Bear Metal

Edge Computing

Large scale Edge Computing rollout experience with systems in hostile environments. Including but not limited to the following

  • Secure boot and remote attestation
  • Trusted Platform Module (TPM) backed encryption keys with disk encryption
  • Tamper protection, intrusion detection and hardening with network segmentation
  • Near-realtime data distribution and incremental data synchronization as change deltas with low latency
  • Design, deployment and fleet management (commissioning, updates, monitoring etc.) of edge systems
  • Experience with 5G, NB-IoT and LoRa transports