Home SecurityNetwork Security Edge computing: 5 potential pitfalls