity: Coordinating industrial cloud and edge data<\/h2>\n<p>Transferring data from edge devices to the cloud can initially seem chaotic, but modern data modeling tools like user-defined types (UDTs) and advanced data models provide a solution. These tools ensure that by the time data reaches the cloud, it\u2019s already contextualized. This means data is not just raw numbers; it\u2019s processed and tagged with relevant context (like location, device type and operational status), making it immediately useful and comprehensible. This preprocessing at the edge simplifies cloud data management and analysis, turning potential confusion into clear, actionable insights.<\/p>\n<figure id=\"attachment_541145\" aria-describedby=\"caption-attachment-541145\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541145\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig5-VPN.jpeg\" alt=\"Figure 5: Virtual private network (VPN) and port redirect provide secure access to isolated network zones. Courtesy: Opto 22\" width=\"1000\" height=\"710\" \/><figcaption id=\"caption-attachment-541145\" class=\"wp-caption-text\">Figure 5: Virtual private network (VPN) and port redirect provide secure access to isolated network zones. Courtesy: Opto 22<\/figcaption><\/figure>\n<h2>Industrial edge device resilience amid cloud reliability concerns<\/h2>\n<p>Reliability concerns, especially during network outages, often shadow cloud computing. Yet, the advanced capabilities of edge devices provide a robust solution. With multi-core processors, varied control and programming options and built-in human-machine interfaces (HMIs), these devices ensure local operations continue smoothly, even when cloud connectivity falters.<\/p>\n<p>Edge devices stand out for their autonomous operation. They handle critical functions and data processing independently, including local data storage and buffering, proving essential when cloud services are interrupted. This autonomy is key to maintaining uninterrupted operations, ensuring that essential systems remain operational and efficient.<\/p>\n<p>While edge devices offer local resilience, cloud computing elevates capabilities with advanced analytics, artificial intelligence (AI), machine learning (ML), anomaly detection (AD) and large language models (LLMs). This synergy between edge autonomy and cloud-based intelligence creates a balanced digital infrastructure, effectively addressing cloud reliability challenges while harnessing its advanced analytical potential.<\/p>\n<h2>Refined integration of edge and cloud technologies<\/h2>\n<p>In the exploration of edge-to-cloud architectures, there\u2019s an intricate balance between the localized robustness of edge devices and the expansive capabilities of cloud computing. This synergy is shaping a more efficient and secure future for data management and processing in various industries.<\/p>\n<figure id=\"attachment_541146\" aria-describedby=\"caption-attachment-541146\" style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-541146\" src=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig6-IT-OT-MQTT.jpeg\" alt=\"Figure 6: Using a secure message queuing telemetry transport (MQTT) architecture allows multiple clients with one trusted broker. Courtesy: Opto 22\" width=\"1000\" height=\"917\" \/><figcaption id=\"caption-attachment-541146\" class=\"wp-caption-text\">Figure 6: Using a secure message queuing telemetry transport (MQTT) architecture allows multiple clients with one trusted broker. Courtesy: Opto 22<\/figcaption><\/figure>\n<p>Edge devices have evolved significantly, now embodying secure and autonomous units capable of sophisticated local processing. Their enhanced cybersecurity features and ability to operate independently are pivotal in maintaining operational integrity, even in the absence of cloud connectivity. This local control is crucial in industrial settings, where even brief downtimes can have significant impacts.<\/p>\n<p>On the other hand, the cloud offers advanced computational power and storage capacity, making it an invaluable resource for large-scale data analysis. With capabilities like AI, ML, AD and LLMs, the cloud extends beyond mere data storage, providing deep insights and analytics that are transforming decision-making processes in businesses.<\/p>\n<p>The convergence of edge and cloud technologies represents not just an advancement in individual capabilities, but a collaborative force. This integration allows for a more resilient and adaptable digital infrastructure, where local and cloud systems complement each other, ensuring immediate operational efficiency and long-term analytical depth.<\/p>\n<p>As industrial customers progress, this balanced interplay between edge and cloud computing is poised to become a fundamental element in the digital transformation narrative of numerous industries. Grasping and harnessing this synergy is crucial for unlocking unprecedented levels of innovation, security, and operational efficiency in the rapidly changing digital world.<\/p>\n<p><strong>Dan White<\/strong> is director of technical marketing at <a href=\"https:\/\/www.opto22.com\/\">Opto 22<\/a>. Edited by Mark T. Hoske, content manager, <a href=\"http:\/\/www.controleng.com\"><em>Control Engineering<\/em><\/a>, CFE Media and Technology, <a href=\"mailto:mhoske@cfemedia.com\">mhoske@cfemedia.com<\/a>.<\/p>\n<p><strong>KEYWORDS:<\/strong> Edge computing, industrial cloud, edge to cloud architectures<\/p>\n<p><strong>CONSIDER THIS<\/strong><\/p>\n<p><strong>Have you considered<\/strong> new edge and cloud technologies in light of cybersecurity and data requirements?<\/p>\n<p>ONLINE<\/p>\n<p><a href=\"https:\/\/www.controleng.com\/edge-cloud-computing\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.controleng.com\/edge-cloud-computing\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern edge devices put emphasis on cybersecurity, data democratization and programmability to enable advanced cloud capabilities.<\/p>\n","protected":false},"author":4767,"featured_media":70327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104059],"tags":[],"tracking-metrics":[],"display-location":[],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Edge to cloud: Understanding new industrial architectures - Control Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Edge to cloud: Understanding new industrial architectures - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"Modern edge devices put emphasis on cybersecurity, data democratization and programmability to enable advanced cloud capabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T05:03:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T00:03:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"645\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan White\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan White\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\"},\"author\":{\"name\":\"Dan White\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/98ede2b5f7498a89ae0eaa9d1915ff75\"},\"headline\":\"Edge to cloud: Understanding new industrial architectures\",\"datePublished\":\"2024-04-04T05:03:34+00:00\",\"dateModified\":\"2025-04-24T00:03:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\"},\"wordCount\":1484,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg\",\"articleSection\":[\"Edge and Cloud Computing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\",\"url\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\",\"name\":\"Edge to cloud: Understanding new industrial architectures - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg\",\"datePublished\":\"2024-04-04T05:03:34+00:00\",\"dateModified\":\"2025-04-24T00:03:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg\",\"width\":645,\"height\":350,\"caption\":\"Courtesy: Opto 22\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Edge to cloud: Understanding new industrial architectures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/98ede2b5f7498a89ae0eaa9d1915ff75\",\"name\":\"Dan White\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf113c3164d5c72919e42ceb3c30add43ec2163a28fdb88643c997095dcce304?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf113c3164d5c72919e42ceb3c30add43ec2163a28fdb88643c997095dcce304?s=96&d=mm&r=g\",\"caption\":\"Dan White\"},\"url\":\"https:\/\/www.controleng.com\/author\/dan-white\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Edge to cloud: Understanding new industrial architectures - Control Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/","og_locale":"en_US","og_type":"article","og_title":"Edge to cloud: Understanding new industrial architectures - Control Engineering","og_description":"Modern edge devices put emphasis on cybersecurity, data democratization and programmability to enable advanced cloud capabilities.","og_url":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2024-04-04T05:03:34+00:00","article_modified_time":"2025-04-24T00:03:07+00:00","og_image":[{"width":645,"height":350,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg","type":"image\/jpeg"}],"author":"Dan White","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Dan White","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/"},"author":{"name":"Dan White","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/98ede2b5f7498a89ae0eaa9d1915ff75"},"headline":"Edge to cloud: Understanding new industrial architectures","datePublished":"2024-04-04T05:03:34+00:00","dateModified":"2025-04-24T00:03:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/"},"wordCount":1484,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg","articleSection":["Edge and Cloud Computing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/","url":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/","name":"Edge to cloud: Understanding new industrial architectures - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg","datePublished":"2024-04-04T05:03:34+00:00","dateModified":"2025-04-24T00:03:07+00:00","breadcrumb":{"@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/11\/CTL2404_MAG2_F6d_I40_EDGECOMPUTING-Opto22-Fig4-groov-EPIC-Security-Architecture-slider.jpg","width":645,"height":350,"caption":"Courtesy: Opto 22"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/edge-to-cloud-understanding-new-industrial-architectures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"Edge to cloud: Understanding new industrial architectures"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/98ede2b5f7498a89ae0eaa9d1915ff75","name":"Dan White","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf113c3164d5c72919e42ceb3c30add43ec2163a28fdb88643c997095dcce304?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf113c3164d5c72919e42ceb3c30add43ec2163a28fdb88643c997095dcce304?s=96&d=mm&r=g","caption":"Dan White"},"url":"https:\/\/www.controleng.com\/author\/dan-white\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/121903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/4767"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=121903"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/121903\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/70327"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=121903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=121903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=121903"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=121903"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=121903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}