Big Data
Life in the Cloud Begins at Birth
2 min read
As the cloud prepares for another history-making year in its campaign to become a part of every part of our lives, a different type of history is being made. The birth of life. As we begin a new year, many around the world are celebrating new life, building on their family foundation. “Foundations” are traditionally […]
The IoE Enterprise: Diverse, Inclusive, and Hyperconnected
3 min read
If it seems as if the roles of chief information officer (CIO) and chief diversity officer (CDO) rarely overlap, think again. In today’s hypercompetitive — and hyperconnected — global marketplace, inclusion, collaboration, and technology are merging as essential drivers of innovation and business success. And the relationship between the CIO and CDO may never be […]
The Cisco RV325 – The newest edition to the Cisco Small Business Routing Portfolio
1 min read
Now that the Holidays are upon us, and we look forward to 2014, the Cisco Small Business team continues to raise the Small Business networking bar with the introduction of...
Digital Disruptors and the Future of Consulting
2 min read
In my role as leader of the Analytics Practice for Cisco® Consulting Services, I often meet with clients who remind me of how the nature of consulting is changing. Traditionally, a consultant’s value and relevance to the customer has been derived from his or her business background and knowledge of specific industries or areas of […]
New University Dedicated to STEM, Real-world Relevance
1 min read
The success of our industry and even our nation’s well-being are dependent on engaging students and developing the experts of the future in the areas of science, technology, engineering and mathematics (STEM). I am personally committed to STEM education initiatives, and want to share an exciting university that’s breaking new ground to lead the way […]
Big Data in Security – Part V: Anti-Phishing in the Cloud
8 min read
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]
Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop
6 min read
Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it trying to solve? Dazhuo: From a high-level view, Auto […]
Big Data in Security – Part III: Graph Analytics
6 min read
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are they trying to solve? Michael: Disparate data types have a lot of connections between […]
A Room with a View (of Crucial Big Data Insights)
3 min read
What’s the problem with Big Data? You guessed right — it’s BIG. Big Data empowers organizations to discern patterns that were once invisible, leading to breakthrough ideas and transformed business performance. But there is simply so much of it, and from such myriad sources — customers, competitors, mobile, social, web, transactional, operational, internal, external, structured, […]
3