Cisco partner Anittel has announced that it will be implementing a new communication system, based on Cisco Hosted Collaboration Solution, for the Tasmanian Government.
By hosting its communication and collaboration systems in the cloud, the Tasmanian Government will optimise internal processes and improve overall employee productivity. Based on a Cisco Powered Cloud implemented by Anittel, it’s expected that Tasmania’s whole-of-government shared service initiative will also benefit from the ability to move forward with more agility, flexibility and speed.
Read More »
My previous blogs have turned into a “in a world” series introducing the reader to the versatility of the Cisco Unified Computing System. We are no strangers to the fact that data collection and data records are exploding. The Internet of Things (IoT) promises to add a lot more data to our treasure trove. As more objects are embedded with sensors and get the ability to communicate even more data will be collected and stored. Here at Cisco, we see the Internet of Everything (IoE), which goes beyond IoT when we add people, processes and information to the mix. Cisco defines IoE as bringing together people, process, data, and things to make networked connections more relevant and valuable than ever before—turning information into actions that create new capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries. Check out http://blogs.cisco.com/ioe/how-the-internet-of-everything-will-change-the-worldfor-the-better-infographic/
Clearly the Internet of everything (IoE) will affect the data center in many ways. In this video Cisco VP Satinder Sethi, gives us a perspective on some of the challenges and how Cisco is partnering with other IT companies to solve the problems.
Organizations can transform, mine or analyze the data collected to create new business models, improve business processes, and reduce costs and risks. The recent NSA scandal of tacking phone records indicates it can be used to improve physical security. Read More »
Tags: Big Data, Cisco UCSM, UCS, UCS Manager
Today, I had the opportunity to speak with students of the Cisco Networking Academy. These students were selected to run the network at Cisco Live this year and run the Cisco Network Operations Center (NOC).
An innovative information and communications technology (ICT) education program, the Cisco Networking Academy provides a million students worldwide with the skills needed to design, build, manage and secure computer networks. This educations provides a pathway to ICT jobs, further education and globally-recognized industry certifications.
I’m very proud to say that many of the Networking Academy students are veterans. In fact, the Army at Fort Gordon, Georgia trains over 2,600 soldiers annually in its Networking Academy program. Read More »
Tags: #CLUS, 000 jobs mission, 100, CCNA, cna, netacad, veterans
It is not new that people are referring to Bring Your Own Device (BYOD) as Bring Your Own Malware (BYOM). In 2012 alone, Android malware encounters grew 2,577 percent (for details, see Cisco’s Annual Security Report). Many organizations are struggling to keep up with the BYOD trend by allowing employees to bring their favorite gadgets to the office to increase productivity and employee satisfaction. However, they are also struggling when trying to protect critical corporate assets, user’s data, and intellectual property in their employees’ mobile devices. Read More »
Tags: byod, Cisco Live 2013, Cisco Live Orlando, Cisco Security, cisco sio, malware, mobility
The HIPAA Omnibus Final Rule, released January 2013, introduced some significant changes and updates. The 2012 HIPAA audits, performed by KPMG, concluded with some initial findings released by the Department of Health and Human Services (HHS) Office of Civil Rights, OCR. These two events may impact how you govern your internal organization and network for patient privacy and protection of PHI.
Here are nine network considerations to address in the new HIPAA landscape. I will discuss the first consideration in this blog.
- HIPAA Audits will continue
- The HIPAA Audit Protocol and NIST 800-66 are your best preparation
- Knowledge is a powerful weapon―know where your PHI is
- Ignorance is not bliss
- Risk Assessment drives your baseline
- Risk Management is continuous
- Security best practices are essential
- Breach discovery times: know your discovery tolerance
- Your business associate(s)must be tracked
Read More »
Tags: healthcare, HIPAA, PCI Compliance