Summary
In this chapter, we covered the states of data at rest, data in motion, and data in processing. You have learned about how, when, and why to encrypt data, including the ability to perform operations on the data without decrypting it using fully homomorphic encryption. You were introduced to the idea of data trustworthiness using a data confidence fabric, which can be implemented on the least powerful machines on the user edge where data is born.
You learned about data storage and management approaches, including data governance, policies, and enforcement, as well as ways to simplify management and lower costs with synthetic data. You were also introduced to a way of thinking about data retention on the edge that will lead to simplified decisions.
We also covered how to optimize machine learning models for the edge. This could include using foundation models to simplify and speed up training. And we touched on model federation. We discussed the benefit of general-purpose...