Orchestras are often used as metaphors for all sorts of things--organizational structure, planning sessions and even families.
Have you been to the symphony recently? Musicians sit in a regimented ordering around the stage. The concertmaster sets the tune. The conductor lifts the baton. And then, with the pull of a bow across a string, or breath across a mouthpiece, the music begins. Throughout the performance, each section of the orchestra plays a specific part – either separately or together – to create a harmonized work of art.
The prestigious Czech National Orchestra, known for its versatility, lived up to its reputation during a recent performance (for a new BNP product called Hello Bank!). They put their instruments – some hundreds of years old – aside in favor of newer, more common instruments: smartphones and tablets.
Cisco Prime Infrastructure is a network management tool that helps accelerate the rollout of new services. It also provides highly secure access and management of mobile devices, making bring- your-own-device (BYOD) access a reality for corporate IT. Tightly coupling client awareness with application performance visibility and network control, Cisco Prime Infrastructure helps ensure an uncompromised end-user experience. Deep integration with the Cisco Identity Services Engine (ISE) further extends this visibility across security and policy-related problems. It presents a complete view of client access issues with a clear path to solving them.
Whether you are well-versed with Prime Infrastructure and want a sneak peek at Prime Infrastructure 2.0 (yes, 2.0) OR you’re new to Cisco’s network management suite and just want to feel out the options, join us at our webinar June 5th (Click to Register) to learn about how Unified Access streamlines converged user access management. We have lined up an early preview of the latest Cisco Prime Infrastructure that we’ll showcase in action with a live demonstration. Read More »
Visualize this: nearly half the Earth’s population – 3.6 billion people – connected to the Internet for communication, commerce, education, information, and entertainment. Think that’s too futuristic? Think again. By 2017, less than five years from today, that will be our reality.
This prediction is one of several key findings from the newly released Cisco Visual Networking Index, 2012-2017, a highly regarded annual forecast of global Internet Protocol (IP) traffic now in its seventh year.
Let’s explore further the Internet of 2017, as projected by the updated VNI Forecast.
By 2017, IP traffic volumes and regional growth will continue to impress: Read More »
This is the first in a two-part blog series that examines the opportunities that cloud-based services offer to law enforcement agencies—along with the challenges of this fundamental shift in the way information resources are managed.
Police forces have a well-established culture of owning and managing systems directly founded on concerns about security and control of access to information. Three trends, however, make this position unsustainable:
Traditional models for acquiring and running systems, which slow the pace of innovation
Pressure to reduce costs
Increasing need to form partnerships with other police agencies, public-sector bodies, and the private sector. Partnership depends on information sharing and open approaches to developing systems.
One of the most radical—and successful—cloud-based public-safety and security services is Facewatch. Using a network-based model, Facewatch provides an online reporting tool that allows U.K. businesses and citizens to report crimes and attach video evidence. The service enables crime victims to cancel credit cards instantly through Facewatch’s partners; allows users to share images of wanted people; and provides a channel for feedback from the police on the outcomes of cases.
Facewatch offers immediate benefits to the public, businesses, and law enforcement:
Citizens: ease of reporting and rapid management of associated processes
Businesses: less time required to deal with incidents
Law enforcement: reduces or eliminates the need to interact directly with premises to recover video footage
For all users, there is greater transparency about processes and reporting on outcomes, as well as the ability for communities to share information about wanted persons and crime trends.
I was in the grocery store when I realized that something new was going on: our entrance into the era of computing that I call convergence — the convergence of man and machine – is already changing the face of collaboration.
In the recent past, collaboration did a great job of connecting people to people through video, voice and the virtual workspace, which improved productivity and the intimacy of connection. A video chat, whether for business or pleasure, communicates more than a simple phone call. Add a collective workspace and you’re off like a rocket. In this collaboration between people, the technology served as a conduit.
But now I’m sensing the beginning of something different: collaborating with the machine itself. Here’s an example: I’m pretty focused on maintaining my health and my weight so when I go to the grocery store, I have a health app that’s connected to my online health profile and running with augmented reality. When I show my phone my choice of broccoli, it votes thumbs up; when I grab my favorite cookies, it displays the calories and cholesterol they will add to my daily intake, notes that it’s contrary to medication I’m on, and advises me against it. (Of course when I get to the beer aisle, I over-ride its displeasure: this is collaborative, after all, not dictatorial!)