Cisco Blogs


Cisco Blog > Government

Cloud for Local Government Global Blog Series Final Blog, The Cloud Intelligent Network in Local Government and the Series in Review

By Brenda Germundson and Stacey Cannon

In wrapping up the series, we wanted to show you a specific example of how a cloud solution can be used in local government. The example in the video below will walk you through a local government scenario and demonstrate how cloud capabilities can enable agencies to improve agility and performance, increase operational efficiencies to reduce costs, and enhance on-demand citizen services, among other things.

Read More »

Tags: , , , ,

Cloud for Local Government Global Blog Series, From “Techno” Tears to Confidence (Perspective from Louis Zacharilla, Co-Founder of the Intelligent Communities Forum)

Not long ago this joke was buzzing around the Internet:

Question:  Why was the computer late to work?

Answer: Because it had a hard drive.

David Letterman does not have to look over his shoulder but the corny little joke is loaded with possibilities for a discussion about the power of the Cloud and communities.

As the Top7 Intelligent Communities of 2013 make their way toward New York this week for the annual dialogue among 250 invited global thought leaders (including Cisco’s Dr. Norman Jacknis, who will give this year’s “Revolutionary Community” keynote talk), the ingredients for the secret sauce used to re-energize communities for the 21st Century will be revealed by its “chefs. “ I am guessing that one of the revealed secrets will be that the idea of being late for work has become passé.  Connectivity, when invested in properly, unleashes a new knowledge workforce and revives communities that have been looking for ways for their local economies to flourish.  Certainly broadband connectivity and more affordable access to the cloud remain big drivers for community revival and at least part of the secret toward solving many problems, including commuting and productivity.

So is vision.  Attendees will also hear from people like BlackBerry co-founder Mike Lazaridis , who will discuss why he believes quantum computing will be the next silicon for his community, Waterloo, Canada, the 2007 Intelligent Community of the Year.  He has invested CAN$250 million in a fund to begin to make it so.  He has the right environment.  Waterloo, a city of only 120,000 people, produced 10% of all the publicly-traded companies on the Toronto Stock Exchange in 2007.  This was not an accident.  It shares traits with Intelligent Communities everywhere.

Read More »

Tags: , , ,

Securing the Internet of Everything: An Architectural View

As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.

The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.

While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.

The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »

Tags: , , , , , , , , , , , ,

Cisco Innovations You Should Really Look at for Faster Adoption of Clouds

Emarin Cisco Cloud PortfolioAmong all the Megatrends that have significant implications from an infrastructure perspective (as discussed here), the one that customers in EMEAR currently expect the most from Cisco is Clouds. Both in terms of technical guidance as well as architectural innovations.

In the Cisco Cloud approach, intelligence in the network can help ensure delivery of cloud services, provide access and services to the right users, and offer the flexibility to connect with public, hybrid, and community clouds.

As shown in the illustration to the right, three main elements must be considered to build an efficient cloud. In addition, the network needs to provide dynamic access to these resources, and the Cloud applications and services must deliver anywhere, anytime access.

With the emergence of Cloud architectures, innovation is required within the network to allow IP to gain two critical features not natively provided by IP today: IP mobility and the Virtual Private Network (VPN). Read More »

Tags: , , , , , , ,

Cloud for Local Government Global Blog Series, Cloud and Law Enforcement (Part One): U.K.’s Facewatch Service Benefits Police, Businesses, and Citizens

This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed.

Police forces have a well-established culture of owning and managing systems directly founded on concerns about security and control of access to information. Three trends, however, make this position unsustainable:

  • Traditional models for acquiring and running systems, which slow the pace of innovation
  • Pressure to reduce costs
  • Increasing need to form partnerships with other police agencies, public-sector bodies, and the private sector. Partnership depends on information sharing and open approaches to developing systems.

One of the most radical—and successful—cloud-based public-safety and security services is Facewatch. Using a network-based model, Facewatch provides an online reporting tool that allows U.K. businesses and citizens to report crimes and attach video evidence. The service enables crime victims to cancel credit cards instantly through Facewatch’s partners; allows users to share images of wanted people; and provides a channel for feedback from the police on the outcomes of cases.

Facewatch offers immediate benefits to the public, businesses, and law enforcement:

  • Citizens: ease of reporting and rapid management of associated processes
  • Businesses: less time required to deal with incidents
  • Law enforcement: reduces or eliminates the need to interact directly with premises to recover video footage

For all users, there is greater transparency about processes and reporting on outcomes, as well as the ability for communities to share information about wanted persons and crime trends.

Read More »

Tags: , , , , , , , , , , , , ,