Cisco Blogs


Cisco Blog > Government

Beyond the Internet of Things (IoT): A Commentary

Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems management tools. David Bray, the innovative, young Chief Information Officer at the Federal Communications Commission, has noted this exponential change. In a recent interview, Bray estimates that from the current 7 billion networked devices we will grow to upwards of 50 billion networked devices by 2020. Deloitte suggests that by 2020, the IoT is powered by a trillion sensors. And Cisco Systems’ research indicates the economic impact in 2020 is more than $14 trillion. In order to take advantage of their mountain of new data, and the associated range of new applications, agencies will have to merge parts of their existing infrastructure. That converged infrastructure can take two forms – merging data centers themselves or consolidating components within a single optimized computing package. Converging IT infrastructure is the first step in the roadmap to capitalizing on the benefits of the Internet of Everything (I0E). Bray goes even further, arguing that we will need to shift from searching for data to having relevant data find us, to include developing machines that learn our preferences for data as well as when to deliver that data in a form most useful to our work. McCarthy also reviews the disruptive, but hopefully positive, effects of IoT on citizen services, government reaction times, and employees. Read More »

Tags: , , , , ,

Deliver Stronger Secure Mobility with Cisco and Samsung

The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without their company’s permission. This downloading behavior increases the attack surface by introducing unapproved or personal mobile applications.

As highlighted in the Cisco Annual Security Report for 2015, mobile applications are a new threat vector that could include malware. The potential for this user-appropriated malware to access corporate resources introduces a lot of new risks that need to be addressed by IT security personnel. At Cisco, we’ve just completed a new integration with Samsung to enable workers to be productive while locking down this expanded attack surface.

Read More »

Tags: , , , , ,

Using a Robot to Get Marketing Insights for Your Venue?

NRF 2015 is a wrap. The annual show where anyone who’s anyone in retail goes to learn about the latest ways to grow revenues and improve store operations. Here’s something you may have missed:

Collecto

Meet Collecto. Your one stop shop for all marketing Read More »

Tags: , , , ,

Three Dimensions that Influence Location Quality

Since the earliest maps, location accuracy has always been important. Just one degree off on the high seas and the seafaring navigator could be landing in Cuba instead of Florida. As we progress from GPS to indoor location, the quality of location accuracy is no less critical.

To define the quality of location, we really need to understand the variables that influence location. This is especially true with mobile devices in the mix.

Quality of location accuracy has three dimensions:

  1. Location precision
  2. Refresh rate
  3. System latency

These three vectors are functions of how well the infrastructure is engineered and how the Read More »

Tags: , , , , , , ,

Unleash True Mobility with an Innovative IT Infrastructure

There’s an influx of conversation focused on Bring Your Own Device, the consumerization of IT and how organizations can cope in today’s multi-device environment.

IT and business leaders are being asked to securely connect thousands of devices competing for network resources; both wired and wireless while simultaneously supporting greater productivity in the workplace.

With this in mind, how can mobility be addressed at an infrastructure level to tackle challenges and enable opportunities for organizations and employees?

Recently, I participated in a Future of IT podcast episode with Craig Mathias, Principal at the Farpoint Group. We discussed how an IT infrastructure is key to enabling innovation and the role seamless mobility and why organizations should future-proof their mobility strategy through an infrastructure-centric approach.

One central theme from our discussion focused on the need for simple, intelligent, secure IT infrastructure. Read More »

Tags: , , , , ,