Cisco Blogs


Cisco Blog > The Platform

Oh, the Places We’ll Go! Cisco’s Predictions for 2015 and Beyond

We’d be hard-pressed to deny that advances in technology are making an incredible impact on all of our lives. The way we work, the way we live – even the way we sleep – are being changed by technology.

As humans, we are increasingly motivated by our desire to be connected to each other and to the information that matters most to us. And in the budding world of the Internet of Everything (IoE), we are seeing this need satisfied further. Thirty years ago Apple introduced the Macintosh and Internet was a word not known to most. As I reflect back to what IT was like back then, I realize just how far we’ve come today and can envision the possibilities of where we’ll go.

Today at the Cisco 2014 Cisco Global Editors Conference I had the pleasure of sitting down with my Cisco colleagues, Maciej Kranz and Joseph Bradley to discuss the future of innovation, trends affecting the technology industry in 2015 – and we talked about the ultimate impact technology has on everyday society. Securing the Internet of Things (IoT), growth of encrypted traffic, network simplification, real-time analytics and the future of work were just some of the hot topics deliberated during our 45-min conversation, dubbed Cisco’s Technology Forecast.

We chatted about how Google’s acquisition of Nest is just the beginning of a trend we see spreading in the coming years, as products and innovations in Information and Communications Technology (ICT) change the way we connect, communicate and make sense of our world. The convergence of Information Technology, Telecommunications and Data Networking technologies into innovative solutions are shaping our future and, specifically in vertical markets, forcing IT players to expand their horizon and look for business partners well beyond the IT world.

Read More »

The New Analytics Imperative

Cisco today announced a data and analytics strategy and a suite of analytics software that will enable customers to translate their data into actionable business insight regardless of where the data resides.

With the number of connected devices projected to grow from 10 billion today to 50 billion by 2020, the flood tide of new data — widely distributed and often unstructured — is disrupting traditional data management and analytics. Traditionally most organizations created data inside their own four walls and saved it in a centralized repository. This made it easy to analyze the data and extract valuable information to make better business decisions.

But the arrival of the Internet of Everything (IoE) — the hyper-connection of people, process, data, and things – is quickly changing all that. The amount of data is huge. It’s coming from widely disparate sources (like mobile devices, sensors, or remote routers), and much of that data is being created at the edge. Organizations can now get data from everywhere — from every device and at any time — to answer questions about their markets and customers that they never could before. But IT managers and key decision makers are struggling to find the useful business nuggets from this mountain of data.

As an example, take the typical offshore oil rig, which generates up to 2 terabytes of data per day. The majority of this data is time sensitive to both production and safety. Yet it can take up to 12 days to move a single day’s worth of data from its source at the network edge back to the data center or cloud. This means that analytics at the edge are critical to knowing what’s going on when it’s happening now, not almost 2 weeks later.

Read More »

Tags: , , , , , , ,

How ‘Data’ and ‘Process’ Are Reshaping the Future Workforce

The sheer size, variety, and speed of data traversing today’s networks are increasing exponentially. This highly distributed data is generated by a wide range of cloud and enterprise applications, websites, social media, computers, smartphones, sensors, cameras, and much more — all coming in different formats and protocols.

Whether it is in the cloud or at the edge, data generated by the Internet of Everything (IoE) must be analyzed to identify actionable insights that can be used to create better outcomes (such as from process optimization or improved customer engagement). Without this critical step, data remains just “data.”

There is often an immense gap, however, between the amount of data with hidden value and the amount of value that is actually being extracted. According to IDC, less than 1 percent of the world’s data is currently being analyzed. What good is data if isn’t analyzed to gain insights?

It’s no surprise, then, that in a recent survey conducted by Cisco Consulting Services, IT and Operational Technology leaders indicated that they perceive the Internet of Things (IoT) — a critical enabler of IoE — as being about much more than just “things.” When we asked them which area (people, process, data, or things) they needed to improve most to make effective use of IoT solutions, the largest number (40 percent) indicated “Data,” while “Process” (27 percent) ranked second. “People” placed third (20 percent) and “Things” finished last (13 percent).

Focus on Capturing Insights, Not on Connecting Things, to Attain IoT Value from Cisco Business Insights

Read More »

Tags: , , , , , , ,

Cisco Announces Intent to Acquire Neohapsis

Today, businesses are looking at security in a strategic, comprehensive way to protect mission critical processes and assets. There has never been a greater need to understand the impact that security threats can have on a company’s bottom line. For these reasons, experienced security advice is now among the table stakes required to assess and address the threat landscape that faces enterprises today. The skills and capabilities companies need to maintain a strong security posture, keep pace with rapidly evolving threats and take full advantage of new technologies that can protect their businesses are rare and difficult to retain.

The right advisory service can change all of that.

I am pleased to announce Cisco’s intent to acquire privately held Neohapsis, a Chicago-based security advisory company providing services to address customers’ evolving information security, risk management, and compliance challenges. Neohapsis provides risk management, compliance, cloud, application, mobile, and infrastructure security solutions to Fortune 500 customers.

Together, Cisco, Neohapsis and our partner ecosystem will deliver comprehensive services to help our customers build the security capabilities required to remain secure and competitive in today’s markets. This will help our customers overcome operational and technical security vulnerabilities, achieve a comprehensive view of their risks, take advantage of new business models, and define structured approaches for better protection.

The Neohapsis team will join the Cisco Security Services organization under the leadership of Senior Vice President and General Manager Bryan Palma. The acquisition is expected to close in the second quarter of fiscal year 2015. We look forward to Neohapsis’ outstanding team and technology joining Cisco!

Tags: , , , , , , , , ,

Protecting Innovation

In the thirteen years I’ve been General Counsel of Cisco, I can count on one hand the number of times we’ve initiated suit against a competitor, supplier or customer.

It’s therefore only after thoughtful and serious consideration that we are today filing two lawsuits to stop Arista’s repeated and pervasive copying of key inventions in Cisco products. These suits cover key Cisco proprietary patented features and Cisco’s copyrighted materials.

(The patent lawsuit can be viewed here. The copyright lawsuit can be viewed here.)

Cisco’s $6 billion annual R&D expense, supported by over 25,000 engineers, has a proven track record of bringing innovation to our customers and partners around the world. Our success is built on using our innovation engine to lead in the marketplace. Our action today is based on the principle that to compete in technology, you need to innovate, not copy.

We have taken this action only after assuring ourselves of four key facts – all of which form the basis for legitimate intellectual property actions between competitors:

  • Arista incorporates features knowing that Cisco holds intellectual property rights related to those features, all of which are Cisco proprietary and none of which are industry standards
  • Arista intentionally markets those features to its customers as a basis for buying the products
  • Arista promotes its copying to convince investors to finance the company
  • Arista’s actions, if unstopped, will embolden others to seek to do the same

Patented Featured Copied

The heart of our action regards Arista’s deliberate inclusion in its products of 12 discrete and important Cisco features covered by 14 different U.S. patents. All of these features are being used by Cisco currently and in products we ship to our customers. None of the implementations are incorporated in industry standards. They were patented by individuals who worked for Cisco and are now at Arista, or who at Cisco worked with executives who are now at Arista. These Cisco-created features and implementations are incorporated by Arista in their entirety into Arista’s products.

  • System Database (“SysDB”) (Arista uses Cisco’s networking device implementation covered by Cisco Patent No. 7,162,537)
  • Zero-Touch Provisioning (“ZTP”) (Arista uses Cisco’s implementation covered by Cisco Patent No. 7,290,164)
  • On Board Failure Logging (“OBFL”) (Arista uses Cisco’s implementation covered by Cisco Patent No.7,340,597)
  • Control Plane Policing (“CoPP”) (Arista uses Cisco’s implementation covered by Cisco Patent No. 7,224,668)
  • Spanning Tree Loop Guard(Arista uses Cisco’s implementations covered by Cisco Patent Nos. 7,460,492 & 7,061,875 )
  • In-Service System Upgrades (“ISSU”) (Arista uses Cisco’s implementation described by Cisco Patent No. 8,356,296)
  • Virtual Port Channels (“vPC”) (Arista uses Cisco’s implementation covered by Cisco Patent No 8,051,211)
  • Access Control ListsImprovements (“ACL”) (Arista uses Cisco’s implementation covered by Cisco Patent Nos. 7,023,853 & 6,377,577)
  • Private Virtual Local Area Networks (“Private VLANs”) (Arista uses Cisco’s implementation covered by Cisco Patent Nos. 6,741,592 & 7,200,145)
  • Generic Command Interface (Arista uses Cisco’s implementation covered by Cisco Patent No. 7,047,526)
  • CLI Command Data Translation (Arista uses Cisco’s implementation covered by Cisco Patent No. 7,953,886)

Read More »

Tags: , ,