Avatar

Recently I shared with you an ACG Research report which shows Cisco leading in Mobile IP Infrastructure and gaining market share.

Now step with me into the future for a moment and picture this.

2018 – nearly 21 billion globally networked devices and connections are live, 7.3 billion M2M are online, four billion global Internet users are connected, and IP video  represents 79 percent of all Internet traffic. According to a recent Cisco Visual Networking Index study, this is a mere glimpse of the future. And who is at the heart of enabling all of this? You’re right, mobile service providers.

The next thing you will want to know is what puts them in this sweet spot. Capturing  the opportunities afforded by everything going mobile is not easy. Yet service providers alerted at this high-stakes business promise of the future are racing to set themselves up with the means to leverage it. They are employing an architectural approach to their networks that will allow them a couple of things; apply Continue reading “Good News Keep Coming on the Mobility Front”



Authors

Kelly Ahuja

Senior Vice President

Service Provider Business, Products, and Solutions

Avatar

With Big Data, the Cloud and the Internet of Everything transforming our world, the possibilities are staggering.  And status quo means falling behind.  These truths drive Data Virtualization Day 2014’s theme: New Horizons, New Possibilities.  

This year marks the fifth anniversary of Data Virtualization Day, the premier data virtualization industry event, where IT leaders stay informed of the latest trends and meet fellow innovators.

As host of Data Virtualization Day 2014, I would like to personally invite the entire data virtualization community to come together on October 1st, 2014, at the historic Waldorf Astoria in New York City, New York.

Our objective is to help you explore these new horizons and imagine these new possibilities.  In particular, Data Virtualization Day will address:

  • Why Big Data, the Cloud and the Internet of Everything are transforming business and IT?
  • How is data virtualization advancing to meet these opportunities?
  • What new data virtualization-based solutions are on the horizon?
  • Who is achieving significant business outcomes today?

Maintaining the Data Virtualization Day tradition, the all-day agenda will feature three data virtualization user case studies, presented by those users.  Past speakers have included CTO, CDO, and other executives from Goldman Sachs, Pearson, Comcast, NYSE, Franklin Templeton, Bank of America, Qualcomm, Sky Broadcasting and more.  And we are lining up a power-packed line up again this year to provide you with complete, insiders’ views into their advanced data virtualization deployments including business challenges, organizational transformation, technology adoption, and more.

Watch highlights from our customer presenter at Data Virtualization Day 2013.

Beyond the user speakers, industry analysts and Cisco executives will provide insights into trends and solutions that you can use as you map for your business’s data integration strategy.

And furthering the Data Virtualization Day tradition, winners of the 2014 Data Virtualization Leadership Awards will also be announced.  These are the best of the best.  Enjoy as we celebrate their accomplishments.

So join me, along with data virtualization’s vanguard, to explore these new horizons and imagine these new possibilities.  Registration is easy.  And the event is free.  Register now. 

Learn More

To learn more about Cisco Data Virtualization, check out our page

Join the Conversation

Follow us @CiscoDataVirt #DVDNYC



Authors

Bob Eve

No Longer with Cisco

Avatar

In my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective protection: automated, advanced analytics.

Today’s advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time, and can obfuscate the exfiltration of data. To detect advanced attacks as they move laterally through the network and across endpoints, defenders need technologies that automatically look for Indicators of Compromise (IoCs) left behind by malware and exploits, as well as more advanced behaviors of compromise that happen over time. Continue reading “A New Model to Protect the Endpoint, Part 3: Automated Advanced Analytics”



Authors

Tom Stitt

Product Marketing Director

Advanced Malware Protection

Avatar

Cisco and Akamai ConnectHas this happened to you? The line of business comes to you one day and says they have this great new idea to train the sales teams.  “Let’s use YouTube videos”, they say.  Or the CMO comes to you and says, “digital signage will increase our revenue if we can promote this next new line of products that is about to launch”.  Or “This new cloud application looks great and it will increase employee productivity!”

But all you could say was ‘no, that’s not possible’.  Not because you didn’t want to enable each of these groups but because 1) you are short of resources or 2) budget is tight or 3) the infrastructure just isn’t ready yet.  Any or all of the above?

With 80% of the workforce in a non-HQ location, enabling these digital services is daunting to IT.  What happens to other business critical applications if the WAN is flooded with YouTube videos?  Digital Signage is a great idea, sure, but how do I distribute those HD videos or images to the stores?  Cloud applications may seem like not much as a user but what happens if all my users are accessing the cloud at the same time? Continue reading “IWAN Wed: Say “Yes” and “Now” with Akamai Connect”



Authors

Allison Park

Product Marketing Manager

Enterprise Networks

Avatar

wifibeaconIn just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.

Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:

How do beacons work?

Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags.  These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.

I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Continue reading “Indoor WiFi Location and Beacons: Better Together”



Authors

Jason Rolleston

Sr. Director of Product Management

Cisco's Connected Mobile Experience (CMX)

Avatar

Unless you’ve been living under a rock for the last two weeks, you know that the FIFA World Cup is in full swing. Stakes are higher than ever as we move into the semi-finals with more and more people tuning in to cheer on their favorite futbol teams. In fact, FIFA just released a media release yesterday about how this year’s 2014 FIFA World Cup™ has set new records for streaming data traffic around the world. My colleague Ido blogged about IWAN helping with the bandwidth overload caused by the FIFA World Cup last week, so let’s dive deeper and talk about video and high density.

There is no denying it: your employees and customers are streaming video. While the volume of that streaming dramatically peaks around game times during the World Cup, it should be no surprise that today, mobile applications, largely video, are increasing mobile traffic across networks. That’s straight forward: apps + video = bandwidth drain. Combine that with the fact that people are touting multiple devices–think a laptop and a smartphone, maybe a tablet, too. This means high density–lots of clients and devices on a single network. These circumstances trigger three potential yellow cards to cross an IT person’s mind – let’s see how we can avoid them.

YELLOW CARD #1: Rich Media Optimization

As an end-user, the common expectation is that I should get the same crisp, clear, rich  media or video experience across all platforms—I don’t care if it’s my phone, my tablet or my laptop: make it high definition. This is harder said than done.

It is not easy to provide the same rich media experience across wired and wireless devices. Traffic from wireless devices has to travel all the way back to the controller in a data center and then back to an access switch before reaching its destination. It’s called the hairpin effect. The result is that video over Wi-Fi could look grainy. That won’t do for the current generation of high definition junkies. Continue reading “Score for IT this World Cup”



Avatar

Tony Scotino Stills

One of the best times I always have at Cisco Live involves getting to play ‘TV Anchor’ for the various live shows we stream. Well the Cisco TV team lets us use their equipment to do a live version of TechWiseTV each afternoon as well. Now honestly, I do plan these out…a little. But our day three show is generally a ‘hey…what do we WANT to do” kind of show. Planning for day 3 simply involved asking Jimmy Ray and Tina what they wanted. We had TWO wireless cameras this year to play with so it felt like we could do a little more. As for me (with input from the hillbilly of course), we wanted to take advantage of Wireless Stew’s presence and get him up to tell his story…so that is how we started.

Cisco Live 2014

Stewart Gouman’s is a fantastic fan of the show, running his wireless consultancy and very informative blog from the Great White North. He has sought us out in just a few visits over the years stopping by the studio in San Jose or catching us while at Cisco Live when we all end up in the same place. Watch the show and get his career and community advice.

Tina gave an ‘intoxicating’ review of her favorite IoT demo at the wine bar.

Tina Intoxicating Demo

Jimmy Ray ran back to one of his favorite netflow analyzer’s Plixer.

Tony Scotino Stills

Did you miss it while live? Catch it now…just as it happened..

 

Thanks for watching!

@robboyd

 



Authors

Robb Boyd

Producer, Writer, Host

Avatar

davacostBy David Acosta, Technical Marketing Engineer

Our service provider customers like you are trying to simultaneously keep pace with the surging network traffic in today’s Internet of Things (IoT) era while providing consistently high quality of experience and introduce new services quickly for a competitive advantage.

New technologies like Voice over LTE and the need to connect the expected 37 billion devices like cars, trains, building sensors, and “wearable devices” by 2020 means that data must be treated differently than it has been historically.  At the same time, your consumers are expecting the same quality of experience whether they connect to th Continue reading “Stay Ahead of Internet of Things (IoT) Traffic Demands and Maintain Your Competitive Advantage”



Authors

Keith Day

Marketing Director

Service Provider Mobility Business

Avatar

As the world has moved to a cloud-based IT model, the rules of the game have changed. This has led to a different way of thinking for CIOs and IT managers.  Let’s face it, an IT manager doesn’t wake up and say, “I have to buy some virtualization today,” or “I have to buy a Disaster Recovery as a Service offering.”  Rather there is a comprehensive adoption lifecycle that IT managers must go through as they determine what services they need and how to migrate these services to cloud.  Within certain phases of the lifecycle, partners have sizable revenue opportunities, especially before and after the service selection phase.

Phase One: Business Model Evaluation

It starts with business drivers. Prospective cloud customers must determine what business model changes are required, the lines of business requirements that need to be considered, and what organizational changes may be necessary.  Evaluating these business and financial aspects are key to consider in their cloud migration plan.  Partners must help the customer determine what is most important in making their journey to cloud and how to build a practice around that initial phase of the cloud adoption lifecycle.  Partners’ consulting services should focus on a cloud business case justification that helps their customer understand the project plan and investment, with a 3-5 year plan and the ROI/business benefits of moving to cloud.

After going through a business case evaluation of cloud, customers must also consider their infrastructure requirements.  The infrastructure assessment should answer questions such as: how will cloud impact fixed facilities?  What will it do to mobile users?  What is the knowledge level of the business stakeholders on the applications that move across the organization?  What applications need to be enabled on the network?

In order to recognize the total cost of ownership (TCO) benefits of cloud, customers must rationalize and understand the type of workloads that need to move to public, private , or hybrid clouds, and what the network needs to look like to support those applications.  This is a ripe area for partners to generate revenues through formal cloud infrastructure assessments.   Continue reading “How Do Partners Make Money in this New Cloud World”



Authors

Bob Gault

Vice President

Cloud and Managed Services Partner Organization Cisco