Fog Computing Is A New Concept Of Data Distribution

Fog Computing Is A New Concept Of Data Distribution

Fog Computing Is A New Concept Of Data Distribution

For the last couple of years there have hardly been any new concepts in cloud computing. But hardly doesn’t mean never. Since the summer of 2013 you might have noticed the appearance of a new trend that has been called Fog Computing. The main purpose of fog computing is to gather services, applications, large data volumes in one place and unite them with the networks of a new generation. The aim is to offer data, computing power, memory and services at a really distributed level.

fog-computing

The thing is that today’s data is extremely dispersed and delivered continuously, in large volumes and to a large number of users with different devices. In order to make an effective cloud model, businesses need to learn how to deliver the content to their users via geographically distributed platforms and not via the cloud which is placed in one place. Thus, the idea of fog computing is to distribute all data and place it closer to a user, remove network delays and other possible obstacles connected with data transfer. Users need all their data and apps at any time in any place – this is the essence of cloud services. And fog computing may take this service to the next level.

The concept of this abstract fog is based on the concept of a drop (here we see why the concept has such a name). A drop is a chip of a microcontroller with built-in memory and data transfer interface, which is combined with wireless connection Mesh chip. Such a drop works on a small battery which is enough for a couple of years. You can connect different temperature, light, voltage sensors, etc. This drop is a basic technology for fog computing. With the help of such mini-chips it is possible to create really distributed network of data or devices all around the planet.

So what are the possible advantages of using fog computing?

Firstly, with the help of fog computing you can place data closer to the final user, even geographically. Constant data circulation in the world makes providers to create new technologies for their local storage and caching. The drops allow keeping the data close to a user instead of storing them in a data-center somewhere far. It helps to escape possible delays in data transfer.

Fog computing also helps to provide quality service for mobile users. The administrator of your infrastructure gets access to such data as from where and how your users get information, and how fast the process is. It helps to improve the interaction with clients, and make this interaction safer. By controlling data in all node points, fog computing allows turning your data center into a distributed cloud platform for users.

Secondly, this concept is not something to be developed in the future. It is already here. A lot of companies already introduce fog computing, while other companies are ready for it. Actually, any company which delivers content can start using fog computing.

What is important is that fog computing is not a replacement for cloud computing. It’s an addition which develops the concept of cloud services. Thanks to the “drops” it will be possible to isolate data in the cloud systems and keep them close to users.

By Eugene Rudenko

Eugene is a marketing manager for Oxagile, software development company offering custom SaaS solutions development for all types of businesses. Follow them in Twitter @Oxagile.

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Fog Computing Is A New Concept Of Data Distribution

  1. A very interesting post describing a potentially powerful tool in the constant struggle to cope with the volumes of data traversing networks. This is really a technology re-working of the trend about a decade ago, where data was cached in routers local to users. I guess the real power of this technology will be released if mobile device vendors incorporate these “Drop” chips in their architectures?

  2. That will be one of the easiest solutions, actually. But I’m not sure that it will be possible for biggest vendors to come to an agreement easily.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…