Cisco Blogs


Cisco Blog > Internet of Everything

Game Theory and the Power of Innovating as an Industry

The recent passing of John Forbes Nash made me wonder how his ingenious game theory can be applied to technology innovation.

Very simply put, Nash’s theory of equilibrium puts forth that outcomes are more attainable for all parties when they work cooperatively toward a goal rather than against each other in isolation. Knowing each other’s mindset and working together gives each party a better chance at achieving his or her objective than working on their own.

This theory has been used to analyze everything from wars and sports to evolutionary biology and games of skill. Read More »

Tags: , , , , , , , , , ,

Why I Love Big Data Partner Series 5: Cisco and Splunk: The Weapons of a Security Warrior

In this 5th why I love big data blog series, I am joined by Jeff Aboud from Splunk to outline why big data security analytics is essential to today’s security challenges.

Untitled SplunkJeff Aboud, Sr. Solutions Marketing Manager, Security Markets, Splunk Jeff Aboud has more than a dozen years in various areas of the security industry, spanning from the desktop to the cloud, including desktop AV, gateway hardware and software, encryption technologies, and how to securely embrace the Internet of Things. His primary focus today is to help business and security professionals understand how to visualize, analyze, and alert across a broad range of data sources in real time to maximize their security posture.

 

 

It’s no secret that advanced threats and malicious insiders present increasing security challenges to organizations of all sizes. Security professionals know that it’s not matter a question of if, but when an attack will successfully breach their network. Visibility is often what makes the difference between a breach and a major security incident, and enables proactive security posture throughout the attack continuum – before, during, and after the attack. It’s also essential to understand that the fingerprints of an advanced threat are often located in the “non-security” data, so the effective detection and investigation of these threats, before your data is stolen, requires security and non-security data.

So what does all this really mean, and how can you use it do dramatically improve your security posture?

You need to integrate and correlate the data from your firewalls, intrusion prevention, anti-malware, and other security-specific solutions along with your “non-security” data such as the logs and packet information from your servers, switches, and routers. This is no easy task with the large number of different security solutions present in most enterprise networks. But having all your data at your fingertips will help you improve your detection capabilities and automate the remediation of advanced threats.

But how can you do this, since Security Information and Event Management (SIEM) systems only look at traditional security sources? The partnership between Splunk and Cisco is the answer. Splunk is integrated across Cisco security platforms, as well as other places throughout the network including various Cisco switches, routers and Cisco Unified Computing Systems (UCS) to deliver broad visibility across your environment.

Together, Splunk and Cisco provide security and incident response teams the tools they need to quickly identify advanced threats, visualize them in real-time across potentially thousands of data sources, and take automated remediation action on Cisco firewalls and intrusion prevention systems. Read More »

Tags: , , , , , ,

Two Ways Broadband Internet Is Improving Health Care and Education

This blog was originally published on the Huffington Post ImpactX.

In many parts of the world, being able to download information on a smartphone, tablet or laptop in a few seconds is the norm. In Silicon Valley, wireless high-speed Internet connections are more ubiquitous than Starbucks.

Broadband has changed the way we work, shop, watch movies and communicate with loved ones, allowing us to access more robust types of content, services and applications. Yet if we look beyond our own personal use, we can see that broadband Internet access is not merely a convenience: it is a powerful force for social change.

In education, broadband technology can have a huge impact. Educators face a number of challenges, including teacher shortages, limited access in rural areas and gender disparity. For example, the world would need 3.3 million primary teachers and 5.1 million lower secondary teachers in classrooms by 2030 to provide all children with basic education, according to UNESCO’s 2013-2014 Education For All Global Monitoring Report.

Read More »

Tags: , , , , , ,

10 Predictions for the Future of the Internet of Things

We are in the early days of another transformative technology revolution. Wired magazine described a new era where “the most mundane items in our lives can talk wirelessly among themselves, performing tasks on command, giving us data we’ve never had before.” The Internet of Things (IoT) is a world where up to 50 billion things (or devices) will be connected to the Internet by 2020; or, the equivalent of 6 devices for every person on the planet.

We are already starting to see the emergence of smart cities, connected utilities, connected railways, connected factories, connected cars, and even connected mines, to name but a few. The Internet of Things will fundamentally transform businesses, generate enormous economic wealth and create immeasurable social value.

What does the future have in store for IoT? The following are my ten predictions Read More »

Tags: , , , , ,

John Oberon Joins Cisco as Vice President of IoT Software Platforms

I am delighted to announce that John Oberon has joined Cisco as Vice President, IoT Software Platforms. His responsibilities include the development of platforms that enable developers to access Cisco’s IoT infrastructure capabilities.

John’s hiring is significant because delivering on the promise of the Internet of Everything – the intelligent connection of people, process, data, and things – means making it possible to deliver vertical solutions to specific industries. To do this, we need to enable a broad ecosystem of technology partners with the right vertical-specific expertise. We will do this by providing the right kind of application platform that offers open APIs and application development environments for customers, partners, and third parties to design, develop, and deploy their innovative solutions.

Crucial to Cisco’s strategy is to provide IaaS and PaaS for IoT applications and SaaS offerings to run at the extreme edge/fog. John’s joining Cisco and taking on this leadership role in IoT Systems and Software is critical to our being able to deliver these services to our partners, customers, and the broader IoT developer community. Software was indeed a hot topic at Cisco’s Partner Summit 2015 last month in Montreal. It’s clear that the market needs the right application platform to enable the services that customers will require, and Cisco is recruiting and developing the talent we need to deliver these software platforms.

John has extensive experience building robust developer communities for software platforms – especially within the SaaS and PaaS space. He will be an important Cisco representative in the IoT developer community.

Before joining Cisco, John was the Chief Architect, General Manager, and Vice President of Engineering at Mashery, an Intel business that is a leader in application services governance. Earlier in his career, John was the Director of Product Development at Intuit. He also worked 12 years in key roles at Microsoft.

“I am excited to have a vital role developing Cisco’s IoT software platforms and expanding the horizon of what we know as the Internet of Things,” John said. “The time is perfect for bringing in top talent and continuing the journey to bring Cisco’s IoT software platforms to market.”

You can follow John’s tweets, read his LinkedIn blog posts, and look for him soon at major developer and Cisco events.

 

Tags: , , , , , ,