Cisco Blogs

Search Results

283 posts found

Quick Insights from the Big Boulder Data Event

On Thursday and Friday of last week, I attended the Big Boulder data conference, which brings together vendor, academics, analysts and practitioners of social data.  The purposes were many: discuss emerging trends, acknowledge the issues and challenges around privacy and security, and make introductions to encourage discussion of how we all envisage social data technology and by extension social data maturing. I spent two days fastened in on how…

Read More >>

Tags: , ,

#EngineersUnplugged S5|Ep13: Big Data on Cisco UCS

In this week’s episode, Robert Novak (@gallifreyan) and Steve McQuerry (@smcquerry) talk about Big Data on UCS. Real world use cases including UCS Manager, UCS Central, and more. Big Data, Big Unicorn, courtesy of Robert Novak and Steve McQuerry This is Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple: Episodes will publish weekly (or as close to it as we can m…

Read More >>

Tags: , , , ,

Active Archiving with Big Data

Historical data is now an essential tool for businesses as they struggle to meet increasingly stringent regulatory requirements, manage risk and perform predictive analytics that help improve business outcomes. While recent data is readily accessible in operational systems and some summarized historical data available in the data warehouse, the traditional practice of archiving older, detail-level data on tape makes analysis of that data challen…

Read More >>

Tags: , , , , ,

Lessons from LEGO To Drive “Out-of-the-Box” Thinking

Are your Master Builders free to create? Are your Ordinary Builders helping them to execute? And more to the point, are you acting like the evil President Business, hindering innovation, placing talent in silos, and keeping your organization frozen in the past? If so, you may find an unlikely role model in Emmet Brickowski. OK, Emmet may be an animated character made of plastic blocks, but don’t dismiss him so easily. If you are a manager lookin…

Read More >>

Tags: , , , , , , ,

Attack Analysis with a Fast Graph

…that will be used in future attacks. The Graph Difference In December, we outlined the importance of the graph database technology in our Big Data stack including the continuous relationship mapping and natural visual representation of the stored connections. In practice, Titan is currently ingesting approximately 10 terabytes of security data per month and that will grow significantly this year as we add additional data. The graph holds dynami…

Read More >>

Tags: , , , , , , , , , , , , , , , , , , , , , ,