Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-content/plugins/handl-utm-grabber/handl-utm-grabber.php on line 58

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758

Warning: Cannot modify header information - headers already sent by (output started at /home/secdgsunureuduns/public_html/wp-content/themes/consultio/functions.php:1) in /home/secdgsunureuduns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1758
{"id":5018,"date":"2020-02-29T06:56:25","date_gmt":"2020-02-29T06:56:25","guid":{"rendered":"http:\/\/dg7web.com\/securens\/?p=5018"},"modified":"2021-02-04T04:36:38","modified_gmt":"2021-02-04T04:36:38","slug":"demystifying-fog-computing-and-its-role-in-e-surveillance-part-1","status":"publish","type":"post","link":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/","title":{"rendered":"Demystifying Fog Computing and its role in E-surveillance (PART 1)"},"content":{"rendered":"

Cloud computing has seen unprecedented adoption by global businesses as they move towards the new internet paradigm to become better connected. As a result, much innovation has been observed in the Internet of Things (IoT) space like smartphones, self-driving cars, e-surveillance, unmanned drones, etc. As time will progress, more \u201cthings\u201d will get connected, largely by wireless technology, which leads us to one of the biggest challenges facing IoT i.e. bandwidth.<\/span><\/p>\n

Understanding \u201cfog\u201d<\/strong><\/p>\n

\"fog-computing_02\"<\/p>\n

The fog is an extension of cloud based computing. A horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum.<\/p>\n

Fog enables us to build solutions around:<\/p>\n

    \n
  1. Location awareness,<\/li>\n
  2. Mobility,<\/li>\n
  3. Wide geographical distribution,<\/li>\n
  4. Low latency (delay for information to go from point A to point B), and<\/li>\n
  5. Wireless access<\/li>\n<\/ol>\n

    Smart fog<\/strong><\/p>\n

    Fog is not simply adding layers between the cloud and the surface. It will act as an enabler for smart IoT devices and the new capabilities it will make possible are:<\/p>\n

      \n
    1. Sharing resources from one device to another<\/li>\n
    2. Taking real-time decisions<\/li>\n
    3. Contextual data (available locally) for customized intelligence enhancing user experience<\/li>\n
    4. Autonomous networks that operate locally and can take decisions like save energy and network bandwidth, improve data security, reduce latency, etc.<\/li>\n
    5. Streamline the online-to-offline processes by leveraging the physical proximity of customer for better authentication and cross-sell opportunities<\/li>\n<\/ol>\n

      E-surveillance and Fog<\/strong><\/p>\n

      Surveillance cameras are being deployed worldwide by retail outlets, smart homes and cities, manufacturing enterprises, etc. in order to secure things, people and places. They are heavily relying on camera sensors to detect unauthorized entry, pilferage, safety, reliability and efficiency.<\/p>\n

      These cameras are capable of generating terabytes worth of information in a single day. Traditional cloud networks are unavailable to handle this massive information as they aren\u2019t scalable and the sheer cost makes it unfeasible. Besides it is impractical to transfer all this data to the cloud to gain real-time insights.<\/p>\n

      Another point to consider is that security needs to be local. Real-time monitoring and detection of irregularities strictly needs low latency on surveillance systems; making timeliness paramount for both detection and response.<\/p>\n

      Fog deployments provide an opportunity to address the above concerns by moving the compute decision making device closer to the end point. We leverage fog architecture to crunch data closer to the end points and delivery the filter data relevant for trend analysis and forensics to the cloud<\/p>\n

      -By George.M.J., Sr.Vice-President-Information Technology<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

      At vero eos et accusamus et iustoodio digni goikussimos ducimus qui blanp ditiis praesum voluum. <\/p>\n","protected":false},"author":1,"featured_media":5019,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"\nDemystifying fog computing and It's role in E-Surveillance (PART 1) - Securens<\/title>\n<meta name=\"description\" content=\"Cloud computing has seen unprecedented adoption by global businesses. Learn more about the role of E-surveillance and Smart Fog in this blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying fog computing and It's role in E-Surveillance (PART 1) - Securens\" \/>\n<meta property=\"og:description\" content=\"Cloud computing has seen unprecedented adoption by global businesses. Learn more about the role of E-surveillance and Smart Fog in this blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Securens\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-29T06:56:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-04T04:36:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securens.in\/wp-content\/uploads\/2020\/02\/Fog-computing_01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"872\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Demystifying fog computing and It's role in E-Surveillance (PART 1) - Securens","description":"Cloud computing has seen unprecedented adoption by global businesses. Learn more about the role of E-surveillance and Smart Fog in this blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Demystifying fog computing and It's role in E-Surveillance (PART 1) - Securens","og_description":"Cloud computing has seen unprecedented adoption by global businesses. Learn more about the role of E-surveillance and Smart Fog in this blog","og_url":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/","og_site_name":"Securens","article_published_time":"2020-02-29T06:56:25+00:00","article_modified_time":"2021-02-04T04:36:38+00:00","og_image":[{"width":872,"height":500,"url":"https:\/\/www.securens.in\/wp-content\/uploads\/2020\/02\/Fog-computing_01.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/","url":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/","name":"Demystifying fog computing and It's role in E-Surveillance (PART 1) - Securens","isPartOf":{"@id":"https:\/\/www.securens.in\/#website"},"datePublished":"2020-02-29T06:56:25+00:00","dateModified":"2021-02-04T04:36:38+00:00","author":{"@id":"https:\/\/www.securens.in\/#\/schema\/person\/90edfa4d466e940a880382a81a53199f"},"description":"Cloud computing has seen unprecedented adoption by global businesses. Learn more about the role of E-surveillance and Smart Fog in this blog","breadcrumb":{"@id":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.securens.in\/blog\/demystifying-fog-computing-and-its-role-in-e-surveillance-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securens.in\/"},{"@type":"ListItem","position":2,"name":"Demystifying Fog Computing and its role in E-surveillance (PART 1)"}]},{"@type":"WebSite","@id":"https:\/\/www.securens.in\/#website","url":"https:\/\/www.securens.in\/","name":"Securens","description":"Prevent crime before it happens","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securens.in\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.securens.in\/#\/schema\/person\/90edfa4d466e940a880382a81a53199f","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securens.in\/#\/schema\/person\/image\/","url":"https:\/\/www.securens.in\/wp-content\/litespeed\/avatar\/7aa98a2d5b19fb0f87ce7fa1a3fa3f6e.jpg?ver=1714117379","contentUrl":"https:\/\/www.securens.in\/wp-content\/litespeed\/avatar\/7aa98a2d5b19fb0f87ce7fa1a3fa3f6e.jpg?ver=1714117379","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/posts\/5018"}],"collection":[{"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/comments?post=5018"}],"version-history":[{"count":2,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/posts\/5018\/revisions"}],"predecessor-version":[{"id":7675,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/posts\/5018\/revisions\/7675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/media\/5019"}],"wp:attachment":[{"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/media?parent=5018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/categories?post=5018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securens.in\/wp-json\/wp\/v2\/tags?post=5018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}