Cisco Blogs


Cisco Blog > SP360: Service Provider

Unlocking the Value of Data in Motion Through Analytics

Kiran-Mattyola-mabadejeWritten By Kiran Matty, Marketing Manager, and Ola Mabadeje, Marketing Manager

If “Big Data” is crude oil, then Analytics is its refinery. According to a Cisco IBSG report, “if ‘crude” data can be extracted, refined, and piped to where it can impact decisions, its value will soar”. The trends, patterns, and insights that can be gathered from the various sources of Big Data are virtually limitless. However, this blog shall primarily focus on the analytics that can be generated by refining i.e. analyzing the data that’s resident in a mobile network and is largely untapped.

According to Cisco VNI, the number of connected devices will be three times the global population by 2017 and the global IP traffic will also increase threefold in the same time frame. Mobile Networks have not only been primed to sustain this onslaught but have also transformed into a programmable platform that can collect, correlate, and contextualize data rapidly. Network data, Policy, and Analytics interplay in a multitude of ways and form the basis of Data in Motion that’s at the heart of network monetization.

Hidden opportunities exist in the market gaps

As you might be aware, CPM (Cost per Mille) for mobile Ads is lower than that of other advertising media such as online, television, etc. This is because mobile Ads are generally untargeted, which leads to ineffective Ad campaigns, and could be attributed to a large extent to the lack of contextual awareness vis-à-vis location, demographics, browsing history, network conditions, screen size, etc. Although market researchers have perfected the measurements for other advertising media, they haven’t yet cracked the nut for mobile and the mobile metrics remain fuzzy at best which is impeding the flow of advertising dollars to mobile. On the other hand, as much as we love applications like Apple Siri and FaceTime, Angry Birds, etc., and devices like the Apple iPhone, they have turned out to be an operational nightmare in certain cases for the mobile operators around the world because of the data and signaling Tsunami that they can potentially bring about. This is due in part to lack of network analytics that can predict such surges in the network traffic with reasonable accuracy to allow for timely management of the network in terms of network capacity and bandwidth. This would eventually lead to operational efficiency and hence cost savings. Further, think about Internet of Everything and the 50 billion devices that would come online by 2020!

Mobile network operators are well positioned to address the above pain-points. With access to millions of subscribers, they can predict network and consumer behavior with high degree of accuracy quite simply because of the law of large numbers. Unlike many pure-play analytics vendors, network operators have direct access to data from a variety of sources such as CDN (Content Delivery Network), devices, applications, network billing and charging systems, not to mention the various mobile network elements. Some may even have access to subscriber Wi-Fi data. Lastly, many have the cloud infrastructure that’s needed for analyzing data at a bigger scale.

Translating opportunities to $$$ Read More »

Tags: , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

Collaboration and Interdependency, Anywhere

Change is afoot on a big scale and fast. We see it around us, we feel it, we talk about it, we experience it. We even know its name — the Internet of Everything (IoE).

Briefly put, IoE is a new way of connecting people, processes, data, and things.  Looking back, you can almost say that the Age of the Internet and of the Internet of Things have merely been preliminary stages designed to lead us where we are today: on a course that radically changes how we interact with the world around us. We have started on a new exciting journey. At every step we are uncovering new ways to create and share value, not just for the organizations we work for but in our personal lives as well.

Let’s take the world of business first.  It’s changing dramatically as we speak.  Here are a few leading transformational trends the effects of which I’m sure you have experienced yourselves  in one way or another.

We Are More Interdependent

Marthin_CL_Slide

More and more expert surveys are finding that employees are working more collaboratively  now than they were in the not very distant past. For instance, according to research from the Corporate Executive Board  (CEB), two thirds of employees are doing more collaborative work today than they were just three years ago.  Collaboration technology is a big part of making us increasingly effective in this environment, delivering benefits including those that help us become: Read More »

Tags: , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,