In a previous post, we looked at examples of new business opportunities enabled by the Internet of Everything and the importance of evaluating Data in Motion in new ways.
Naturally, the Internet of Everything brings its share of IT challenges. Data collection starts at the network edge, including a multitude of endpoint devices and sensors in everyday objects that automatically collect, analyze and transmit data—including video—on a massive scale.
For the most part, it is data that has previously gone untapped—a giant superset of the persistent data that is the subject of Big Data today. The velocity and volume of this data make it difficult to bring it together into one place and extract value from it in a timely fashion. A key IT challenge is deciding what data to store (which can be costly) and what data to ignore (which can be a lost opportunity).
For example, high-definition video surveillance cameras combined with data analysis offer retailers insight into everything from facial recognition to age, gender and socioeconomic indicators. Retailers can also use video intelligence to create augmented reality mirrors or spot customers in need and send associates to assist them. However, not all the data from these devices needs to be stored or even analyzed, but rather used in the moment to create interactive engagements with the customers.
To address these challenges, intelligence and automated data processing must be embedded in the network. This intelligence takes the guesswork out of selecting the correct data from the torrent, because the network can filter based on relevance. At the same time, it can prioritize what data to retain and what data to discard based on value policies. This requires a flexible infrastructure where compute, storage, network and security resources can be assigned on the fly where and when needed. In most cases with Data in Motion, the application moves to where the data is, not the other way round.
Another key challenge is security, which remains paramount all the way from the edge to the cloud and back. The rapid deployment of Internet of Things and M2M technologies is leading to a proliferation of devices whose variety, data, complexity and vulnerability go beyond the traditional IT landscape. Along with the tremendous value that can be extracted from Data in Motion come new risks that require network-centric security approaches.
The Internet of Everything brings together people, process, data and things to make networked connections more relevant and valuable than ever before, thus providing unprecedented economic opportunity for businesses, individuals and countries. We are still in the early stages of evolution for Data in Motion and the impact it will have on all of us. But it is clear that the more knowledge we have, based on meaningful information pulled from a variety of data sources, the more wisdom we can gain and apply. It will profoundly change the world.
Tags: cloud, data in motion, Internet of Everything, internet of things, Machine to Machine
Today’s applications are either virtualized in our own data center or being hosted by any number of providers. But is our security built around our current security reality or is it living in the past? During one of my Gartner Security & Risk Management Summit presentations, I shared best practices in a rapidly changing environment, where cloud vendor hype isn’t matching our security reality. Now that everything is in the cloud, we need a strategic approach to cloud security.
Here’s how to make it happen:
Ensure safe data handling when working with cloud provider. Considering cloud providers are an extension of your business, it is vital to ensure how your provider handles security for storing and transmitting your data. What provisions are in place to make sure data is secure once it has been transmitted? Determine if your provider has firewalls, data encryption, and user authentication to keep your data safe.
Combat growing threats. As cloud-based technologies grow more sophisticated over time, so do the possibilities of threats. A proactive approach to security means that we enable technology like cloud-based threat intelligence to detect a threat as they happen – or in some cases before they happen. Other anti-threat measures such as deep packet inspection and proactive monitoring can also help combat viruses, spam and other intrusions. Learn more. You don’t have to be a security expert to take security seriously. Leverage industry bodies, like the Cloud Security Alliance, for guidance on benchmarking service provider security capabilities. Learn what certifications and security practices your cloud provider has, including daily risk audits. And look for ways to increase security processes when you work with cloud providers. See how Cisco can help you protect your business assets and meet compliance requirements.
Learn more. You don’t have to be a security expert to take security seriously. Leverage industry bodies, like the Cloud Security Alliance, for guidance on benchmarking service provider security capabilities. Learn what certifications and security practices your cloud provider has, including daily risk audits. And look for ways to increase security processes when you work with cloud providers. See how Cisco can help you protect your business assets and meet compliance requirements.
To know more follow me on Twitter @e_desouza and check my blog and Gartner presentation on Three Data Center Security Innovations to Accelerate Your Business
Tags: Cisco, Cisco Security, cloud, data center, data center security, firewall, integrated security, it security, network security, secure infrastructure, security, security intelligence
Today Cisco is introducing new Pervasive Conferencing capabilities that further simplify and enable video collaboration for everyone. It’s about increase in scale throughout your organization along with greater efficiencies and affordability. Consider doubling the number of endpoints while keeping costs at a few dollars per user per month.
Enhancements across our collaboration portfolio make it easy to migrate, upgrade or implement a new deployment, and give you flexibility to customize solutions for what your business specifically needs. Let me share a few announcement highlights:
- Deployment options: We’ve made it easier for you to choose your deployment. Virtualized, on-premise, or cloud, you can use the platform that works best with your infrastructure strategy.
- Broader reach: Extend high-quality multiparty video and web conferencing meetings to more endpoint types with our expanded support of high-definition mobile devices. Read More »
Tags: Cisco, cloud, collaboration, conferencing, infocomm 2013, pervasive, TelePresence, video
Businesses are embracing cloud based video services to achieve higher scale and universal reach. Today’s work environment is dynamic and fast paced, with the exponential growth of video enabled mobile devices bringing even more opportunities to leverage cloud based video services. Recently, the Cisco Visual Networking Index (VNI), which tracks global mobile data traffic, predicted that eight billion mobile devices would be in use by 2016. For organizations interested in extending video to mobile users with disparate devices, cloud based video services offer a simple solution to management complexity and device interoperability.
With Cisco ‘s cloud based video services, it’s even easier and more affordable for organizations to enable video on mobile and Bring Your Own Device (BYOD) use cases. Cisco’s pervasive conferencing strategy delivers cloud deployment options for multiparty video meetings anywhere, at any time, and from any device. Cisco is working with its partners to deliver simple to use cloud based virtual meeting capabilities, without any compromises on video quality and support. The new Virtual Meeting Room capabilities offer organizations the ability to use business class multiparty video without the need to reserve or schedule meeting resources ahead of time.
Read More »
Tags: AT&T, byod, Cisco, cloud, collaboration, pervasive, TelePresence, video, virtual meeting rooms
I can hardly wait. In two days the suspense will be over and the Intelligent Community Forum (ICF) will have selected its 2013 Intelligent Community of the Year. With so many extraordinary and innovative communities in the running, I’m glad it’s not up to me to choose one. But I do have the thrill and privilege of seeing it all happen, live in New York City at the ICF Summit this week.
I and the other attendees will no doubt listen in awe to the inspiring leaders from all around the world as they talk about the way their organizations are changing the way people in their communities or regions work, live, play, and learn. Who will be this year’s winner? One strong candidate is Toronto Canada, one of this year’s Top7 communities. Learn more about their initiatives in the video below:
Later today, we’ll hear from Toronto’s Councillor, Michael Thompson, and have the opportunity to pick his brain during a group Q&A session to learn more about how Toronto is improving their economic and social environment by providing community network services to its constituents, with its energy-reducing smart and connected buildings to link residents and businesses, with portals and kiosks to provide real-time services to citizens, and with smart sensors and surveillance for public safety. I’d say they’re a pretty tough contender!
Read More »
Tags: cloud, intelligent communities forum, intelligent communities summit, intelligent community award, local government, smart and connected communities, Smart Cities, top7