Fog Computing

Fog computing is a term created by Cisco that refers to extending cloud computing to the edge of an enterprise’s network. Also known as Edge Computing or fogging, fog computing facilitates the operation of compute, storage and networking services between end devices and cloud computing data centers.

Cisco introduced its fog computing vision in January 2014 as a way of bringing cloud computing capabilities to the edge of the network and as a result, closer to the rapidly growing number of connected devices and applications that consume cloud services and generate increasingly massive amounts of data.

By handling these services that make up the Internet of Things (IoT) at the network edge, data can in many cases be processed more efficiently than if it needed to be sent to the cloud for processing.

Cisco’s IOx Fog Computing Platform and Edge Computing Competition

The fog computing vision has taken form in Cisco’s IOx platform, which according to a recent eWeek article, “brings distributed computing capabilities to the edge of the network by running applications directly on Cisco network devices, such as ruggedized switches, routers and IP video cameras.”

While Cisco may have coined the term fog computing, it has competition in the nascent edge computing market from companies like EMC, VMware, Intel and IBM, all of which are rolling out or are in the process of rolling out products that deliver edge computing capabilities.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...

Crypt888 Ransomware

Crypt888, also known as Mircop, is ransomware that encrypts files on desktops, downloads,...

AutoLocky Ransomware

AutoLocky is ransomware written in the popular AutoIt scripting language. It uses strong...