Most computer users and companies continue to use Windows 7 since they assume it is very stable and secure. Some of the users may not know the specific advantage it has, but they find themselves in it because it is commonly used all over the world.
Project Description and Objectives
Computer users have been relying on fixed stations to perform their duties such as the transfer of data for processing using memory sticks. Technology has changed with the introduction of internet and virtual computing. Edge technology pushes the frontier of the computer applications, services, and data from the centralized units to the logical network (Wood, 2015). The objective of the technology is to minimize the interactions of the human with the machines, which will make the activities that are performed to be fast and with minimal human errors. Edge achieves the purpose of effectiveness since devices such as traffic lights will not have to transfer information to the central area, but will analyze it and transfer the analytics to other devices directly until the required action is achieved. Through the use of Windows 7, there is the need to move the data home to be processed, and then it is sent to another machine that executes the commands.
The project is a high priority one since, in the current world, data needs to be transferred in real-time for the best decisions to be made. When data is taken back to the home location for processing, it may take a long time and at times be affected by human errors; hence, wrong conclusions.
Objectives of the Risk Process
The primary goals of the project are real-time data availability, transmission of large quantities of information that is not possible using Windows and elimination of internet capabilities because the devices will not send the data, but compute it by themselves. In addition, emergency response will be improved since data is received in real-time. The project faces various risks because it is new in the market. In the case of any error during the design, the computed data will be inaccurate and will take long or may not be noticed. The technology may be used for terror attacks because the transmission of data will be fast; hence, the response before the attack is executed may take a short time that may not be noticeable. The risks are tolerable because any new technology has its negative and positive effects because people have not completely familiarized with it. There is the need to address the security issues to ensure they do not prevent it from achieving its set goals.
References
Wood, C. (2015). Is Edge Computing Key to the Internet of Things?. Govtech.com. Retrieved 10 May 2016, from http://www.govtech.com/transportation/Is-Edge-Computing-Key-to-the- Internet-of-Things.html