Cisco Blogs

Cisco Blog > Connected Life Exchange

Mobile Technology Spotlight: Mobile Phone Microscopes for the Developing World

Aydogan Ozcan_IMAGEThis is a guest blog contributed by Dr. Aydogan Ozcan, Chancellor’s Professor at UCLA. **

In many developing regions today, cellphones and other mobile devices have begun to play a significant role in healthcare distribution. Local networks operated by service providers allow medical staff to utilize mobile technology to treat, educate, and set follow-up appointment dates with patients. Not only can patients access information about their health, but they can meet with physicians via video over the mobile network. For regions where people may be hundreds or even thousands of miles from a local doctor or hospital, these mobile devices can become lifesaving tools.

While cell phones and other mobile devices such as PCs and tablets can serve as a source of medical information or as a virtual meeting place between a doctor and patient, the technology itself can play a more important role of improving health care in developing regions as an actual medical device. Take for example, the work of University of California, Los Angeles (UCLA), Chancellor’s Professor, Dr. Aydogan Ozcan. Ozcan is creating portable and lightweight microscopes that affix to the mobile phones, thus transforming them into a platform for conducting microanalysis of blood, bodily fluids and water samples. With Dr. Ozcan’s vision and technology research, cellphones can become a mobile medical lab that can diagnose life-threatening diseases. Read More »

Tags: , , , , , ,

Latin America Insights: Keeping Your Organization Safe in a Mobile World

The power of mobility has transformed the IT landscape.

While mobility and other tech forces, such as cloud and big data, have enabled organizations to improve productivity and increase efficiency, the constant challenge of keeping data, assets and users secure continues to be a top concern for CIOs and CSOs.

And these concerns stretch across global borders. For example, Frost & Sullivan analysts predict a $1.1B investment towards IT security in Latin America by 2015.

Today, security is no longer an expense, but a necessity for moving forward. It’s an investment for the future longevity of any company. With this in mind, how can business and IT leaders keep their organizations safe in a mobile world? And what can we learn from the mobile security adoption we are seeing in Latin America?

Recently, I had a chance to participate in a new Future of Mobility podcast with Frost & Sullivan Research Analyst, Bruno Tasco, to discuss the answers to some of these questions and how organizational leaders can address security in a way to reap the benefits of true mobility. The podcast is available for download in Spanish and Portuguese and a summary in English can be found on iTunes.

Here are a couple of considerations for CIOs and CSOs as they evaluate their mobile security strategies and look to future-proof their business.

Prepare for Fast Changes

Talking about mobility or general mobility in our Latin America market is like talking about the past. According to the Cisco Visual Networking Index (VNI), Latin America is experiencing and will continue to see incredible mobile adoption. Read More »

Tags: , , , , , , , , , ,

Behind the WiFi Network @ Mobile World Congress 2014: Setting the Stage

Every year a new attendance record is set at Mobile World Congress by networkers participating from over 200 countries across the globe. This grand attendance of industry-defining vendors, technology enthusiasts and exhibitors triggers an explosive growth in the number of Wi-Fi capable devices being brought to the event. For MWC 2014, Cisco partnered with Fira Gran Via and GSMA to pull off one of the most successful high density Wi-Fi network deployments in the history of global tech events. This blog kicks off a series to provide a glimpse of behind the network, into the design stages, and the course of actions undertaken to implement a robust high density wireless network which served more than 22,000 concurrently connected unique devices and a total of 80,880 devices throughout the event. Full details in whitepaper here.

Setting the Scene

Divided into eight massive exhibition halls, Fira Gran Via covers around 3 million square feet (280,000 square meters) of area which also includes outdoor areas, restaurants, conference rooms, network lounges and a continuous elevated walkway flowing through the entire venue. Higher the environmental complexity, the more fun and challenging it is to achieve the right wireless design for a pervasive network that meets all the needs.

An aerial view of Mobile World Congress 2014 arena at Fira Gran Via, Barcelona

An aerial view of Mobile World Congress 2014 arena at Fira Gran Via, Barcelona

Generally, the physical design of large convention and exhibition halls bear an impish knack of unfavorable conditions for a ubiquitous high density Wi-Fi network, owing mostly to the lofty ceiling heights and construction components. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Not All 802.11ac AP’s are Created Equal: Demand the Full Story

It’s always interesting and often entertaining to observe how competitors promote their products and what they choose to focus on—and more importantly, what they choose not to focus on and what they hope people won’t ask questions about.

Consider yet again how a competitor chooses to position their “purpose built” AP vs. the Cisco Aironet 3700 802.11ac Access Point Series.

This competitor frequently (and somewhat obsessively) points out that its 802.11ac AP has dual “active” 800 MHz cores while the Cisco AP3700 has only one “active” 800 MHz core. This is not completely true since it completely overlooks the fact that the Cisco AP3700 also has a dedicated CPU core and DSP for each radio subsystem.

Furthermore, it also overlooks that the dual “active” cores in the competitor’s AP share 512 MB of DRAM. The single “active” core of the AP3700 has dedicated 512 MB of DRAM. Also each radio subsystem has a dedicated 128 MB DRAM (for 768 MB total DRAM in the AP3700).


Why is all of this important? Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,