Cisco Blogs


Cisco Blog > Internet of Everything

#IoTChat Wed 11am PT with @ZebraTechnology

IoTChat Sep 24This week, our #IoTChat co-host is Zebra Technologies (@ZebraTechnology)!  We’ll be talking about device management and IoT Platforms.  Zebra Technologies is one of the sponsors for the Internet of Things World Forum in October (#IoTWF!) so I’m excited to have them join.

Here are three simple steps to join the #IoTChat [Wednesdays, 11am PT] -- our weekly industry discussion on the Internet of Things: Read More »

Tags: , , , ,

Service Provider Transformation through Innovation

No doubt, these are exciting times for service providers.  With the massive transformations that are happening nowadays in the industry and marketplace, being at the center of it all presents a huge opportunity. Well, this is exactly where service providers find themselves today: at the center of how enterprise businesses and consumers can transform through innovation.

At Cisco we are well-positioned to drive profitable growth for our service provider partners.  We have made a number of significant changes intended to help service providers globally earn more, reduce cost to serve while improving their agility.

We created an SP Segment and I have been asked to lead the overall business and strategy for Development, Nick Adamo will lead Sales, and Cedrik Neike will lead Services. Together we are partnering to simplify our engagement model and at the same time leverage the entire Cisco portfolio of solutions and products to bring to our customers the capabilities they need to achieve their business objectives.

We believe service providers are centered on transformation through innovation.  We believe that, with Cisco, they can: Read More »

Tags: , , , , , , ,

Take Advantage of Mobile Cloud. What Are You Waiting For?

September 23, 2014 at 8:00 am PST

As organizations seek ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world, the growth of mobile cloud will be a major force in shaping the business landscape and future tech decisions. The first blog post in this series, by Padmasree Warrior, explores how the convergence of mobility and cloud will deliver unprecedented transformation for all organizations. The second blog post in this series, by Sujai Hajela, answers the question of what mobile cloud really is and how it continues to provide new business opportunities. In the third post, Joe Cozzolino looks at what mobile cloud means for service providers and enterprises. In the fourth blog, Michael Fuhrman discusses the need for end-to-end security in a mobile cloud environment. And finally, this post will discuss actions that CXOs should take concerning cloud technology.  

Our recent mobility landscape study showed that organizations are looking for ways to maintain real-time connections with their workforce and customers in an increasingly digital and mobile-centered world.  The growth of mobile cloud is a major force in shaping the business landscape and future tech decisions. This blog series explores how the convergence of mobility and cloud will deliver unprecedented transformation for all organizations.

In this final post, Hans Hwang outlines two case studies where clients have used the reach of mobile cloud to improve customer interactions using real-time technology and results and speaks directly to business leaders on how to achieve the results they desire from mobile cloud technology.

In this series, we have covered a lot about what mobile cloud is and its capabilities, but can mobile cloud give you a return on your investment? As a Services leader, I see a lot of opportunity for you to get going with mobile cloud as a differentiator for your business. I’d like to close by talking about business outcomes. What is it you’d like to achieve? Increased efficiency? Reduced operating expenses? More revenue? A better experience for your customers? Or is it all of the above?

Let’s face it: your customers and your boss don’t care what particular technology you use to deliver results. They only care that you get there fast with minimal risk – and without extra funding. Investing in mobile cloud could be just your ticket, so let’s talk about business outcomes.

Mobile Cloud #5 8.4.14

Read More »

Tags: , , , , , , , , , , , , ,

Sub-Zero Innovates with the Internet of Everything

Blog authored by Chet Namboodri, Cisco and Marieke Wijtkamp, Librestream

Sub-Zero is a family owned business and, perhaps, best known as the developer of the first cabinet built-in refrigerator in the 1950s. Today, the company is the leading manufacturer of luxury appliances in North America, selling its top-of-the-line appliances worldwide. Sub-Zero employs more than 1,000 workers, with production facilities in Madison, WI, Richmond, KY, and, now, Goodyear, AZ. They are also a world-class example of a company who’s leveraging the Internet of Everything to drive innovation and who truly embodies the renaissance in American manufacturing.

Accelerating New Product Introduction (NPI) Cycles

In order to prepare for the largest product roll-out in the company’s history--60 new appliance models across refrigeration and its premium cooking brand, Wolf--Sub-Zero needed a top-notch, end-to-end network to provide flexible communication and collaboration between its engineering groups, the existing factories in Madison, and the new production facility in Goodyear. In addition, Sub Zero needed to ensure robust communication and diagnostic data exchange with external suppliers and installation partners. Dubbed the “New Generation Collaboration Initiative,” Sub-Zero worked with Cisco and Librestream to aid the design, launch, and ongoing manufacture of its new products.

Read More »

Tags: , , , , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.

It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as  the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.

We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:

  • As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
  • Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
  • Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.

A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.

Read More »

Tags: , , , , , , , ,