Cisco Blogs


Cisco Blog > Mobility

Powerful API’s Unlock Location-based Services

We’ve all been there, seen it, and even done it ourselves. We’re talking or texting on our phones while walking around the isles of our favorite store. Half the time people are in a venue they’re more fixated on what’s happening on their phone than what’s around them. What about those brick and mortars around us? How can they get our attention when our noses are in our devices?

The way people use their devices may never change, but the way in which businesses interact with their mobile phone loving customers can. Cisco’s Customer Mobile Experiences (CMX) solution provides businesses with the technology to leverage the mobile trend to their advantage by serving smartphone carrying visitors, guests, passengers, shoppers and students location-based services to get their attention.

Among these tools is a valuable set of API that can unlock location-based services, such as indoor navigation and push notifications to create a more personalized mobile experience.   Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Carrier Wi-Fi for the Retail of Tomorrow

By Lisa Garza, Cisco Service Provider Marketing, Mobility Solutions

When we first started developing Cisco Connected Mobile Experiences several years ago, we had a vision that carrier-grade Wi-Fi could change how we interact with public environments.  We knew that the rich information that Wi-Fi provides indoors could enhance our experiences while shopping, watching sports, attending conventions, going to museums, and seeing shows.

It is so exciting to see this vision coming to life all around us.  One of the latest examples is the beautiful Stary Browar Mall in Poznań Poland.  Stary Browar is more than a mall.  It’s designed as a 50/50 combination of art and retail space, and the two come together to provide a unique shopping experience that can’t be found on the Internet.

Stary Browar

Read More »

Tags: , , , , , , , , , ,

How Cisco IT Plans Capacity for Wireless LAN Access

Brett_Belding

 

Brett Belding

The capacity requirements for Cisco WLANs have held steady over the last decade—until now. The big change is more devices and more video use:  Read More »

Tags: , , , , , , , , ,

Dynamic Cyber Attacks Call for Dynamic Controls

Last month’s earthquake in Napa Valley got me thinking. In earthquake-prone areas, new construction is being built to move dynamically to withstand shocks and tremors. Innovative materials and designs sway and bend to provide better protection. But older buildings based on traditional, static design concepts can suffer devastating damage in an earthquake and its aftershocks.

It’s similar to the journey we’re on in the security industry, which is scaling to better address the harsh realities we face as defenders. At Cisco, we track this journey through a scale of controls we refer to as  the Security Operations Maturity Model, which moves from static to human intervention to semi-automatic to dynamic and, ultimately, predictive controls. I will talk more about this scale in the coming weeks, but for now, let’s focus on the need for most organizations to shift to dynamic controls.

We all know that the security landscape is constantly evolving and attackers are innovating in lockstep with rapid changes in technology. In fact, as I talk with security professionals daily about the challenges they face, a few consistent points come up:

  • As new business models are built on innovations in mobility, cloud, the Internet of Things (IoT) and Everything (IoE), security solutions and processes must become more dynamic and more scalable to keep up with the change;
  • Further, as hacking has matured and become industrialized, the security models used to defend need to mature as well; and
  • Finally, there’s too much complexity, fragmentation, and cost in legacy security deployments.

A recent malicious advertising attack called “Kyle and Stan”, discovered by our Talos Security Intelligence and Research Group, demonstrates the challenges defenders are up against -- read their full post here. Posing as legitimate advertisers, cybercriminals contact the major advertisement networks to try to get them to display an ad with a malicious payload packed inside of legitimate software – spyware, adware, and browser hijacks, for example. They target popular websites and instruct the companies to run the ad for just a few minutes, leaving little or no time for the ad content to be inspected. In this case, malvertising victims were faced with an often-unprompted download of what appeared to be legitimate software with a hidden malicious payload. The malware droppers employ a range of clever techniques to continuously mutate in order to avoid detection by traditional, point-in-time systems.

Read More »

Tags: , , , , , , , ,

Revamping the MSE User Interface

As part of the WLC 8.0 release, we addressed customer comments and revamped the user interface (UI) for the MSE. We wanted to make it easier for customers using both MSE and PI to adjust to larger deployments. We also wanted to quicken the pace at which we could deliver features to the customers. Today I want to walk you through the landing page and configuration of the new MSE UI.

Landing Page

The landing page is the first thing one sees when logging into  the MSE UI. This page provides the user with a basic snapshot of system health, an easy way to launch the apps, and a quick status of the various services on MSE.

System Health

The new UI highlights important parameters like CPU and Memory usage in order to give the user an indication of the stress being handled by the MSE.

 mseui1 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,