What the heck is Fog Computing?

While many are still trying to figure out Cloud Computing, here comes a rival concept – Fog Computing. It’s computing that takes place at the edge of the network, closer to home. That is, computing that takes place on the devices that are nearest to you – your smartphone and other connected devices that are around you. The so-called Internet of Things (IoT), or Internet of Everything (IoE).

Fog Computing is not a new concept. Like Cloud Computing, it’s just a marketing buzzword for something that’s already taking place. Here’s an excerpt from a Wall Street Journal on the topic:

The problem of how to get things done when we’re dependent on the cloud is becoming all the more acute as more and more objects become “smart,” or able to sense their environments, connect to the Internet, and even receive commands remotely. Everything from jet engines to refrigerators is being pushed onto wireless networks and joining the “Internet of Things.”

Modern 3G and 4G cellular networks simply aren’t fast enough to transmit data from devices to the cloud at the pace it is generated, and as every mundane object at home and at work gets in on this game, it’s only going to get worse.

Luckily there’s an obvious solution: Stop focusing on the cloud, and start figuring out how to store and process the torrent of data being generated by the Internet of Things (also known as the industrial Internet) on the things themselves, or on devices that sit between our things and the Internet.

Marketers at Cisco Systems Inc. CSCO +0.79% have already come up with a name for this phenomenon: fog computing.

Fog Computing
Credit: Image taken from original WSJ article.

You may read the complete article here.

Related Posts

ZShaolin Android terminal updated ZShaolin, a terminal program for Android devices has been updated to version 0.8. ZShaolin makes is possible to use zsh on Android devices, provid...
Gemalto Files Patent Infringement Lawsuit Over Android Gemalto N.V., a digital security outfit based in Amsterdam, Netherlands, just announced that it has filed a patent infringement lawsuit in the United ...
Open standards made mandatory for public administrations Open standards have been made mandatory for the IT systems of Hungary's public administrations. The Hungarian parliament voted in favour of amendment...
Hardware, Software Advances Help Protect Operating Systems from Attack The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer -- or crash it. Now resear...
Privacy International announces the “Eyes Wide Open” project Eyes Wide Open is a new project from Privacy International, a UK Charity. The goals of the project are to: 1. Pry open the Five Eyes arrangement an...
5 performance tips for Node.js applications Node.js is single-threaded and uses non-blocking I/O, allowing it to scale and support tens of thousands of concurrent operations. It shares these...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*