Superheroes and their super strengths have long captured our imaginations. And since many of these abilities are normal human traits stretched to a magical extreme, you may well have pictured how your own life would change with super speed, agility, or senses.
Today, such daydreams are getting just a bit closer to reality. And while such powers won’t necessarily save the world (yet), they will make some common activities, such as shopping, a bit more super.
Smartphones have already assumed a central role in the retail experience. Yet the current level of smartphone interactivity is just the beginning. Exciting new capabilities are transforming the ways in which we interact — connecting our physical world to digital dimensions in very simple and intelligent ways. We will see more intelligent connections emerging across the entire customer journey: consideration, purchase, and usage.
If it seems as if the roles of chief information officer (CIO) and chief diversity officer (CDO) rarely overlap, think again. In today’s hypercompetitive — and hyperconnected — global marketplace, inclusion, collaboration, and technology are merging as essential drivers of innovation and business success. And the relationship between the CIO and CDO may never be the same.
Indeed, fostering a policy of inclusion and diversity in your organization isn’t just the right thing to do; increasingly, it is also the profitable thing to do. And, it’s a clear business imperative, since great ideas come from all corners — and levels — of the organization.
In a Cisco survey of 7,500 companies, 93 percent of enterprises with a formal policy of inclusion reported that their collaboration technology investments outperformed their business value expectations. That’s just one example of the inclusion/diversity/value equation at work.
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution.
Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing in this space to protect Cisco customers?
Brennan: One of the ways that we have traditionally confronted this threat is through third-party intelligence in the form of data feeds. The problem is that these social engineering attacks have a high time dependency. If we solely rely on feeds, we risk delivering data to our customers that may be stale so that solution isn’t terribly attractive. This complicates another issue with common approaches with a lot of the data sources out there: many attempt to enumerate the solution by listing compromised hosts and in practice each vendor seems to see just a small slice of the problem space, and as I just said, oftentimes it’s too late.
We have invested a lot of time in looking at how to avoid the problem of essentially being an intelligence redistributor and instead look at the problem firsthand using our own rich data sources -- both external and internal - and really develop a system that is more flexible, timely, and robust in the types of attacks it can address.
Mahdi: In principle, we have designed and built prototypes around Cisco’s next generation phishing detection solution. To address the requirements for both an effective and efficient phishing detection solution, our design is based on Big Data and machine learning. The Big Data technology allows us to dig into a tremendous amount of data that we have for this problem and extract predictive signals for the phishing problem. Machine learning algorithms, on the other hand, provide the means for using the predictive signals, captured from historical data, to build mathematical models for predicting the probability of a URL or other content being phishing.
Earlier this week, the IEEE Standards Association (IEEE-SA) announced the winners of the 2013 IEEE-SA Awards to honor standards development contributions. We are pleased to announce that Andrew Myles, Engineering Technical Lead at Cisco has been awarded the IEEE 802 SA International award for his extraordinary contribution to establishing IEEE-SA as a world-class leader in standardization. Andrew has long been involved in IEEE-SA and led a long term initiative (2005-2013) in IEEE 802 to defend and promote IEEE 802 standards globally.
We want to congratulate Andrew on this tremendous recognition. The work of Andrew and others contributors develop and promote high quality, efficient and effective IEEE standards. This enables the Internet and the supporting network components to be the premiere platforms for innovation and borderless commerce they are today. These standards in turn are reflected in our products and solutions for our customers. As we develop technological innovation for our customers, in parallel, we continue to drive global standards deployment. The results are the best innovative solutions that can solve and better our customers’ network environments. Read More »
What is ARS and what problem is it trying to solve?
Dazhuo: From a high-level view, Auto Rule Scoring (ARS) is the machine learning system for our anti-spam system. The system receives a lot of email and classifies whether it’s spam or not spam. From a more detailed view, the system has hundreds of millions of sample email messages and each one is tagged with a label. ARS extracts features or rules from these messages, builds a classification model, and predicts whether new messages are spam or not spam. The more variety of spam and ham (non-spam) that we receive the better our system works.
Jisheng: ARS is also a more general large-scale supervised learning use case. Assume you have tens (or hundreds) of thousands of features and hundreds of millions (or even billions) of labeled samples, and you need them to train a classification model which can be used to classify new data in real time.