Cisco Blogs

Cisco Blog > Internet of Everything

Ask The Internet of Everything Futurist: “When Will We Get Our Flying Cars?”

Flying cars. Robots. Biometric devices. These are just some of the things I get to think about and research in my role as Cisco’s Chief Futurist. As the Internet of Everything continues to connect more people, process, data, and things it is exciting to think about the possibilities.

Looking at life 50 years ago can give us perspective about just how far we have come. In 1963, push-button telephones were first introduced and the world’s population was 3.2 billion, less than half of what it is today. The next 50 years will be just as revolutionary and life changing, perhaps even more so.

Read More »

Tags: , , , , , , , , ,

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Unlocking the Value of Data in Motion Through Analytics

Kiran-Mattyola-mabadejeWritten By Kiran Matty, Marketing Manager, and Ola Mabadeje, Marketing Manager

If “Big Data” is crude oil, then Analytics is its refinery. According to a Cisco IBSG report, “if ‘crude” data can be extracted, refined, and piped to where it can impact decisions, its value will soar”. The trends, patterns, and insights that can be gathered from the various sources of Big Data are virtually limitless. However, this blog shall primarily focus on the analytics that can be generated by refining i.e. analyzing the data that’s resident in a mobile network and is largely untapped.

According to Cisco VNI, the number of connected devices will be three times the global population by 2017 and the global IP traffic will also increase threefold in the same time frame. Mobile Networks have not only been primed to sustain this onslaught but have also transformed into a programmable platform that can collect, correlate, and contextualize data rapidly. Network data, Policy, and Analytics interplay in a multitude of ways and form the basis of Data in Motion that’s at the heart of network monetization.

Hidden opportunities exist in the market gaps

As you might be aware, CPM (Cost per Mille) for mobile Ads is lower than that of other advertising media such as online, television, etc. This is because mobile Ads are generally untargeted, which leads to ineffective Ad campaigns, and could be attributed to a large extent to the lack of contextual awareness vis-à-vis location, demographics, browsing history, network conditions, screen size, etc. Although market researchers have perfected the measurements for other advertising media, they haven’t yet cracked the nut for mobile and the mobile metrics remain fuzzy at best which is impeding the flow of advertising dollars to mobile. On the other hand, as much as we love applications like Apple Siri and FaceTime, Angry Birds, etc., and devices like the Apple iPhone, they have turned out to be an operational nightmare in certain cases for the mobile operators around the world because of the data and signaling Tsunami that they can potentially bring about. This is due in part to lack of network analytics that can predict such surges in the network traffic with reasonable accuracy to allow for timely management of the network in terms of network capacity and bandwidth. This would eventually lead to operational efficiency and hence cost savings. Further, think about Internet of Everything and the 50 billion devices that would come online by 2020!

Mobile network operators are well positioned to address the above pain-points. With access to millions of subscribers, they can predict network and consumer behavior with high degree of accuracy quite simply because of the law of large numbers. Unlike many pure-play analytics vendors, network operators have direct access to data from a variety of sources such as CDN (Content Delivery Network), devices, applications, network billing and charging systems, not to mention the various mobile network elements. Some may even have access to subscriber Wi-Fi data. Lastly, many have the cloud infrastructure that’s needed for analyzing data at a bigger scale.

Translating opportunities to $$$ Read More »

Tags: , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,