Cisco Blogs


Cisco Blog > Mobility

Apple iOS 8 and MAC Randomization: What It means for Cisco’s Connected Mobile Experiences (CMX) Solution

As you may have read, Apple’s iOS 8 will come with some changes to the way MAC addresses are exposed in Wi-Fi probe requests. Apple’s intent was to provide an additional layer of privacy for consumers and target those companies that offer analytics without providing any value to the end consumer. We’ve been getting some questions about what this means and how it impacts our Connected Mobile Experiences (CMX)  solution, so we wanted to clear this up for our customers.

What does this mean for you? 

First and foremost, Cisco has always been dedicated to privacy for our customers and their end-users. There are four aspects of privacy that are built into our CMX solution:

1. Anonymous Aggregate Information: All analytics are based on aggregate, anonymized location data.

2. Permission-based: Users have to opt-in to join a Wi-Fi network or download an app

3. MAC Address Hash: Users’ MAC addresses can be hashed before exposing to 3rd party apps

4. Opt Out: End-users are always presented with the option to opt out of location-based services

The true value of CMX analytics for organizations is in aggregate location data to be used for business analysis to improve the customer experience for end-users. Providing customers with high performing Wi-Fi not only keeps always-on mobile users happy and opens the doors to delighting customers with more personalized experiences, but also helps provide more granularity to those aggregate trends to feed back into the experience creation machine. Win-win.

What does this mean for our CMX value proposition? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Mobile Location Based Services Trends of 2013

The holiday season which began with Cyber Monday on December 2nd 2013 has just ended and analyzing the impact on mobile commerce sales and location based services unveils some very interesting trends.

Firstly, at the macro level:

  • Online shopping increased in the USA in 2013 by over 16% compared to 2012.
  • From a mobility perspective, almost a third of all online sales (29%) were made from Smartphones or Tablets.

Clearly there are changes in the online marketplace, but in order to examine this a little further, let’s look at a few key questions to help understand what is happening in this marketplace:

  1. What are the major trends?
  2. Is mobile commerce just a US phenomenon?
  3. What impact does location based services have?
  4. Where are the main benefits coming from analytics?
  5. How is privacy fitting in to all this and how is the attitude of mobile consumers evolving?

Trends 2013:  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

How Does Enterprise IT Respond to Consumerization? To Mac, BYOD, and Whatever Comes Next?

There’s a new force changing the way Cisco IT operates, the way we plan and develop new services, and the way we support our employees. Consumerization is showing us how to help our employees to be more productive and more satisfied – if we can learn to listen and respond. Read More »

Tags: , , , , , , , , , , , ,

A Culture of Transparency

Many Cisco customers with an interest in product security are aware of our security advisories and other publications issued by our Product Security Incident Response Team (PSIRT). That awareness is probably more acute than usual following the recent Cisco IOS Software Security Advisory Bundled Publication on September 25. But many may not be aware of the reasoning behind why, when, and how Cisco airs its “dirty laundry.”

Our primary reason for disclosing vulnerabilities is to ensure customers are able to accurately assess, mitigate, and remediate the risk our vulnerabilities may pose to the security of their networks.

In order to deliver on that promise, Cisco has has made some fundamental and formative decisions that we’ve carried forward since our first security advisory in June 1995.

Read More »

Tags: , , , , , ,

Cisco’s onePK Part 2: Reaching out to a Network Element

Exordium

In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple onePK functionality and is the foundation upon which most onePK applications are built.

Preambling Details

The following short program “ophw” (onePK Hello World), is a fully functional onePK application that will connect to a network element, query its system description, and then disconnect. It doesn’t do anything beyond that, but it does highlight some lynchpin onePK code: network element connection and session handle instantiation. This is the foundational stuff every onePK application needs before useful work can get done. Read More »

Tags: , , , , , , , , , , ,