This week, Cisco and NBA celebrate how the Internet of Everything (IoE) powers the fan experience. Thanks to advancements in technology, we’re changing courtside connectivity between the game, the player and the fan.
Like any NBA team, an IT infrastructure begins with a starting lineup of technologies that enable a winning Internet of Everything strategy. In excitement for the NBA All-Star game, Cisco picked its Starting Five for today’s IT environment. Check out our picks below and share your favorites on Twitter, Instagram or Facebook using the tag #ConnectedFan.
A point guard is fast and agile, and responds quickly to pressing demands brought about by unseen difficulties. Any coach can appreciate the “automatic” abilities of a veteran point guard who can sense problems before they happen and eliminate the headaches to improve the overall team’s performance. Like any successful point guard, IoE can help accelerate your organization’s ability to compete in today’s dynamic market. Through the enablement of people, process, data and things, IoE is estimated to drive a 21% increase in corporate profits.
The shooting guard is a high profile position that drives results. The efficient creation, deployment and management of applications in today’s environment greatly affect the bottom line. ACI has the potential to drive high-visibility, high-impact results for the organization that no other technology can make.
Quick and lean, the small forward is the most versatile player who just gets the job done. Like Fast IT, the small forward is in the trenches and works with the team to accomplish bigger goals. Fast IT is Cisco’s operational model for the Internet of Everything, providing organizations with the ability to provide the connectivity that allows IoE to provide a real impact on businesses that didn’t exist just a few years ago.
The power forward is the team’s most powerful traveler, known for mid-range jump shots and the ability to fulfill multiple roles in your lineup. With today’s mobile workforce and the continued proliferation of connected devices, your mobility strategy must be equally expansive and adaptable to effectively meet today’s business demands on your network.
This is your bigman — the tallest player in your lineup who is the anchor for your team’s defense. With a Fast IT model, security enables you to assess, react to, and guard against threats.
Tags: FastIT, Internet of Everything, Joseph Bradley, mobility, security
Shawn McCarthy, Research Director at IDC Government recently penned an insightful blog on IoT. Titled “Beyond the Internet of Things: How Convergence Can Help Governments Support Their Rising Tide of New Devices,” the blog notes with more devices producing more data, government agencies have been working to add more storage, security, network bandwidth, and systems management tools. David Bray, the innovative, young Chief Information Officer at the Federal Communications Commission, has noted this exponential change. In a recent interview, Bray estimates that from the current 7 billion networked devices we will grow to upwards of 50 billion networked devices by 2020. Deloitte suggests that by 2020, the IoT is powered by a trillion sensors. And Cisco Systems’ research indicates the economic impact in 2020 is more than $14 trillion. In order to take advantage of their mountain of new data, and the associated range of new applications, agencies will have to merge parts of their existing infrastructure. That converged infrastructure can take two forms – merging data centers themselves or consolidating components within a single optimized computing package. Converging IT infrastructure is the first step in the roadmap to capitalizing on the benefits of the Internet of Everything (I0E). Bray goes even further, arguing that we will need to shift from searching for data to having relevant data find us, to include developing machines that learn our preferences for data as well as when to deliver that data in a form most useful to our work. McCarthy also reviews the disruptive, but hopefully positive, effects of IoT on citizen services, government reaction times, and employees. Read More »
Tags: #CiscoConvergence, Big Data, govtech, Internet of Everything, mobility, security
The growing use of mobility is a new threat vector in the extended network. It’s particularly complex to secure and manage when tablets and smartphones are used for both personal and business needs. The Ponemon 2014 Security Impact of Mobile Device Use by Employees study notes that 66 percent of users download mobile apps without their company’s permission. This downloading behavior increases the attack surface by introducing unapproved or personal mobile applications.
As highlighted in the Cisco Annual Security Report for 2015, mobile applications are a new threat vector that could include malware. The potential for this user-appropriated malware to access corporate resources introduces a lot of new risks that need to be addressed by IT security personnel. At Cisco, we’ve just completed a new integration with Samsung to enable workers to be productive while locking down this expanded attack surface.
Read More »
Tags: cisco annual security report, Cisco Annual Security Report 2015, Cisco AnyConnect Secure Mobility Client, mobile security, mobility, security
NRF 2015 is a wrap. The annual show where anyone who’s anyone in retail goes to learn about the latest ways to grow revenues and improve store operations. Here’s something you may have missed:
Meet Collecto. Your one stop shop for all marketing Read More »
Tags: Big Data, cmx, collecto, marketing insights, mobility
Since the earliest maps, location accuracy has always been important. Just one degree off on the high seas and the seafaring navigator could be landing in Cuba instead of Florida. As we progress from GPS to indoor location, the quality of location accuracy is no less critical.
To define the quality of location, we really need to understand the variables that influence location. This is especially true with mobile devices in the mix.
Quality of location accuracy has three dimensions:
- Location precision
- Refresh rate
- System latency
These three vectors are functions of how well the infrastructure is engineered and how the Read More »
Tags: Cisco, cmx, connected mobile experiences, GPS, location accuracy, mobility, mobility services engine, mse