Cisco Blogs


Cisco Blog > Internet of Everything

The Internet of Everything and the Future of Wearable Technology: Three Ways to Get it Right

One of the most visible forms of the Internet of Everything (IoE), at least from a consumer’s perspective, is the advent of wearables, a term for wearable computing devices. The full range of this new form factor for mobile devices is very wide and I would like to define wearables as electronic systems located on the body that mediate their user and their environment. From activity trackers like FitBit and Up by JawBone and other quantified self applications, to more advanced information devices like Google Glass and Samsung Smartgear, these first generation devices are always on and always connected. Next generation devices will also be contextual and intelligent thanks to the Internet of Everything’s convergence of people, devices, data and the web.

Computing devices have moved from our desktop to our lap, to our pocket and now onto our body. Technology has never been this personal, however, we are far from the wearables endgame. For wearables to truly become a useful addition to our already technology-filled lives, we need to get back to the basics. Here’s a brief look at three ways we can evolve wearables by thinking about the technology itself, our interaction with these devices and the value they should offer.

Read More »

Tags: , , , , , , , ,

Despite budget constraints, spending on cyber security set to increase according to Cisco study of government IT decision makers

While the shutdown challenges in the federal government over the past week have been top-of-mind, a recent Cisco survey has discovered that when operations resume, overall budget constraints are seen as the greatest challenge to government IT infrastructure, even ranking ahead of cyber attacks. This information was gathered through a third-party survey, the Cisco Connected Government Study, which was conducted last month by Clarus Research.

400 government IT decision makers (federal, state and local) were included, and the results show that reducing costs and increasing security continue to be top priorities for government IT decision makers. In the face of budget challenges, a majority (59%) of government IT decision makers said they are still likely to increase investment in cyber security over the next year, followed by cloud computing (45%) and networking (42%), according to a new Cisco Connected Government survey.

Read More »

Tags: , , , , ,

Cyber Security Awareness Month 2013: Trust is the Topic

With October designated as Cyber Security Awareness Month, it got me thinking about the connections between awareness and trust. Cisco has made significant investments in what we call “Trustworthy Systems.” These products and services integrate security features, functions, and design practices from the very beginning. We do this because we know that people will be depending on Cisco products for communications critical to their personal and professional missions. Read More »

Tags: , , ,

Catalyst 3650 Delivers High Quality User Experience with Simplicity

October 10, 2013 at 5:00 am PST

The network at my workplace is getting really fast these days. I cannot believe that as soon as I hit “Download” to pull a 50 MB

Get to know the new Cisco Catalyst 3650 Switch

Get to know the new Cisco Catalyst 3650 Switch

video file from a server to my laptop, the browser immediately says “Download is complete.” Wait, isn’t that supposed to take a few minutes, or at least a few seconds? Wireless is also getting dramatically better. Not too long ago, wireless was “nice to have” and only as a secondary means of network support. Today everyone’s expectation is that “wireless has to work”. Whether I plug in to my wired docking station, or move to a conference room with wireless, everything just works equally well. Is that your experience, too? If not, the newly announced Catalyst 3650 switch will make that happen for you very soon. There’s much more to it, but supporting gigabit desktop and 802.11ac is just a simple example of how the Catalyst 3650 can dramatically enable high quality user experience.

Several years ago, Cisco anticipated rapid growth of high demand on the network and mobile device surge in the workplace that are taking place today. That is why Cisco designed and executed on a Unified Access strategy to bring wired and wireless networks together with superior performance and consistency. At the heart of the technology is the Cisco Unified Access Data Plane (UADP) ASIC that enables wired-wireless convergence right on the network edge, with the enforcement of necessary security and management policies.

Why is wired-wireless convergence so critical, you ask?

Read More »

Tags: , , ,

What Advocacy and My Yoga Pants Have in Common

October 9, 2013 at 5:17 pm PST

I have been getting a lot of questions about advocacy so I want to take a few minutes to share my thoughts. I often hear people use the terms “influencers” and “advocates” interchangeably. While there are similarities between these two groups, in my opinion they’re not necessarily one and the same. You may have a different viewpoint on this, and that’s fine. What I’ve discovered is people define these terms differently which results in mixing these 2 groups. Taking some liberties with Ant’s Eye View’s (AEV) definitions of advocates and influencers, this is how I would like to describe them:

An influencer is someone who actively shares their opinions and expertise through their (large) personal and professional networks. An influencer is someone that can cause an effect without apparent exertion or force. Most common examples include analysts and media.

An advocate is someone who proactively defends, promotes and participates in the public conversation for a particular brand, product, service or cause. An advocate is someone that has positive affinity toward and stands behind a brand, product or cause. Most common examples include your most passionate customers and general brand aficionados.

In my mind, advocacy implies Read More »

Tags: , , , , , , , , , , , , , ,