Resources

Insights

March 30, 2017

The OpenFog Reference Architecture: a Roundtable discussion on what it is, and why it matters

The OpenFog Consortium published the OpenFog Reference Architecture in February 2017.  A few of our Working Group co-chairs took time from their busy schedules to sit down with Embedded Computing Design magazine to talk about this work, and why it matters.  Here's what they had to say.  Read More

 

January 18, 2017

Top 10 myths of fog computing

Like any emerging technology, fog computing comes with its share of hype and misperceptions.  To set the record straight, the OpenFog Consortium takes on the top 10 myths of fog computing.   Myth #1. Fog and edge are the same thing. Fog computing and edge computing are closely related concepts, but they are not synonyms.…  Read More

 

December 12, 2016

Top 5 technical reasons why the IoT needs fog computing

Fog computing is a system-level horizontal architecture that distributes resources and services of computing and control, storage, networking and communications closer to the data sources.  Through the fog-to-things continuum, fog computing can solve the bandwidth, latency and communications challenges associated with next generation networks that will utilize the Internet of Things (IoT). Cloud is an…  Read More

 

December 12, 2016

Top 5 business reasons why the IoT needs fog computing

The IoT is a giant network of connected things:  Billions and billions of devices that stream terabytes of data between people and things, and things to things. In many industries - discrete and process manufacturing, power and energy, utilities, connected cars, transportation, connected cities – IoT is propelling economic growth through new business models and…  Read More

 

November 7, 2016

Top 5 Ways Fog Computing Can Make IoT More Secure

The October attack by 500,000 IoT devices that brought down the Dyn servers via a distributed-denial-of-service approach is the first of its kind, but it likely won’t be the last.  The billions of connected devices need to be protected – and to in turn protect – the systems to which they are connected. IoT environments…  Read More