The appetite for the latest new products and services is growing exponentially driven by the 24 hour, on demand, social media driven, next day delivery expecting, ‘selfie’ posing with the new shiny object, hyper informed consumer. Satisfying the demand for this fast-paced consumer cycle requires manufacturers to move rapidly to stay ahead of competitors and consumer tastes. They must bring interesting and exciting new products to market in a timely fashion, whether they are first to market or responding to a competitor’s new product offerings.
Two specific trends are emerging and transforming how the industry develops, manufactures and meets the demands of the new on demand consumer driving market - crowd sourcing and 3D printing.
Manufacturing Game Changers: Crowdsourcing and 3D Printing
Crowdsourcing is not a new development model. In fact, the open-source model gave us the Linux operating system and the Apache Web server over 20 years ago. But there is one very distinct difference when applying crowdsourcing methodology to a manufacturing process, as opposed to software development, and that is raw material. This is where 3D printing technology is rapidly maturing driving orders of magnitude efficiencies and cost savings into the value chain.
A Printed Car
In fact, a start-up called Local Motors is on the cutting edge of combining crowdsourcing and 3D printing to revolutionize the automobile industry. In a process that Local Motors calls “co-creation,” — also known as “crowdsourcing” — the software allows enthusiasts to post a design for a part that other users in a worldwide community can call up on a browser, see in 3D, take measurements from, and comment on, thus providing a new model and methodology for innovation. Local Motors then leverage 3D printing technology to deploy “microfactories”
Can crowdsourcing and 3D printing produce an electric car?
Today’s networks are an essential part of business, education, government, and home communications. Many residential, business, and mobile Internet Protocol (IP) networking trends are being driven largely by the combination of video, social networking, and advanced collaboration applications, termed “visual networking.” In fact, total Internet traffic has experienced dramatic growth in the past decade alone. Take a look at this interactive infographic from Cisco that shows key trends and forecasts the growth of global IP traffic from 2013 to 2018. You can choose a category and filter the geographic regions in the map to view the impact of global IP traffic. According to Cisco’s Visual Networking Index (VNI), globally, there will be 20.6 billion networked devices by 2018, up from 12.4 billion in 2013. VNI is part of Cisco’s ongoing effort to forecast and analyze the growth and use of IP networks worldwide. VNI also forecasts that global Internet Protocol (IP) traffic will increase nearly three-fold over the next five years due to more Internet users and devices, faster broadband speeds and increased video viewing. Global IP traffic for fixed and mobile connections is expected to reach an annual run rate of 1.6 zettabytes – more than one and a half trillion gigabytes per year by 2018.
So who and what are responsible for the projected increase in overall internet traffic?
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Consulting Systems Engineer Mitko Vasilev, about developing an IoE platform. Lauren Friedman (@Lauren) moderates and Rikard Strid and Jonathan Davis are this week’s Cisco Champion guest hosts.
Cisco’s vision is for an OpenStack-based Intercloud that allows organizations and users to combine and move high-value workloads – including data and applications – across different public or private clouds as needed. Doing so easily and securely, while maintaining essential network and security policies as well as full compliance with local data sovereignty laws, is critical.
Metacloud deploys, operates and manages OpenStack-based production-ready private clouds in any customer data center. Together, Cisco and Metacloud will enable the creation of hybrid cloud environments that combine service provider public cloud deployments with remotely-managed OpenStack private clouds. Bottom line for customers: More agility for less money.
Our customers and partners see the value proposition clearly and have rallied around Cisco’s Intercloud vision and strategy over the last year. Many leading companies are working with us in the adoption of the Intercloud. Among them, key service providers and cloud providers, as well as important technology partners, including Dimension Data, Johnson Controls, NetApp, Red Hat, Sungard, Telstra, and VCE.
Metacloud will become a critical part of our Cloud Services portfolio under the leadership of Faiyaz Shahpurwala.
Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.
It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.
We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:
As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.
A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.