Avatar

I wasn’t around during the Industrial Revolution, but I can’t help but think that today is an even more interesting time to be in manufacturing. I’m happy to be participating this week in the annual Rockwell Automation Fair, where it seems we can see the Internet of Things (IoT) evolving in real time.

Perhaps no other industry is being disrupted by technology more than manufacturing. As manufacturers digitize their businesses, operational complexity increases and competitive pressure builds—driving the need for faster innovation, quicker time to market, and more efficient processes. Those who can’t keep up are left behind. Continue reading “The Internet of Things Accelerates Innovation and Value Creation for Manufacturers”



Authors

Douglas Bellin

Global Lead, Industries

Manufacturing and Energy

Avatar

This post was authored by Alex Chiu with contributions from Joel Esler.

Advanced persistent threats are a problem that many companies and organizations of all sizes face.  In the past two days, information regarding a highly targeted campaign known as ‘Regin’ has been publicly disclosed.  The threat actors behind ‘Regin’ appear to be targeting organizations in the Financial, Government, and Telecommunications verticals as well as targeting research institutions in the Education vertical.  Talos is aware of these reports and has responded to the issue in order to ensure our customers are protected. Continue reading “Cisco Coverage for ‘Regin’ Campaign”



Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

In this guest blog, Jacob Morgan, author, speaker and futurist, shares his vision for how the Internet of Everything will shape the day-to-day lives of future knowledge workers.

As evidenced by the results of Cisco’s 2014 Connected World Technology Report, the future of work will be more collaborative than ever before. As a result, the typical day of tomorrow’s knowledge worker will be dramatically different than it is today.

Consider this early morning scenario:

6:30 a.m. – Most of us today wake up to an alarm clock. But imagine your alarm clock is connected to your coffee maker that automatically starts brewing your coffee and is is connected to your car, which tells you when you need to leave for work based on traffic patterns and weather as you pour your first cup. Continue reading “The Future Knowledge Worker”



Authors

Jacob Morgan

Author, Speaker and Futurist

Avatar

Trust is a fundamental requirement for people to use the Internet with confidence, and Cisco continues to find opportunities to make the Internet even more secure.

I am happy to share that we are a founding sponsor of a new public benefit consortium called the Internet Security Research Group (ISRG). The goal of the ISRG is to advocate the use of SSL/TLS technologies by promoting the installation, use and maintenance of digital certificates for Internet services such as Web servers.

Digital certificates provide the anchor for secure communication, and more certificates enable more trusted network traffic. This initiative will significantly reduce the total surface area of exposure by preventing untrusted traffic from becoming bigger attacks.

Currently, deploying secure Internet services requires an intricate series of administrative steps. The ISRG is developing a set of open, standardized APIs for managing certificates and an initial Certificate Authority (CA) that implements these APIs. The vision is that all Internet services will seamlessly acquire and renew certificates during the normal server installation and maintenance processes. Over time, this frictionless approach should greatly expand the number of Internet services that are more rigorously secured.

The ISRG is launching with a diverse set of commercial and non-commercial sponsors. One of the reasons Cisco supports the ISRG approach is their commitment to the open community – its protocols and APIs will be open standards. The ISRG will develop them using a collaborative process, and as much of the software as possible will be open source. The CA it operates will make all records of issuance and revocation available for public inspection, for complete transparency.

Learn more about our involvement with the ISRG and how we collectively plan to support the ubiquitous use of encryption to keep our Internet safe.



Authors

Padmasree Warrior

Chief Technology & Strategy Officer

Avatar

Your mobile strategy needs to consider the user’s point of view and the highly dynamic nature of the mobile threat landscape.  Weighing the threat risk includes evaluating the cost of insecure mobile devices.

User Point of View

The Cisco 2014 Connected World Technology Research tracked the users’ outlooks on the evolving work environment.  Being mobile, off premise with your device was well noted.
•    Most believe a flexible, mobile and remote work model is competitive.
•    Over 25% work from organizations that allow working from home (WFH).
•    Over 50% consider themselves available 24 hours 7 days.
•    Most believe the most connected device for work will be the smartphone in 2020.
The trend for mobile remote work environments cannot be disputed but the mobile device threat vector expands to a broader range of access points. This puts your corporate resources at risk of being corrupted or stolen. Let’s consider the cost of an insecure mobile environment.

Continue reading “Insights for Remote Mobility”



Authors

Kathy Trahan

Senior Security Solutions Marketing Manager

Global Marketing Corporate Communications

Avatar

This week, Cisco was named the winner of Second Harvest Food Bank’s  48-Hour Virtual Race to End Hunger.  Raising money – just over $216,000 for this year’s race – to support our neighbors in need and at risk of food insecurity is now a signature part of our participation in the Cisco Global Hunger Relief Campaign – a company fundraising drive that benefits over 160 nonprofits worldwide.

After 8 years participating in the local 48-Hour Race, the Silicon Valley spirit of competition has spread to many other Cisco locations that compete in their own ways during the 48-Hour Race, including India and China.

hunger

Continue reading “When Giving Gets Going: Cisco’s 48-Hour Race with Second Harvest”



Authors

Jessica Graham

Community Relations Manager

Avatar

We’ve learned a lot since releasing our original research on the Internet of Everything (IoE) at the end of 2012. I created a top-10 countdown style review of these learnings, however, today, I’m jumping right to #1 (sorry David Letterman). Here it is: #1 – Context…not content…is king.

Same Person, Different Customer

I was recently on a business trip to the Middle East. Just before boarding, I realized I left my headphones at the hotel. Not wanting to be on a 10-hour flight without them, I ran to the electronics vending machine I saw on the way to my gate. Without regard to price, I purchased the headphones I wanted and headed to the gate.

Now, contrast this event to when I originally purchased the now-lost headphones. I went to Amazon.com. After reading the description and reviews, and doing some additional online research to make sure I was receiving the best price, I placed my order and waited two days for the package to arrive. Continue reading “Context…Not Content…Is King : How Mobility Is Accelerating Innovation in an IoE World”



Authors

Joseph M. Bradley

Global Vice President

Digital & IoT Advanced Services

Avatar

“There is no better expenditure of money and it’s really important for these kids to stay in school and learn. I love this program; this is one of the finest commitments ever made in the 10 years history of Clinton Global Initiative.”

How beautiful and true these words are from former U.S. President Bill Clinton, about the mid-day meal program of Akshya Patra, which is Cisco India’s primary benefiting organization for our Global Hunger Relief Campaign. Through this program, over 1.4 million children from 10,661 schools across 10 states in India receive a good meal each day that they are in school. This is the world’s largest mid-day meal program and it makes an incredible impact.

According to the World Food Programme, one-third of the world’s hungry live in India. “Six days I would eat, then the next six days I wouldn’t eat at all,” said 9-year-old Roshan. The tiny girl grew up on a diet of 600 calories per day, not even half as much as a child her age should receive. And across India, millions of children like Roshan suffer from severe hunger.

Continue reading “Cisco Employees Race to End Hunger in India”



Authors

Archana Sahay

Public Relations Manager

Avatar

Even before I started with Cisco, I was an active volunteer and had a focus on increasing educational access in rural China. After I joined Cisco, I quickly connected with the Civic Council to continue my passion for giving back. Civic Councils are teams of employees who plan volunteer events, develop partnerships, manage product donation programs, and make local cash donations. As our Civic Council leader, my main function is to create volunteer events and recruit employees to participate, and it has been very rewarding!

The China Research and Development Center (CRDC) Civic Council exists to identify volunteer opportunities and connect the demand to the supply of Cisco capital (employees and resources). You might be surprised as to how this helps me perform and excel in my Cisco role as an Engineering Manager. At the finish line of each volunteer program we manage and execute, I am rewarded to see how everyone benefits – not just those we served – but also the Cisco employees who volunteered. I use that momentum to fuel our next volunteer program.

hiking for one egg
The China team volunteering for Shanghai United Foundation

Continue reading “Cisco Employees Race to End Hunger in China”



Authors

David Peng

Hardware Engineering Manager