Cisco Blogs


Cisco Blog > Internet of Everything

Ask The Futurist: “How Will the Internet of Everything Impact Teachers’ Roles in the Connected Classroom?”

Chalkboards. Textbooks.  Stacks of papers and folders. All of these items can make anyone a little nostalgic and remind us of our time in primary and secondary school. While basic fundamentals remain the same, classrooms are evolving. The reason? The Internet.

This year’s back-to-school season has sparked many conversations around the future of the classroom. Most parents have seen the workforce and everyday life evolve as the Internet of Everything (IoE) begins to connect more people, places, data, and things. Yet questions about IoE in the classroom persist. That’s why in today’s “Ask the Futurist” post, I take a deeper look at how the IoE will impact the classroom of the future.

Today’s question comes from Rob Coote, a systems analyst for a public K-12 school district in Northern Alberta, Canada. Here’s his two-part question:

Question: “How do you envision the future of the ‘connected classroom’ and one-to-one learning in K-12 education? How do you see this impacting or changing the teacher’s role?”

Read More »

Tags: , , , , , , , , , ,

Global Partner Marketing Blog Series Kicks Off

I’d like to welcome you to my new Global Partner Marketing (GPM) blog series. As vice president of Cisco’s GPM organization, I’m excited about our broad partner ecosystem and the goals we can accomplish together. This new blog will feature all the latest perspectives on Revenue Marketing; upcoming partner program launches including how to market the Internet of Everything (IoE); partner tools and resources; partner events; how to evolve and profit as Cisco continues the journey to being the number one IT company and much more!  Read More »

Tags: , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,

What’s Next for the Internet of Everything and Cities?

Today’s cities are experiencing the emergence of a new imperative from public leaders and industries. “Digital urbanism” is rapidly becoming a central pillar for urban planners, architects, developers, and transportation providers, as well as in public service provision.

From a public leadership perspective, cities can be viewed as microcosms of the interconnected networks that make up the Internet of Everything (IoE). In fact, cities serve as “fertile ground” for realizing value from IoE.

Read More »

Tags: , , , , , ,

August 2013 #SecureDC Twitter Chat Recap: SDN Security

Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we feel that it’s important to focus more on education now and broader collaboration, so that users can benefit from the tremendous potential SDN holds.

More Education, Less Buzz

We kicked off our conversation by asking what are the most pressing issues around SDN were. @Joltsik, Principal analyst at Enterprise Strategy Group, felt that users are confused with so much buzz, yet there’s little in the way of education.

@Raj_Samani, Chief Innovation Office at the Cloud Security Alliance and CTO at McAfee, went one step further indicating that greater transparency is also needed. However, @Jgreene3rd, Technical Lead for Data Center Security Technologies at Intel, noted that the upside of buzz is that it drives greater demand for availability, which in turn fuels education.

JonOltsik.jpeg

 

 

 

 

 

SDN and Improving Security

@KenSBeck, Principal Engineer at the Cisco Security Technology Group Office of the CTO, led an interesting discussion on how APIs for programming the network at network speed will allow security intelligence to be much more dynamic and eventually part of the network itself. @shl_eax_1, Technical Lead Engineer at Cisco Security Technology Group Office of the CTO, further noted how global visibility of the network hastens the speed with which security issues get resolved.

@fsmontenegro elaborated on how SDN security can enable more intelligent, granular and efficient response, and that SDN improves security by adding policy exceptions at the network layer with redirect flow. @vernonxt, SVP for ICT Research at IDC, honed in on SDN enabling better policy management. @AndiMann, Vice President at CA Technologies, speculated with automation enabling embedded policy and preventing random changes, shouldn’t SDN be able to do the same.

SDN Impact on Regulatory Compliance

@alokmittal65, Chief of Staff for the Cisco Security Technology Group Office of the CTO, stressed the need for auditing, logging and monitoring of policy change events.

@Raj_Samani also noted that with greater proliferation of devices, the ability to achieve greater attestation on the endpoint becomes more challenging. @KenSBeck drew attention to leveraging network awareness of user, geo location, and device as contextual elements that can make attestations much more meaningful.

Wrapping Up

@KenSBeck, our host from the Office of the CTO at Cisco, closed with words of advice and a hint of what is in store.

KenBack

 

 

 

 

 

 

 

Keep the dialog going! Follow us on @Secdatacenter #SecureDC and join the conversation on LinkedIn Secure Datacenter Trends. For additional SDN resources, be sure to register today for our SDN Learning Seminars.

 

Tags: , , ,