Fog Computing Is A New Concept Of Data Distribution

Fog Computing Is A New Concept Of Data Distribution

Fog Computing

For the last couple of years there have hardly been any new concepts in cloud computing. But hardly doesn’t mean never. Since the summer of 2013 you might have noticed the appearance of a new trend that has been called Fog Computing. The main purpose of fog computing is to gather services, applications, large data volumes in one place and unite them with the networks of a new generation. The aim is to offer data, computing power, memory and services at a really distributed level.

The thing is that today’s data is extremely dispersed and delivered continuously, in large volumes and to a large number of users with different devices. In order to make an effective cloud model, businesses need to learn how to deliver the content to their users via geographically distributed platforms and not via the cloud which is placed in one place. Thus, the idea of fog computing is to distribute all data and place it closer to a user, remove network delays and other possible obstacles connected with data transfer. Users need all their data and apps at any time in any place – this is the essence of cloud services. And fog computing may take this service to the next level.

The concept of this abstract fog is based on the concept of a drop (here we see why the concept has such a name). A drop is a chip of a microcontroller with built-in memory and data transfer interface, which is combined with wireless connection Mesh chip. Such a drop works on a small battery which is enough for a couple of years. You can connect different temperature, light, voltage sensors, etc. This drop is a basic technology for fog computing. With the help of such mini-chips it is possible to create really distributed network of data or devices all around the planet.

So what are the possible advantages of using fog computing?

Firstly, with the help of fog computing you can place data closer to the final user, even geographically. Constant data circulation in the world makes providers to create new technologies for their local storage and caching. The drops allow keeping the data close to a user instead of storing them in a data-center somewhere far. It helps to escape possible delays in data transfer.

Fog computing also helps to provide quality service for mobile users. The administrator of your infrastructure gets access to such data as from where and how your users get information, and how fast the process is. It helps to improve the interaction with clients, and make this interaction safer. By controlling data in all node points, fog computing allows turning your data center into a distributed cloud platform for users.

Secondly, this concept is not something to be developed in the future. It is already here. A lot of companies already introduce fog computing, while other companies are ready for it. Actually, any company which delivers content can start using fog computing.

What is important is that fog computing is not a replacement for cloud computing. It’s an addition which develops the concept of cloud services. Thanks to the “drops” it will be possible to isolate data in the cloud systems and keep them close to users.

By Eugene Rudenko

Eugene is a marketing manager for Oxagile, software development company offering custom SaaS solutions development for all types of businesses. 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…