When last we left our hero, he (that is, me, or I) was getting a crash course in Nexus programmability and trying to understand what all of this stuff meant. I had plied Jim* with beer in order to get him to explain to me – using the available napkins in the bar – what the technology was, what it meant, and why I should care. Read More »
Recently I shared with you an ACG Research report which shows Cisco leading in Mobile IP Infrastructure and gaining market share.
Now step with me into the future for a moment and picture this.
2018 -- nearly 21 billion globally networked devices and connections are live, 7.3 billion M2M are online, four billion global Internet users are connected, and IP video represents 79 percent of all Internet traffic. According to a recent Cisco Visual Networking Index study, this is a mere glimpse of the future. And who is at the heart of enabling all of this? You’re right, mobile service providers.
The next thing you will want to know is what puts them in this sweet spot. Capturing the opportunities afforded by everything going mobile is not easy. Yet service providers alerted at this high-stakes business promise of the future are racing to set themselves up with the means to leverage it. They are employing an architectural approach to their networks that will allow them a couple of things; apply Read More »
Tags: asr, ASR5000 Series, ASR9000, CRS, EPC, esp, evolved services platform, Kelly Ahuja, LTE, mobile backhaul, Mobile IP Core, Mobile IP Infrastructure MPC, packet core, Quantum vPC, Service Provider
With Big Data, the Cloud and the Internet of Everything transforming our world, the possibilities are staggering. And status quo means falling behind. These truths drive Data Virtualization Day 2014’s theme: New Horizons, New Possibilities.
This year marks the fifth anniversary of Data Virtualization Day, the premier data virtualization industry event, where IT leaders stay informed of the latest trends and meet fellow innovators.
As host of Data Virtualization Day 2014, I would like to personally invite the entire data virtualization community to come together on October 1st, 2014, at the historic Waldorf Astoria in New York City, New York.
Our objective is to help you explore these new horizons and imagine these new possibilities. In particular, Data Virtualization Day will address:
- Why Big Data, the Cloud and the Internet of Everything are transforming business and IT?
- How is data virtualization advancing to meet these opportunities?
- What new data virtualization-based solutions are on the horizon?
- Who is achieving significant business outcomes today?
Maintaining the Data Virtualization Day tradition, the all-day agenda will feature three data virtualization user case studies, presented by those users. Past speakers have included CTO, CDO, and other executives from Goldman Sachs, Pearson, Comcast, NYSE, Franklin Templeton, Bank of America, Qualcomm, Sky Broadcasting and more. And we are lining up a power-packed line up again this year to provide you with complete, insiders’ views into their advanced data virtualization deployments including business challenges, organizational transformation, technology adoption, and more.
Watch highlights from our customer presenter at Data Virtualization Day 2013.
Beyond the user speakers, industry analysts and Cisco executives will provide insights into trends and solutions that you can use as you map for your business’s data integration strategy.
And furthering the Data Virtualization Day tradition, winners of the 2014 Data Virtualization Leadership Awards will also be announced. These are the best of the best. Enjoy as we celebrate their accomplishments.
So join me, along with data virtualization’s vanguard, to explore these new horizons and imagine these new possibilities. Registration is easy. And the event is free. Register now.
To learn more about Cisco Data Virtualization, check out our page.
Join the Conversation
Follow us @CiscoDataVirt #DVDNYC
Several customers have asked me how Cisco IT does project planning for a large enterprise deployment such as the Identity Services Engine, or ISE. What’s our approach? How do we manage operational costs? How do we measure performance? What personnel are involved throughout the process? Read More »
In my final post in this series, I wanted to focus on another powerful innovation made possible by combining a big data architecture and a continuous approach for more effective protection: automated, advanced analytics.
Today’s advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time, and can obfuscate the exfiltration of data. To detect advanced attacks as they move laterally through the network and across endpoints, defenders need technologies that automatically look for Indicators of Compromise (IoCs) left behind by malware and exploits, as well as more advanced behaviors of compromise that happen over time. Read More »