Cisco Blogs


Cisco Blog > Internet of Everything

The Secret to Mobility in a Multiple Device World

The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark.

Not so long ago, getting on the Internet was a static experience. It was a desktop PC tethered to the company network, or for the elite the “double, double, toil and trouble” of a modem firing up, followed by a long wait for a sluggish home connection.

The new era of mobility takes computing beyond the PC’s limitations, surpassing it by a long shot. It’s becoming less about devices than what you can do as the workspace evolves, offering adaptability and choice based upon who you are, where you are, and what you need to accomplish. Whether it’s a quick phone call, a web conferencing session, instant messaging, or file sharing, removing the limitations of location and devices lets organizations work together better and make decisions faster.

What is driving these changes? When people think of mobility, they usually focus on the devices used to access the net. Slick new smart phone displays, multi-touch tablet screens, and futuristic industrial designs are definitely eye-catching. Consumers are snapping up these new devices, and companies are embracing bring-your-own-device (BYOD) programs. But what’s happening behind the scenes and on the screens is just as important—if not more important.

Read More »

Tags: , , , , , , , , , , , ,

How Big Data Will Save the Physical Store

Reports of the physical retail store’s death have been greatly exaggerated. As a recent survey from the Cisco® Internet Business Solutions Group (IBSG) found, 93 percent of products sold in the United States are still bought in brick-and-mortar locations. And while technology has upended many product categories and more than a few individual retailers, it simultaneously creates opportunities for retailers to continue to make the store shopping experience both relevant and compelling. Big Data in the store is key to achieving this.

Read More »

Tags: , , , , , , , , , , , , , ,

Incredible Outcomes in Education from New Technologies

StudentssCisco’s Virtual Forum for Education Leaders is this Tuesday 3/19. It will be an exciting virtual Forum with information about important trends that are happening for both K-12 and Higher Ed. Of particular interest for both Academic and IT leaders is how technology is supporting and increasing learning outcomes.

Great applications like on-line learning, flipped classrooms, BYOD, and lecture capture are all being implemented by our schools and universities and delivering great success. They are helping us execute pedagogical changes that provide for individualized learning, classroom collaboration and helping us reach new markets in Higher Ed. These new technologies are even positively impacting the business and administrative areas at our schools and universities.

Read More »

Tags: , ,

Move Over SDN – NFV Taking the Spotlight

Energetic debates of what SDN is and the expanding scope of what it can do for our customers continue to race along in a chaotic frenzy. In addition, the overall SDN market is somewhat fragmented in terms of both vendor positioning and marketing.  Collectively, the conversation really comes down to improving business agility and the efficiencies gained in bringing new services to market. Essentially, the goal is to enable operators to make their networks and services go much faster.

While software defined networking (SDN) technologies continue to drive significant entropy in our industry, Network Function Virtualization (NFV) recently rose up and became a key focus of many discussions at Mobile World Congress in Barcelona last month. Read More »

Tags: , , , , , , , , , , , , , , , , , , ,

Three Transitions Driving Net-Centric Security

When I think about IT security, I don’t immediately start thinking about threats, hackers and countermeasures, but begin with what is happening to IT in general. Right now, the three big megatrends in IT can be summed up in three words: virtualization, collaboration, and mobility. Unfortunately, it’s become something of a Newtonian principle that any action driving information technology forward generates an equal or greater counteraction by hackers to corrupt and exploit the new technology. I also find it disconcerting that at any given time, the most aggressively marketed “solutions” to IT security problems represent a trailing indicator of what cyber criminals are actually doing to raise hell. Read More »

Tags: , , , , , , , ,