Cisco Blogs


Cisco Blog > Manufacturing

Cisco Live 2013 – Manufacturing Industry Presence and John Chambers Welcome Message

June 6, 2013 at 1:42 pm PST

CL13-MFG-Banner

Get ready for one of the best Cisco Lives yet! A good number of attendees hail from industrial sectors such as heavy industrial/equipment, automotive, materials and mining, and consumer packaged goods (CPG), and they can look forward to some engaging activities not to be missed!

These industrial companies are wrestling with business challenges such as reducing costs, speeding time to market and improving production up-time. How does Cisco play in the industrial space you ask? What solutions do we provide for positively transforming operational plant networking environments? How does Cisco address real manufacturing Industry Care-abouts? Come to Cisco Live to find out. Hear John Chambers tell you more about this year’s event in the video below, then read on!

John T. Chambers, Chairman and Chief Executive Officer, Cisco Systems Inc., welcomes you to Cisco Live in Orlando

Whether you’re in IT or production and controls, Cisco Live will give you a unique opportunity to gain hands-on insights to how Cisco can help you with these challenges and help positively transform operations for your plant networking environment for the better.

cnambood

Chet Namboodri -- Cisco Managing Director, Manufacturing Industry

Here’s just a snapshot of what you can see for your industry:

Chet will be talking about industrial solutions for manufacturers and their suppliers and partners all who want transparent integration and secure real-time visibility between business networks (information technology) and control and automation systems (operational technology). Amongst them are “Smart Solutions” which provide open-standard, IP-based communication and control to reduce costs, improve up-time, increase asset utilization, and lock-down on end-to-end security.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,

Securing the Internet of Everything: An Architectural View

As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.

The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.

While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.

The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »

Tags: , , , , , , , , , , , ,

Summary: Securing the Internet of Everything: An Introduction

I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post.

Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures that link physical and virtual objects. These abstractions come together on IoE, making it possible for devices to orchestrate and manage the world we live in, as they become connected entities themselves.

But to fully discuss security on the Internet of Everything, we must first go back to the roots of IoE itself. The technology innovations that employ M2M and IoT were actually spun off from military and industrial supply chain applications. As IP became a more common communication protocol, IoT gained more traction, helped even more by the creation of IPv6 and other advancements in wireless technology. As ever-increasing data is captured and distributed on these networks, more intelligence is generated.

Read my full “Securing the Internet of Everything: An Introduction” blog post to learn more about this embedded intelligence that is a core architectural component of IoT, and how it informs the security for the Internet of Everything itself. And stay tuned! I have more for you to come in this series, including a look into IoE security framework.

Tags: , , , , , , , , , , ,

Securing the Internet of Everything: An Introduction

Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic.

In discussing security and the Internet of Everything, the first question that comes to mind is, “Which segment of “everything” is one referring to?”. A reasonable approach has been to understand the common attributes that crosses vertical segments such as Intelligent Transportation, Smart Utilities, Industrial Automation and so on. The Internet of Things (IoT) and Machine-to-Machine (M2M) are general abstractions for the network infrastructure that links physical and virtual objects. In Cisco, we now refer to these abstractions as the Internet of Everything, IoE. The IoE describes a world where billions of objects have sensors to detect, measure and assess their status; all connected over public or private networks using standard and proprietary protocols.

Until a point in time around 2008/2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case.  Read More »

Tags: , , , , , , , , , , ,

Cisco’s Chief Futurist Shares Top 5 Predictions for 2013 and Beyond #IoE

March 7, 2013 at 11:42 am PST

The future intrigues us all, especially when every now and then we’re able to catch a glimpse of what’s to come.

At Cisco, one of the ways we build our business and serve our customers is to think about the future and how technology innovation stands to transform the world in which we live. This approach is especially important now as the more than 99 percent of physical objects that are currently unconnected become part of the Internet of Everything (IoE).

And while we know that no one person or company can predict the future with 100 percent accuracy, we put a lot of effort into coming as close as we can. To make this possible, we have a Chief Futurist on staff – Dave Evans – who, in addition to his responsibilities leading the Cisco IBSG Innovations team, spends his time helping Cisco and our customers see what lies ahead.

In an event earlier this month, Evans and the General Manager of Cisco’s Emerging Technology Group, Dr. Guido Jouret, shared their top predictions for the future and the mind-boggling innovations that will start taking off in 2013 and beyond. If you’re up for a little crystal-ball gazing, here’s what they had to say… Read More »

Tags: , , , , , , , , , ,