Perspectives
- Our Favorite Topics:
Securing Critical Internet Infrastructure: an RPKI case study in Ecuador
3 min read
Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American country. The entire local network operation community got together to be pioneers in securing its local Internet infrastructure by registering its networks in the Resource Public Key […]
The We’re Listening Blog Series: 3 Way RMA Process Speeds Up Service Contract Updates
2 min read
Over the past few months, the We’re Listening blog has brought you ongoing news about updates to our RMA processes, and the improvements keep on coming. I’ve asked...
Cisco ISE in the lab.
2 min read
My company is in the very early stages of an MDM BYOD project. As part of that we are looking at the Cisco Identity Service Engine (ISE) as a central piece. I am about half way through my testing and I thought that I would pass on some of what I have learned so far. […]
Can the IoE Revolutionize Alternative Medicine?
2 min read
The other week I found myself chatting with a fellow healthcare (and Cisco) enthusiast on Twitter about alternative medicine and I experienced an Aha! moment – alternative medicine may soon have an entirely new face if it’s driven by consumer adoption of advanced (and in many cases, currently available) technologies. Let me explain. I recently wrote […]
Summary: TelePresence for SMBs: It isn’t just for the big guys anymore
1 min read
If you’re in an SMB company you might think of telepresence as a tool built for enterprise, something that would be nice to have for your small business but just out of reach. You’d be wrong. Video conferencing solutions like Telepresence and even web-based technologies like WebEx are more affordable than ever, making them a […]
Los Angeles Unified School District – Hack the iPads!
3 min read
It didn’t take long, but soon after the Los Angeles Unified School District began their rollout of some 650,000 iPads to their students, they ran into some technical issues. Students in at least one of LAUSD’s high schools quickly discovered a way to bypass the security on the devices. Still in Phase 1 of the […]
Check Ins – Why location needs to be part of Authentication and Identity
4 min read
Dude, where’s my IP? I love to check in on social networks like Foursquare and Google+. Most of the time, there’s no point to it, but it’s fun to see what friends and colleagues are up to or discover new local haunts. Despite the fun and games, location is much more important to the network […]
Summary: The We’re Listening Blog: How We’re Making It Easier to Do Business With Cisco
1 min read
The We’re Listening blog series has tracked some of the new programs and capabilities Cisco is introducing to make it easier to do business with us. The corporate Ease of Doing Business (EoDB) Program drives many of these improvements, so I’ve invited EoDB executive lead (and Cisco EVP of Operations) Randy Pond to discuss some […]
Security and Insecurity in the Internet of Everything
2 min read
The Internet of Everything is a big thing, and it’s going to get bigger. As more devices, sensors, gadgets, and people get interconnected, you’ll hear more and more about it. But there’s one aspect of the Internet of Everything that I don’t hear a lot about. That aspect is security, both in the form of […]
Executive Perspectives
Navigate the latest technology trends and get solutions with the help of Cisco executives.