Cisco Blogs


Cisco Blog > Data Center and Cloud

City of San Carlos Gets Smart About Parking

Unless you did all your Holiday shopping online this season, you no doubt experienced the nuisance of trying to find a parking spot. In San Carlos, this was becoming an issue beyond just frustration. Businesses were worried about losing customers due to the lack of parking availability. The city took action using Internet of Everything (IoE) technology and came up with “smart parking.”

The idea is simple: install sensors in each parking spot that can detect when a vehicle is present or not. Motorists who have installed the smart parking app on their smart device have visibility into available parking spots in the vicinity.

But why stop with parking? The use of sensory devices can be implemented in many other areas of city improvement as well, such as prevention in sewer problems, traffic lights, and more. Simply by detecting an issue, city maintenance crews can be dispatched to solve the issue before it becomes a bigger problem.

To see smart parking in action, watch this short video.

Tags: , ,

New Reference Book: Big Data Management, Technologies, and Applications

Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere and represents huge opportunities to those who can use it effectively. In the past, this information was simply ignored and opportunities were missed. Realizing the great importance of big data, organizations scramble to find hidden information buried in big data and try to make the best use of it. I have recently contributed to a reference book titled Big Data Management, Technologies, and Applications published with IGI Global that provides the most up-to-date, crucial, and practical information for big data management, technologies, and applications. My chapter contribution titled “A Review of System Benchmark Standards and a Look Ahead Towards an Industry Standard for Benchmarking Big Data Workloads”, looks into techniques to measure the effectiveness of hardware and software platforms dealing with big data.

For additional information on this chapter, including a full abstract, visit the chapter website: http://www.igi-global.com/chapter/a-review-of-system-benchmark-standards-and-a-look-ahead-towards-an-industry-standard-for-benchmarking-big-data-workloads/85466. Also see contribution from my colleague Kapil Bakshi, titled Technologies for Big Data.

2013 – A year in review for UCS Management! What will 2014 bring?

December 31, 2013 at 10:15 am PST

As we come to the end of 2013, there is a lot to look back at, and still more to look forward to in 2014.  Last year I speculated whether 2012 was the year of converged infrastructure and all indications are that it was true.  I was at the Gartner Data Center conference in Las Vegas earlier this month, where they referred to converged infrastructure as Fabric-based infrastructure, and expect it to become mainstream within 2-5 years.

As I look back at 2013, some of the big events, from a UCS and management perspective were:

  1. Cisco entered the ranks of the top 5 server vendors with the UCS.
  2. The virtual UCS community started a monthly UCS Tech talk series.
  3. Cloupia was renamed Cisco UCS Director, and won the Storage, Virtualization and Cloud (SVC) 2013 product of the year award
  4. Cisco extended the innovative concept of the UCS Service profiles and introduced Application Centric Infrastructure.
  5. Updated version of the Cisco UCS Manager (2.2) was released this month

Interestingly at the Gartner conference, data center automation was a topic of great interest and many sessions were dedicated to it. The Cisco UCS Management portfolio products are designed specifically to automate data center operations, increase operating efficiencies and Read More »

Tags: , , , , ,

Year in Review: Top 10 Mobility Blogs of 2013

Takeaway: The Cisco Enterprise Mobility group has stayed ahead of the competition by staying innovative and cutting edge while delivering quality, high performing products and solutions, while displaying thought leadership on major technological trends such as 802.11ac and location-based services. We use this mobility blog as a platform to deliver information straight to wireless fans and readers. Here are the top 10 most read posts in 2013.

10. Monetize Your WLAN Using Cisco Location Analytics

9.  Cisco Hacks: Notes from the CMX Hackathon

8. Looking Past the Mobile Phone

7. 802.11ac: Is Your Network Ready for Next-Gen Wi-Fi Traffic?

6. Cisco’s New Wall AP Helps Hoteliers Deliver In-Room Wi-Fi Access

5. Client Adoption for 802.11ac Wireless Technology Read More »

Tags: , , , , , , , , , , , , , , , ,

Comment on Der Spiegel articles about NSA TAO Organization (UPDATE 2)

UPDATE 2: On Monday, December 30th, Der Spiegel magazine published additional information about the techniques allegedly used by NSA TAO to infiltrate the technologies of numerous IT companies. As a result of this new information coming to light, the Cisco Product Security Incident Response Team (PSIRT) has opened an investigation. Customers can stay informed of the progress of this investigation via the previously posted Cisco Security Response.

December 29th -- An article was published in Der Spiegel today about the alleged capabilities of the United States National Security Agency (NSA) Tailored Access Operations (TAO) organization. The article says that TAO “exploits the technical weaknesses” of Information Technology products from numerous companies, and mentions Cisco. 

We are deeply concerned with anything that may impact the integrity of our products or our customers’ networks and continue to seek additional information.

We are committed to avoiding security issues in our products, and handling issues professionally when they arise. Our Trustworthy Systems initiatives, Cisco Secure Development Lifecycle, Cisco Common Crypto models, and Product Security Incident Response Team (PSIRT) and Vulnerability Disclosure policies are all industry-leading examples of our commitment to our customers. This is central to how we earn and maintain trust.

At this time, we do not know of any new product vulnerabilities, and will continue to pursue all avenues to determine if we need to address any new issues. If we learn of a security weakness in any of our products, we will immediately address it.

As we have stated prior, and communicated to Der Spiegel, we do not work with any government to weaken our products for exploitation, nor to implement any so-called security ‘back doors’ in our products.

UPDATE 1: Customers seeking additional information may refer to the Cisco Security Response.

Additional Resources:

Cisco Trustworthy Systems: http://www.cisco.com/web/solutions/trends/trustworthy_systems/index.html

Cisco Secure Development Lifecycle: http://www.cisco.com/web/about/security/cspo/csdl/index.html

Cisco Security Advisories, Responses and Notices:http://www.cisco.com/en/US/products/products_security_advisories_listing.html

Cisco Security Vulnerability Policy:http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html

Cisco Blogs on Security and Cryptography http://blogs.cisco.com/tag/crypto/

 

Tags: , , ,