Large scale Edge Computing rollout experience with systems in hostile environments. Including but not limited to the following
- Secure boot and remote attestation
- Trusted Platform Module (TPM) backed encryption keys with disk encryption
- Tamper protection, intrusion detection and hardening with network segmentation
- Near-realtime data distribution and incremental data synchronization as change deltas with low latency
- Design, deployment and fleet management (commissioning, updates, monitoring etc.) of edge systems
- Experience with 5G, NB-IoT and LoRa transports