Cisco Blogs

Cisco Blog > Mobility

Prepare Your Networks for High Density without Compromising on Performance

A new year means new users and new devices. More devices means more network crowding. Mobile users demand bandwidth and speed, while the network is increasingly overwhelmed by the sheer number of devices. The networks of today and tomorrow have to be ready for high client density environments.

That’s why we’ve developed the Cisco High Density Experience (HDX). I announced HDX in a blog last October with a high level look at Cisco’s answer to handling high client density environments. Each feature in the HDX solution was designed specifically to alleviate the introduction of more clients, more bandwidth hungry applications to provide an unparalleled user experience.

Starting tomorrow we’ll kick off an HDX blog series to dive deep into the four key features that come with HDX:

  1. January 8: CleanAir
  2. January 13: Turbo Performance
  3. January 27: ClientLink 3.0
  4. February 10: Optimized Roaming

For more on Cisco’s approach to 802.11ac, visit


Tags: , , , , , , , , , , , , , , , , ,

Creating Collaboration across the Care Continuum: A Customer Approach to Healthcare

Barbara Casey, Senior Executive Director for Healthcare Business Transformation at Cisco, recently wrote about challenges that patients face when navigating the continuum of care in our currently disconnected care settings.  In anCisco Extended Care Solution effort to assist patients, technology companies are beginning to shift their focus to take advantage of network technology to personalize the patient experience.  mHealth, video and collaboration tools offer an opportunity to create a true continuum of care and a more seamless patient experience. 

Read the full article to find out how Cisco video and collaboration tools can help patients to conveniently communicate with their physicians.

Tags: , , ,

How Black Arrow, Cisco and Innovid Are Partnering to Advance Advertising at CES 2014

BConrady: Conrad Clemson, VP of business development, Cisco Service Provider Video

Let’s start this blog with this simple observation: TV didn’t kill radio, but it did disrupt how advertising flows. Same for the impact of online media, on print.

And by our reckoning, it’s about to happen again — the diverted flow of advertising resources and revenues away from traditional, big broadcast TV, to online and over-the-top video.

Will TV advertising dominate over other forms of video consumption, for a really, really, really long time? Unquestionably. But increasingly, brands want a mixed media spend, because it gets them greater reach and greater engagement — and that’s what advertising is all about.

Our work to help service providers expand advertising beyond the primary TV screen, to the other screens we’re all watching, is a big part of what we’re demonstrating at this week’s CES, in Vegas. And we’re not going it alone — we’ve strengthened our work with Black Arrow, on ad decisioning, and with Innovid, on multi-screen.

Here’s what you’ll see: Read More »

Tags: , , , , , ,

Year in Review: Top 10 Mobility Blogs of 2013

Takeaway: The Cisco Enterprise Mobility group has stayed ahead of the competition by staying innovative and cutting edge while delivering quality, high performing products and solutions, while displaying thought leadership on major technological trends such as 802.11ac and location-based services. We use this mobility blog as a platform to deliver information straight to wireless fans and readers. Here are the top 10 most read posts in 2013.

10. Monetize Your WLAN Using Cisco Location Analytics

9.  Cisco Hacks: Notes from the CMX Hackathon

8. Looking Past the Mobile Phone

7. 802.11ac: Is Your Network Ready for Next-Gen Wi-Fi Traffic?

6. Cisco’s New Wall AP Helps Hoteliers Deliver In-Room Wi-Fi Access

5. Client Adoption for 802.11ac Wireless Technology Read More »

Tags: , , , , , , , , , , , , , , , ,

Comment on Der Spiegel articles about NSA TAO Organization (UPDATE 2)

UPDATE 2: On Monday, December 30th, Der Spiegel magazine published additional information about the techniques allegedly used by NSA TAO to infiltrate the technologies of numerous IT companies. As a result of this new information coming to light, the Cisco Product Security Incident Response Team (PSIRT) has opened an investigation. Customers can stay informed of the progress of this investigation via the previously posted Cisco Security Response.

December 29th – An article was published in Der Spiegel today about the alleged capabilities of the United States National Security Agency (NSA) Tailored Access Operations (TAO) organization. The article says that TAO “exploits the technical weaknesses” of Information Technology products from numerous companies, and mentions Cisco. 

We are deeply concerned with anything that may impact the integrity of our products or our customers’ networks and continue to seek additional information.

We are committed to avoiding security issues in our products, and handling issues professionally when they arise. Our Trustworthy Systems initiatives, Cisco Secure Development Lifecycle, Cisco Common Crypto models, and Product Security Incident Response Team (PSIRT) and Vulnerability Disclosure policies are all industry-leading examples of our commitment to our customers. This is central to how we earn and maintain trust.

At this time, we do not know of any new product vulnerabilities, and will continue to pursue all avenues to determine if we need to address any new issues. If we learn of a security weakness in any of our products, we will immediately address it.

As we have stated prior, and communicated to Der Spiegel, we do not work with any government to weaken our products for exploitation, nor to implement any so-called security ‘back doors’ in our products.

UPDATE 1: Customers seeking additional information may refer to the Cisco Security Response.

Additional Resources:

Cisco Trustworthy Systems:

Cisco Secure Development Lifecycle:

Cisco Security Advisories, Responses and Notices:

Cisco Security Vulnerability Policy:

Cisco Blogs on Security and Cryptography


Tags: , , ,