Well, CiscoLive Milan 2015 is behind us…..but hopefully the energy and insights you took away from it stay with you – at least till next CiscoLive. Our attendees rated it as our most successful CiscoLive EMEAR ever……and having been to a few of them myself I’d happily agree!
I had the opportunity to speak with many attendees at the World of Solutions, both on the guided tours and also at the mobility demos. The overall impression I got from speaking with you is that you are as excited (and challenged) as we are about the dramatic changes going on in IT. The transformation of IT has moved from hype to reality – and many of you at CiscoLive are the ones being asked by your company to make these changes happen.
Now, whether you attended Live and missed a session – or you were not in Milan at all – you can still check out many of the keynotes and sessions on-line.
One of the highlights was the Enterprise Networking Trends keynote Read More »
If the phrase “multigigabit switching” is not in your personal knowledge base yet, you are not alone – it’s very new. But going forward, you’ll hear a lot about it. Here’s why. Multigigabit switching is an emerging technology that shatters the Ethernet speed barriers found in the LAN infrastructure that most of you have today. It’ll extend the life of your current access LAN for years to come, while helping you get ready for new technology trends that are rapidly approaching.
Instead of being limited to no more than 1 Gbps on a Cat 5e or Cat 6 LAN, which comprises most of existing access LANs, multigigabit switching can support speeds up to 5 Gbps without any required changes to the cabling system. To get a quick idea how useful it is, click the picture below to watch a preview video.
“Why do I need such fast speeds – shouldn’t 1 Gbps be sufficient?” you might ask. Well, the world is moving so fast that new technologies are soon demanding more speed than gigabit. Consider the following use cases: Read More »
This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan.
Like any NBA team, an IT infrastructure begins with a starting lineup of technologies that enable a winning Internet of Everything strategy. In excitement for the NBA All-Star game, Cisco picked its Starting Five for today’s IT environment. Check out our picks below and share your favorites on Twitter, Instagram or Facebook using the tag #ConnectedFan.
A point guard is fast and agile, and responds quickly to pressing demands brought about by unseen difficulties. Any coach can appreciate the “automatic” abilities of a veteran point guard who can sense problems before they happen and eliminate the headaches to improve the overall team’s performance. Like any successful point guard, IoE can help accelerate your organization’s ability to compete in today’s dynamic market. Through the enablement of people, process, data and things, IoE is estimated to drive a 21% increase in corporate profits.
The shooting guard is a high profile position that drives results. The efficient creation, deployment and management of applications in today’s environment greatly affect the bottom line. ACI has the potential to drive high-visibility, high-impact results for the organization that no other technology can make.
Quick and lean, the small forward is the most versatile player who just gets the job done. Like Fast IT, the small forward is in the trenches and works with the team to accomplish bigger goals. Fast IT is Cisco’s operational model for the Internet of Everything, providing organizations with the ability to provide the connectivity that allows IoE to provide a real impact on businesses that didn’t exist just a few years ago.
The power forward is the team’s most powerful traveler, known for mid-range jump shots and the ability to fulfill multiple roles in your lineup. With today’s mobile workforce and the continued proliferation of connected devices, your mobility strategy must be equally expansive and adaptable to effectively meet today’s business demands on your network.
This is your bigman — the tallest player in your lineup who is the anchor for your team’s defense. With a Fast IT model, security enables you to assess, react to, and guard against threats.
Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems management tools. David Bray, the innovative, young Chief Information Officer at the Federal Communications Commission, has noted this exponential change. In a recent interview, Bray estimates that from the current 7 billion networked devices we will grow to upwards of 50 billion networked devices by 2020. Deloitte suggests that by 2020, the IoT is powered by a trillion sensors. And Cisco Systems’ research indicates the economic impact in 2020 is more than $14 trillion. In order to take advantage of their mountain of new data, and the associated range of new applications, agencies will have to merge parts of their existing infrastructure. That converged infrastructure can take two forms – merging data centers themselves or consolidating components within a single optimized computing package. Converging IT infrastructure is the first step in the roadmap to capitalizing on the benefits of the Internet of Everything (I0E). Bray goes even further, arguing that we will need to shift from searching for data to having relevant data find us, to include developing machines that learn our preferences for data as well as when to deliver that data in a form most useful to our work. McCarthy also reviews the disruptive, but hopefully positive, effects of IoT on citizen services, government reaction times, and employees. Read More »
The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without their company’s permission. This downloading behavior increases the attack surface by introducing unapproved or personal mobile applications.
As highlighted in the Cisco Annual Security Report for 2015, mobile applications are a new threat vector that could include malware. The potential for this user-appropriated malware to access corporate resources introduces a lot of new risks that need to be addressed by IT security personnel. At Cisco, we’ve just completed a new integration with Samsung to enable workers to be productive while locking down this expanded attack surface.