Cisco Blogs


Cisco Blog > Internet of Everything

The Things that Make Everything in the #InternetOfEverything

The Internet of Things continues to add new things daily to a growing list of already connected things; and these “things” have the opportunity to completely change our world. Capabilities like context awareness, increased processing power and energy independence have all been made possible as more people and new types of information are connected. And each day, society gains and learns from these innovations, all a part of the Internet of Everything – a network of networks where billions of connections create unprecedented opportunities as well as new risks.

When it comes to the actual physical devices that are moving the Internet of Everything forward, most think of traditional conduits such as laptops, phones and “wearables.” But, the connections that are creating the Internet of Everything come in forms many may not even consider, from toothbrushes, trashcans, power tools – even entire cities. And while all of these connections amaze with their technology, the value that they create is the real story, for what it means now and for the future of our society.

The Things that Make Everything in the #InternetofEverything - blog image

Much is at stake when discussing the value that the Internet of Things holds. At this year’s CES Conference, it was estimated that the Internet of Things would become a $19 trillion market over the next several years. The number of mobile-connected devices will exceed the world’s population by the end of this year and by 2018, 96 percent of mobile data traffic will originate from these smart devices. The amount of these connections, coupled with reduced technology costs, has created possibilities for the future of the Internet of Things that are seemingly limitless:

  • Sensors all along the food supply chain, together with Big Data analytics and the intelligence of the cloud, will help us optimize the delivery of food from “farm to fork.” Sensors in the field will be combined with weather forecasts and other data to trigger irrigation and harvest times for each crop. And sensors on the food itself will alert merchants and consumers about when the “sell by” and “use by” dates are approaching to prevent spoilage. All of this will significantly reduce food waste—which today amounts to about one-third of total world food production.
  • A blue-tooth connected toothbrush that connects to a smartphone app is just one of the many devices on the market that promote a better quality of life through improved healthcare. Wearable technology like fitness trackers, health monitors, insulin pumps and even “smart” clothing can measure consumed calories, heart rates, the amount of medicine in a person’s body and transmit that data to patients and medical professionals in real-time. And 71% of Americans claim these types of devices have improved their overall health.
  • The city of the future will be “smarter” as sensors turn street lights, waste receptacles and cameras into tools that will help municipalities operate on more efficient levels. Wim Elfrink outlined how Barcelona has used a network of sensors that transmit real-time data on temperature, noise and other conditions in one of the city’s most popular areas. Kansas City, Missouri has used the network of street lighting and interactive digital kiosks in conjunction with a $114 million streetcar project to promote the city to both residents, and companies potentially looking to relocate their operations.

Serving as a link to the Internet of Everything, all of the connected things that make up the fabric of the Internet of Things are leading to new economic opportunities, increased personalized connections and more importantly, positive intersections of technology and the human experience. Far beyond the monetary values that it can present to society, the Internet of Things is powerfully changing and improving quality of life for people across the globe, with billions of opportunities awaiting us all.

What impact has the Internet of Everything had on your life, professionally or personally? Thinking futuristically, in what ways can you dream of that use the Internet of Things and the Internet of Everything to change our world?

We want to know what examples of the Internet of Everything you see in your own City of Tomorrow – your neighborhood! Join the conversation online by tagging your photo and video examples with #InternetofEverything and #CityofTomorrowHow is the Internet of Everything changing your city? 

Additional resources:

Review the Cisco Visual Networking Index: Global Data Traffic Forecast Update, 2013

Tags: , , , , , , , , , ,

Cisco Compatible Solutions Carry Clout

We are in the midst of a connected revolution, driven by technology. Everything is becoming connected, and it’s not just things. It’s people, processes, data, AND things. That’s what Cisco describes as the Internet of Everything (IoE).  Today, less than 1 percent of the things in the world – or about 10 billion things –  are connected to the Internet. That number will grow to more than 50 billion in the next decade.

Fast innovation requires Fast IT. In order to keep up with the volume of things connecting to the network, we must support the developers who are designing the solutions and the connected architecture that will support the future of intelligent networks. Developers and solution builders are the lifeblood of IoE.  In fact, Cisco has created DevNet to enable an open community of software developers – including ISVs, customers and Systems Integrators/channel partners – to easily and rapidly build Cisco-enabled applications, including IoE applications.

As the need for business applications continues to rise, it is beyond Cisco’s purview to develop all of those applications. We understand how valuable Cisco Solution Partners are in meeting diverse application and product needs. Cisco’s goal is to support these vital members of the Partner Ecosystem to develop solutions that benefit joint customers. Read More »

Tags: , , , ,

Cisco 2014 Midyear Security Report: Focusing on Common Vulnerabilities is Smart Security Strategy

August 14, 2014 at 6:00 am PST

Enterprise security professionals have their hands full these days—monitoring networks for security breaches, managing the implications of “bring your own device” policies, and patching systems to combat “weak links,” or vulnerabilities that could allow online criminals to grant entry.

Regarding this last task, security practitioners may be able to take an approach to addressing vulnerabilities that allows them to more effectively allocate resources toward resolving these challenges. As detailed in the Cisco 2014 Midyear Security Report, urgent critical vulnerabilities—those that merit the time and attention of security executives—make up a very small number of reported vulnerabilities. While all reported vulnerabilities should be patched, it’s wise to focus on those that pose the most danger.

Cisco publishes thousands of multivendor alerts every year, and zero-day vulnerabilities (for which patches are not yet available) tend to win the lion’s share of attention from security practitioners and the media because of their perceived urgency. However, only about two percent of the thousands of reported vulnerabilities were being activity exploited soon after published reports.

Read More »

Tags: , , ,

Partner Voices: TekLinks Provides Cloud-Delivered EHR

August 13, 2014 at 7:30 am PST

As we continue to expand the Partner Voices series, I get the opportunity to talk to more and more of our partners, which I love. I also get the inside scoop on some innovative solutions entering the marketplace. Just recently, I spoke with David Powell, Vice President of Cloud and Managed Services at TekLinks about their cloud-delivered electronic health record (EHR) applications.

David answered some questions I had about how TekLinks can provide doctors and their staff with a fully HIPAA-compliant data as a service DaaS solution. Of course, the TekLinks’ solution is Cisco-certified, which is why we are so interested in seeing how they implemented the solution as a stand-alone hosted app, or as a complete virtual desktop for any number of end users.

Frankly, there are times when David talks and I simply can’t follow, unless it’s around our shared tastes in music, or the few times that we might agree on a finer point of college football. In this case however, it all sounds so simple when David explains the importance and relevance of the TekLinks solution, so it’s easier if I just let him speak for himself. Read More »

Tags: , , , , , ,

Putting a Damper on ‘Lateral Movement’ due to Cyber-Intrusion

Analysis of high-profile cyber breaches often reveals how intruders gain their initial footprint in the targeted organizations and bypass perimeter defenses to establish a backdoor for persistent activities. Such stealthy activities may continue until intruders complete their ultimate mission—claiming the “crown jewels” of the victim organization.

“Lateral movement” is a term increasingly used to describe penetration activities by intruders (more information on lateral movement is available in Verizon’s 2014 Data Breach Investigations Report[1]). These activities begin with network reconnaissance, typically leading to compromises, hijacking of user accounts and ultimately privilege escalation to access sensitive data. Organizations may go to great lengths to detecting and stopping the initial breach and final data exfiltration as well as establishing more intelligence at their ingress/egress perimeters. But how can you minimize the damage caused by an intruder’s lateral movement once your network is already compromised?

Read More »

Tags: , , ,