Cisco Blogs


Cisco Blog > Manufacturing

Manufacturers Are Following the Crowd to ‘Drive’ Innovation

The appetite for the latest new products and services is growing exponentially driven by the 24 hour, on demand, social media driven, next day delivery expecting,  ‘selfie’ posing with the new shiny object, hyper informed consumer.  Satisfying the demand for this fast-paced consumer cycle requires manufacturers to move rapidly to stay ahead of competitors and consumer tastes. They must bring interesting and exciting new products to market in a timely fashion, whether they are first to market or responding to a competitor’s new product offerings.

Two specific trends are emerging and transforming how the industry develops, manufactures and meets the demands of the new on demand consumer driving market - crowd sourcing and 3D printing.

Manufacturing Game Changers:  Crowdsourcing and 3D Printing

Crowdsourcing is not a new development model.  In fact, the open-source model gave us the Linux operating system and the Apache Web server over 20 years ago.  But there is one very distinct difference when applying crowdsourcing methodology to a manufacturing process, as opposed to software development, and that is raw material.   This is where 3D printing technology is rapidly maturing driving orders of magnitude efficiencies and cost savings into the value chain.

A Printed Car

In fact, a start-up called Local Motors is on the cutting edge of combining crowdsourcing and 3D printing to revolutionize the automobile industry. In a process that Local Motors calls “co-creation,” — also known as “crowdsourcing” — the software allows enthusiasts to post a design for a part that other users in a worldwide community can call up on a browser, see in 3D, take measurements from, and comment on, thus providing a new model and methodology for innovation.  Local Motors then leverage 3D printing technology to deploy “microfactories”

Can crowdsourcing and 3D printing produce an electric car?

Read More »

Tags: , , , , , , , , ,

Cisco’s Visual Networking Index: Understanding the Evolution of Internet Users, Devices and Connections

Today’s networks are an essential part of business, education, government, and home communications. Many residential, business, and mobile Internet Protocol (IP) networking trends are being driven largely by the combination of video, social networking, and advanced collaboration applications, termed “visual networking.”  In fact, total Internet traffic has experienced dramatic growth in the past decade alone. Take a look at this interactive infographic from Cisco that shows key trends and forecasts the growth of global IP traffic from 2013 to 2018. You can choose a category and filter the geographic regions in the map to view the impact of global IP traffic. According to Cisco’s Visual Networking Index (VNI), globally, there will be 20.6 billion networked devices by 2018, up from 12.4 billion in 2013. VNI is part of Cisco’s ongoing effort to forecast and analyze the growth and use of IP networks worldwide. VNI also forecasts that global Internet Protocol (IP) traffic will increase nearly three-fold over the next five years due to more Internet users and devices, faster broadband speeds and increased video viewing. Global IP traffic for fixed and mobile connections is expected to reach an annual run rate of 1.6 zettabytes – more than one and a half trillion gigabytes per year by 2018.

So who and what are responsible for the projected increase in overall internet traffic?

Read More »

Tags: , , , , , , , , , , , , ,

#CiscoChampion Radio S1|Ep 27 Developing an IoE Platform

September 17, 2014 at 1:43 pm PST

cisco_champions BADGE_200x200#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Consulting Systems Engineer Mitko Vasilev, about developing an IoE platform. Lauren Friedman (@Lauren) moderates and Rikard Strid and Jonathan Davis are this week’s Cisco Champion guest hosts.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco SME
Mitko Vasilev, @iotcoi, Cisco Consulting Systems Engineer

Cisco Champions
Rikard Strid, @rikardstrid, Founder thingk.me, Clayster AB
Jonathan Davis, @subnetwork, Network Planning Analyst Read More »

Tags: , , ,

Cisco Announces Intent to Acquire Metacloud

Today, Cisco takes another important step towards realizing our plans to create the world’s largest global Intercloud – a worldwide network of interconnected clouds and cloud service providers.

Our intent to acquire Metacloud, an OpenStack-based private cloud-as-a-service company, advances our strategy and delivers value to customers—right now. Metacloud provides IT teams with another way to accelerate their journey to the cloud and to gain an on-ramp to the Intercloud. By catalyzing the creation of the Intercloud, Cisco can fundamentally transform how IT and cloud services are bought, sold, aggregated and consumed.

Cisco’s vision is for an OpenStack-based Intercloud that allows organizations and users to combine and move high-value workloads – including data and applications – across different public or private clouds as needed. Doing so easily and securely, while maintaining essential network and security policies as well as full compliance with local data sovereignty laws, is critical.

Metacloud deploys, operates and manages OpenStack-based production-ready private clouds in any customer data center. Together, Cisco and Metacloud will enable the creation of hybrid cloud environments that combine service provider public cloud deployments with remotely-managed OpenStack private clouds. Bottom line for customers: More agility for less money.

Our customers and partners see the value proposition clearly and have rallied around Cisco’s Intercloud vision and strategy over the last year. Many leading companies are working with us in the adoption of the Intercloud. Among them, key service providers and cloud providers, as well as important technology partners, including Dimension Data, Johnson Controls, NetApp, Red Hat, Sungard, Telstra, and VCE.

Metacloud will become a critical part of our Cloud Services portfolio under the leadership of Faiyaz Shahpurwala.

Stay tuned for more details in the weeks to come!

Tags: , , , , , , , , , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.

It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as  the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.

We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:

  • As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
  • Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
  • Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.

A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.

Read More »

Tags: , , , , , , , ,