Cisco Blogs

Cisco Blog > The Platform

The 2017 Internet: A Look at the Future, Courtesy of the Cisco VNI Forecast

Visualize this: nearly half the Earth’s population – 3.6 billion people – connected to the Internet for communication, commerce, education, information, and entertainment.  Think that’s too futuristic? Think again. By 2017, less than five years from today, that will be our reality.

This prediction is one of several key findings from the newly released Cisco Visual Networking Index, 2012-2017, a highly regarded annual forecast of global Internet Protocol (IP) traffic now in its seventh year.

Let’s explore further the Internet of 2017, as projected by the updated VNI Forecast.

By 2017, IP traffic volumes and regional growth will continue to impress: Read More »

Tags: , , , , , , , , , , , , , , ,

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,

Securing the Internet of Everything: An Introduction

Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic.

In discussing security and the Internet of Everything, the first question that comes to mind is, “Which segment of “everything” is one referring to?”. A reasonable approach has been to understand the common attributes that crosses vertical segments such as Intelligent Transportation, Smart Utilities, Industrial Automation and so on. The Internet of Things (IoT) and Machine-to-Machine (M2M) are general abstractions for the network infrastructure that links physical and virtual objects. In Cisco, we now refer to these abstractions as the Internet of Everything, IoE. The IoE describes a world where billions of objects have sensors to detect, measure and assess their status; all connected over public or private networks using standard and proprietary protocols.

Until a point in time around 2008/2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case.  Read More »

Tags: , , , , , , , , , , ,

Welcome to the Next Generation of the Internet

No one could have imagined the fundamental impact the Internet would have on both society and the economy—changing our lives forever. The Internet has already transformed the way we work, live, play, and learn. And, this is only the beginning.

The extraordinary growth and transformation of the Internet is unprecedented, but what does the future of technology hold, and where is the Internet heading? Business executives, technologists, and policymakers are not only asking these questions—they also are looking for a map of the future that will help them assess changes in the Internet, and possible out-comes and implications of those changes for business, national policy, and regulation.

Recent research by Cisco IBSG has identified 10 major technology trends that we believe are shaping the direction of the Internet today and, most certainly, will change its direction in the future.

  1. A World Gone Mobile Read More »

Tags: , , , , , , , , , , , , ,

Cloud for Local Government Global Blog Series: The Strategic Value of the Cloud for State & Local Governments

Almost everyone has heard of the “cloud,” as a result of advertising by computer companies and frequent mentions in the news media. “Cloud” refers to technology resources used by an organization that are not at their own location, but available over the global data communications network (otherwise called the Internet).  Moreover, the cloud is not just a question of getting access to some big data center in the sky; ultimately, it means gaining authorized access to any data or computing resource that is part of the Internet, and even combining data and software components from physically distant computers.

Public officials may have heard about how the cloud is being used in the public sector. For example, the United States Conference of Mayors had a session on this at its 2011 meeting where various mayors spoke about how their cities were using such services as shared email “in the cloud.” At the National Association of Counties, there have been sessions describing a cloud that is restricted to trusted government agencies at the state and local levels — what some call the “private cloud” because its services are not available to every organization, thus helping preserve the privacy and integrity of government data.

But the reasons state and local government officials might want to use the cloud are not often explained.  This post will describe the various ways that the cloud can provide strategic value to state and local governments.

Cost Savings

Most people have first heard of the cloud as a means of saving money, which is especially attractive at a time of tighter budgets. So instead of buying hardware and software, a government agency rents what it needs, when it needs it. This approach means you can shift from using bonds and debt service to an approach that matches your IT budget with the real demand each year.

And, often, the software services available in the cloud, such as email, can cost less per employee than licensing equivalent software in-house.

Resilience, Flexibility & Faster Technology Adoption

Potential cost reduction is not all there is to the story. There are other positive benefits as well.

Read More »

Tags: , , , , , , , , , , ,