Cisco Blogs


Cisco Blog > SP360: Service Provider

APAC leads Global mobile trends

The annual Cisco® Visual Networking Index (VNI) Global Mobile Data Forecast, just out, once again shows the phenomenal growth expected in the mobile industry, e.g. more than 5.2 billion global mobile users by 2019 and 10-fold mobile traffic growth over the next five years. See Thomas Barnett’s blog to learn more.

For me the interest is to look into the APAC specific trends and the unique characteristics of this very diverse region. APAC averages show trends similar to the Global view, but let’s compare super developed Japan with the developing markets in Indonesia and India also:

Cisco VNI Mobile Data APAC Statistics for 2014

Cisco VNI Mobile Data APAC Statistics for 2014

Some observations on demand; Developed markets are already dominated by smart devices and their large data consumption, but driven by new connections (multiple devices per user and M2M(machine 2 machine)) demand still grows. Developing markets are still migrating Read More »

Tags: , , , , , , , ,

Fiber. Great In Your Diet. Costly In Your Data Center.

Guest Blog by Pat Chou, TMG Product Manager

Pat ChouSince the introduction of the Cisco’s 40G QSFP BiDi (Quad Small Form-Factor Pluggable Bidirectional module), we’ve seen phenomenal growth and adoption. I guess people do see the benefit.

What’s that? You haven’t heard?

…Ok, let’s say you’re in charge of a data center and your boss reminds you that streaming video and IoT devices are all the rage and if you don’t keep up with bandwidth demand, you’re toast. You have 10G links that use 10G SFP+ SR transceivers at the aggregation layer. You upgrade your switches or linecards to ones that have 40G QSFP ports like the Nexus series switches. Read More »

Tags: , , , , , , , , , , , , , , , , ,

Cisco Cloud Security Architecture: Un-Cloaking Invisible Threats

In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business assets, bad publicity and its associated effect on a company’s brand, hefty regulatory fines, disruption of services and costs associated with numerous lawsuits. The main task of a hacker is to access business assets through the network without being detected. The threats are normally cloaked within ubiquitous traffic flows such as web or email. Whatever the nature of a threat, an attack leaves signatures behind that can be used to “un-cloak” the threat. Threat defense and visibility is the watchword.

It has been exhausting to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of Read More »

Tags: , , , , , , ,

Register for the latest Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast Webcast

On February 3, 2015, we will release the ninth annual Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast and Methodology Update, covering projected growth and usage trends over the next five years. Annual Cisco VNI GLobal Mobile Data Traffic Forecast Update This is your opportunity to learn about Cisco’s projections for global mobile data traffic increases, primary influences on mobile traffic, and major transitions in wireless technology. The Cisco VNI mobile forecast is part of the company’s comprehensive and ongoing initiative to analyze mobile IP growth and innovations worldwide. Join Doug Webster, vice president, Service Provider Marketing, and Dr. Robert Pepper, vice president of Global Technology Policy, as they present Read More »

Tags: , , , , , ,

Carrier Wi-Fi: Consider More Than Speed

By Vince Pandolfi, Consulting Systems Engineer, Service Provider Vince Pandolfi The latest Wi-Fi physical layer standard 802.11ac, has been ratified and is enjoying widespread adpotion in the client device marketplace. The hype has been with us for a few years now proclaiming tremendous gains in throughput. The mechanisms 802.11ac uses to gain these speed improvements can also be used to improve client quality of experience and not necessarily just be used for higher data rates. The three key elements of a connect include distance, speed and reliability. These are in most cases mutually exclusive or at least have inverse relationships. You gain distance by trading throughput and reliabilty and gain Read More »

Tags: , , , , , ,