Once your organization has made the decision to move into the cloud what are the next steps? Making the decision can turn out to be the easy part, but turning your strategy and vision into reality can become a daunting task if you are not prepared. Purchasing a new SaaS application can be as simple as entering your credit card information and clicking on download. Delivering applications to your users from the Cloud poses a different set of challenges.
In my last blog post I talked about some of the key considerations you should make when moving workloads into the cloud. This month I am preparing for a webinar hosted by Cisco CSR1000V technical marketing engineers that will do a deep technical dive into each of those considerations with the goal of helping you to prepare for your migration. Some of the technical aspects we will discuss include how to handle IP addressing, security policies, redundancy for disaster recovery and much more. We will also go over a customer use case so you can learn from your peers. Read More »
As the cloud prepares for another history-making year in its campaign to become a part of every part of our lives, a different type of history is being made. The birth of life. As we begin a new year, many around the world are celebrating new life, building on their family foundation.
“Foundations” are traditionally thought of as ground-level, or even underground; but as we ring in 2014, it’s time to start thinking of foundation in a new light. The cloud makes the possibility of sharing our lives with others more easily than before, like birth for instance. It’s enabling this connection and allowing people to access more information, more pictures, more video, and more data, with more ease than ever before. That connection doesn’t stop at content and data points- in fact, it doesn’t stop at all.
The cloud’s biggest value is in the Internet of Everything (IoE). IoE brings new experiences and interactions to life, and the cloud will only broaden IoE’s breadth over our lifetime with all of the devices, communicating, and sharing information.
In photojournalist Rick Smolan’s Human Face of Big Data project, stunning facts about how big data and the world of many clouds are changing how we live our lives, from our very first day, are showcased. For example:
During the first day of a baby’s life, the amount of data generated by humanity is equivalent to 70 times the information contained in the Library of Congress.
One-third of children born in the United States already have an online presence before they are born. That number grows to 92 percent by the time they are two.
In 2012, the average digital birth of children occurs at approximately six months.
Within weeks of their birth, another one-third of all children’s photos and information are posted online.
Now that the Holidays are upon us, and we look forward to 2014, the Cisco Small Business team continues to raise the Small Business networking bar with the introduction of the all new Cisco RV325. This Dual WAN, 14-port VPN Router, provides all of the same performance, security and reliability of the RV320 launched last June. Both routers are perfect for fast-growing small businesses or branch deployments. So if you are looking for more ports in the same enclosure, the RV325 is the Small Business router to take a look at.
RV320 and RV325
Like the it’s smaller sibling the RV320, the RV325 is a perfect match with the Cisco Small Business SG300 Series Switches and WAP500 Series Access Points. As you saw from my last Blog, the WAP551 and WAP561 boasts a nice feature-set including Captive Portal and Single Point Set-up. The WAP 551/561 are controller-less Access Points meaning additional hardware is not required. The SG300 Series offers a nice blend of features at an affordable price and are designed Small Business. It has most of the features that can be found in today’s Enterprise-class Switches.
This formidable combination makes for the perfect solution for that many Small Businesses and Organizations can take advantage of. Add in our portfolio of award-winning Cisco Small Business Services, and you have a solution that all that guarantees a positive experience from Cisco Small Business Team.
One Option for this solution is the newly launched 200 Series of Smart Switches. There are four new models including 10-, 24-, 26-, and 50-port switches. These Full Power PoE Smart Switches are a great alternative as they offer a generous feature-set, solid performance and even greater affordability.
SG200 Series PoE Smart Switch
Happy Holidays and Happy New Year’s from the Team at Cisco Small Business.
The success of our industry and even our nation’s well-being are dependent on engaging students and developing the experts of the future in the areas of science, technology, engineering and mathematics (STEM). I am personally committed to STEM education initiatives, and want to share an exciting university that’s breaking new ground to lead the way and ensure students have a clear path to STEM careers. As the newest member of the State University System of Florida, Florida Polytechnic University is dedicated exclusively to STEM.
Within their College of Engineering and the College of Innovation and Technology, Florida Poly will offer six undergraduate degree programs and two Master degree programs. These include some really unique areas of concentration including Big Data Analytics, Cloud Virtualization, Health Informatics, Cyber Gaming, Information Assurance and Cyber Security, and even more.
Another unique aspect of this high-tech university is that they work closely with industry partners to ensure strong relevance to real-world needs. This will ensure graduates are learning the critical skills needed to join some very competitive workforces. In fact, all you have to do is check out the campus to be impressed:
If you are in Florida, check out the PolyPremiere – a campaign where Florida Poly is rolling out the purple carpet at movie theaters across the state to give potential students an in-depth look at Florida Poly’s campus, curriculum, culture and scholarships.
Where are your tech students looking for STEM degree opportunities?
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution.
Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing in this space to protect Cisco customers?
Brennan: One of the ways that we have traditionally confronted this threat is through third-party intelligence in the form of data feeds. The problem is that these social engineering attacks have a high time dependency. If we solely rely on feeds, we risk delivering data to our customers that may be stale so that solution isn’t terribly attractive. This complicates another issue with common approaches with a lot of the data sources out there: many attempt to enumerate the solution by listing compromised hosts and in practice each vendor seems to see just a small slice of the problem space, and as I just said, oftentimes it’s too late.
We have invested a lot of time in looking at how to avoid the problem of essentially being an intelligence redistributor and instead look at the problem firsthand using our own rich data sources -- both external and internal - and really develop a system that is more flexible, timely, and robust in the types of attacks it can address.
Mahdi: In principle, we have designed and built prototypes around Cisco’s next generation phishing detection solution. To address the requirements for both an effective and efficient phishing detection solution, our design is based on Big Data and machine learning. The Big Data technology allows us to dig into a tremendous amount of data that we have for this problem and extract predictive signals for the phishing problem. Machine learning algorithms, on the other hand, provide the means for using the predictive signals, captured from historical data, to build mathematical models for predicting the probability of a URL or other content being phishing.