Cisco Blogs


Cisco Blog > Government

Five Ways To Start Using Big Data

Just when we feel we are drowning in information, along comes Big Data to save the day. Big Data refers to a dataset so large it is beyond the capability of a typical database to manage and make use of the information. But a set of advances in hardware and software now allows us to rapidly capture, organize, and make sense of vast oceans of data, enabling us to apply the results to make better business decisions.

Big Data can give us a strategic advantage. For example, investors could see global trends in trading across sectors in near-real time; they could respond much earlier to a downturn in prices in a given sector, avoiding the steep losses incurred by taking later action.

Big Data can also create a richer experience for customers. Bloomberg.com gathers more than 100 data points from every page an individual reader views, processing the data with 15 algorithms to personalize recommendations. Algorithms that understand natural language and rich media and can reason make Big Data technology even more useful in decision making. Novel visualization paradigms, 3D, and gesture interfaces make Big Data understandable and accessible to everyone.

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

The Dawn of the Zettabyte Era [INFOGRAPHIC]

It’s common knowledge that the amount of online rich media consumption is increasing exponentially on an annual basis. But how much video traffic is projected over the next five years? And what does this growth really mean for global residential, business, and mobile subscribers and the service providers that support them? Well, to begin, we need to expand our traffic terminology. Today we live in a world of petabytes and exabytes but according to the latest findings from the Cisco Visual Networking Index (VNI), we’ll need to add the term “zettabyte” to our vocabulary by 2015.

So, how much exactly is a zettabyte?

A zettabyte is roughly 1000 exabytes. To place that amount of volume in more practical terms, an exabyte alone has the capacity to hold over 36,000 years worth of HD quality video…or stream the entire Netflix catalog more than 3,000 times.  A zettabyte is equivalent to about 250 billion DVDs.

By 2015, the majority of global Internet traffic (61 percent) will be in some form of video—Internet video-to-PC, Internet video-to-TV, mobile video, et al.The “dawn of the Zettabyte era” will be an unprecedented online milestone that will occur in our lifetime.

To better understand the significance of a zettabyte, we have put together an in-depth infographic to provide a visual snapshot of our online future. The way the world uses the web is changing and this infographic provides a quick Cisco perspective of what’s to come.

Are you ready for the zettabyte era? Check out the infographic here.

Read More »

Tags: , ,

Our Experiment with Facebook Polls on Consumer Devices and Social Media At Work [INFOGRAPHIC]

June 21, 2011 at 11:03 am PST

With so many consumer devices and tools creeping into our professional lives, our expectations as employees are changing. The result is increasing pressure on IT departments. To get a better sense for what that really means, we decided to do a quick and informal poll series on our corporate Facebook page to learn how people

  • View their companies’ IT departments when it comes to adopting consumer, social and mobile tools at work
  • Use these tools during their typical workday

How about the sample size, you might ask. Within a short amount of time, we received qualified responses from 132 to several hundreds of people, depending on the question. Here are some of the results:

Read More »

Tags: , , , , , ,

3 Easy Tools to Protect Your Data BEFORE Your Device Gets Lost or Stolen

May 16, 2011 at 4:23 pm PST

I was the recently on the wrong end of a 488. For those of you who aren’t familiar with the California penal codes, that’s a petty theft. My laptop, PS3, and iPad are gone, taken from me. At this point, I can only hope that my things broke in the act of the robbery and are rendered useless.

Unfortunately, hope and $3.50 will get me a café latte and that latte cannot secure my precious data at this point; my saved passwords, tax returns…the keys to the castle. Our devices are increasingly holding more important information and when these devices get compromised, so does our sensitive data.

Read More »

Tags: , , , ,

Webcast Recap: Debunking the Myth of the Good Enough Network

How will the explosion of mobile devices, security threats, video, and cloud effect how customers build their networks?

What are the pitfalls to taking a tactical (or good enough) approach to networking?

And why is good not good enough for enterprise networks?

These were among the questions tackled when Cisco’s Rob Lloyd, EVP of Worldwide Operations, and Mike Rau, VP and CTO, Borderless Networks, hosted a 45-minute webcast to debunk the Myth of the “Good Enough” Network. Along with Bob Cagnazzi, CEO of BlueWater Communications, Rob and Mike discussed:

• IT industry trends driving the evolution of the network
• Common misperceptions about taking a “good enough” approach to networking
• Real world benefits of investing in the network as a strategic asset and innovation engine

What are the seven myths of the Good Enough Network? Tune in to the replay of the webcast to find out!

Related Links
• White Paper: When Good Enough Isn’t Good Enough
• Video: NetNoGo Video
• Blog: Seven Myths of the Good Enough Network

Tags: , , , , , , , , ,