Cisco Blogs


Cisco Blog > Internet of Everything

Context…Not Content…Is King : How Mobility Is Accelerating Innovation in an IoE World

We’ve learned a lot since releasing our original research on the Internet of Everything (IoE) at the end of 2012. I created a top-10 countdown style review of these learnings, however, today, I’m jumping right to #1 (sorry David Letterman). Here it is: #1 – Context…not content…is king.

Same Person, Different Customer

I was recently on a business trip to the Middle East. Just before boarding, I realized I left my headphones at the hotel. Not wanting to be on a 10-hour flight without them, I ran to the electronics vending machine I saw on the way to my gate. Without regard to price, I purchased the headphones I wanted and headed to the gate.

Now, contrast this event to when I originally purchased the now-lost headphones. I went to Amazon.com. After reading the description and reviews, and doing some additional online research to make sure I was receiving the best price, I placed my order and waited two days for the package to arrive. Read More »

Tags: , , , , ,

Four ways the IoT expands the mobile economy

The Internet of Things opens up a wide range of possibilities for businesses, especially in the context of an increasingly mobile workforce and primarily mobile customers. To distill down which aspects of IoT are meaningful for business, I joined panelists from Google Enterprise, AnyPresence, and OpenMarket at the Open Mobile Summit to share our thoughts with moderator Maribel Lopez. Here are some of the key insights I took away from our conversations:

The opportunity for businesses is about so much more than just connecting Things. Our industry calls it the Internet of Everything to describe how People, Process, Data, and Things get connected to drive business value. When you look at new ways to connect all aspects of a business, everyone in your organization can make better decisions – and your business can run with greater operational efficiency. Read More »

Tags: , , , , , , ,

Carrier Wi-Fi for the Retail of Tomorrow

By Lisa Garza, Cisco Service Provider Marketing, Mobility Solutions

When we first started developing Cisco Connected Mobile Experiences several years ago, we had a vision that carrier-grade Wi-Fi could change how we interact with public environments.  We knew that the rich information that Wi-Fi provides indoors could enhance our experiences while shopping, watching sports, attending conventions, going to museums, and seeing shows.

It is so exciting to see this vision coming to life all around us.  One of the latest examples is the beautiful Stary Browar Mall in Poznań Poland.  Stary Browar is more than a mall.  It’s designed as a 50/50 combination of art and retail space, and the two come together to provide a unique shopping experience that can’t be found on the Internet.

Stary Browar

Read More »

Tags: , , , , , , , , , ,

Security Compliance is Necessary for Real-Time Mobile Data Access

August 21, 2014 at 9:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, explores the topic of enterprise mobility security from a situational level and provides insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. Kathy’s third post explored how to secure mobile data. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

In today’s mobile and cloud-centric landscape, the ability for employees to access data, account information, real-time statistics, and other pertinent information on their personal devices is what it takes to remain competitive in the business marketplace.

And while the rush has been on to empower employees to be able to connect from anywhere, security concerns are topping the “must address” list of enterprises everywhere.

One key concern is the increasing use of mobile devices to access relevant business information. In fact, according to the Cisco Connected World International Mobile Security survey, 63% of users downloaded sensitive data on such devices.

So, in a scenario where a team of sales representatives are updating account profiles by accessing data on their personal devices, IT and business leaders must ask: How secure is the network the team is using to access sensitive company information? Is it possible malware on their mobile devices can gain entry from a public or private cloud to compromise or steal data? Should mobile security policies prohibit certain employees from downloading certain information when they are off-site?

These questions must be answered. Especially since over the next four years, there will be nearly 21 billion networked devices and connections globally. Business Decision Makers (BDMs) and Technical Decision Makers (TDMs), must team up and determine the best mobile security policies that balance productivity and security of sensitive data, notably understanding security threats and establishing access requirements.
Read More »

Tags: , , , , , , , , ,

VoLTE Policy Management to Improve Subscriber Experience and Lower Cost of Growth

Written By Alfonso San Jose, Sales Consulting Systems Engineer

Alfonsov2

We have been hearing from our Service Provider customers like you about their interest in Voice over Long Term Evolution (VoLTE), and for good reason.  Offering VoLTE affects profitability in two ways. One is by creating a great voice experience that helps to attract and retain subscribers. VoLTE provides guaranteed quality of service and fast call-setup time. At the same time, VoLTE can lower network costs. However, VoLTE creates new demands on the network that requires a policy management solution to address. VoLTE changes the game for policy management because it imposes much heavier demands than 4G data services. The policy management solution needs to meet the following four requirements: Read More »

Tags: , , , , ,