“Fashion is not something that exists in dresses only. Fashion is in the sky, in the street, fashion has to do with ideas, the way we live, what is happening.” ― Coco Chanel
I’ve always loved this quote by French fashion designer and founder of the Chanel brand. It reminds me of the old adage – we are what we wear.
But in a GigaOm article and an InfoWorld article this week, this adage is taken to the next level. The news coverage discusses the future possibilities of us wearing sensors and transmitters to route and relay data.
For example, our clothes and accessories will dictate how our information is communicated and received. When you check into a hospital, your outfit du jour will connect with the hospital network to finalize the check-in process and provide your doctors and nurses with crucial information regarding your health. With such capabilities, hospitals would be able to track and manage the flow of incoming patients and detect who is in need of immediate attention.
To take this idea a step further, not only will our “wearables” just collect data, they will create makeshift unified networks. Perhaps instead of simply connecting devices and communicating through networks, humans will form and shape these vast networks by what we wear and the way we live.
To create such a connected human network, Internet Protocol Version 6 (IPv6) addresses will need to be issued to create a unique-to-each person system of data gathering and sharing. I’ve long been an advocate for issuing IPv6 addresses to everyone in order to create a global ID. This could be a way of updating the antiquated social security number system in our country.
In my upcoming keynote address at Cisco Live!, I’ll be discussing more about this subject. I’m looking forward to sharing more of my thoughts about what life will look like when the power of connections create an optimized wireless network system.
Follow me at @DaveTheFuturist and join the conversation: #IoE #InternetofEverything #IPv6
We were pleased to accept a Small Cell Industry Award last night for small cell design and technology innovation for the Cisco Management Heartbeat Server (CMHS). We were particularly pleased because the CMHS is an example of a solution our engineering team developed in response to some real world issues we were seeing in our customer’s small cell network – one of the largest small cell networks deployed today.
Above: Partho Mishra,VP/GM, Small Cell Technology Group, Cisco
When small cells are deployed in the hundreds of thousands, there’s a need to scale the monitoring of the access points so that operations are simplified while customers are kept happy. The CMHS monitors connectivity and service status in real-time with ongoing heartbeats, and provides Read More »
Shortly before we released this year’s Cisco VNI Forecast 2012-2017* on May 29th, I had a chance to contemplate the implications behind all the report’s data. The Forecast makes it clear that IP traffic will continue to grow “in leaps and bounds” through 2017, but there is so much more information lying hidden within the report.
* an annual projection of global Internet Protocol (IP) traffic, now in its seventh year,
used by companies, analysts, media, academia, and governments wordlwide.
For a quick overview of this year’s findings, read Thomas Barnett’s VNI blog post.
Here are six significant conclusions that came about in my review of VNI’s findings and what they mean for the future functioning of the Internet: Read More »
As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure IoT/M2M system. As the use of IP networks are employed, IoT/M2M applications have already become a target for attacks that will continue to grow in both quantity and sophistication. Both the scale and context of the IoT/M2M make it a compelling target for those who would do harm to companies, organizations, nations, and people.
The targets are abundant and cover many different industry segments. The potential impact spans from minor irritant to grave and significant damage and loss of life. The threats in this environment can be similarly categorized as those in the traditional IT environments. It’s useful to consider general platform architecture when discussing IoT security challenges. Below is the platform architecture that uses to frame IoT/M2M discussions.
While many existing security technologies and solutions can be leveraged across this architecture, perhaps especially across the Core and Data Center Cloud layers, there are unique challenges for the IoT. The nature of the endpoints and the sheer scale of aggregation in the data center require special attention.
The architecture is composed of four similar layers to those described in general network architectures. The first layer of the IoT/M2M architecture is comprised of Read More »
Orchestras are often used as metaphors for all sorts of things--organizational structure, planning sessions and even families.
Have you been to the symphony recently? Musicians sit in a regimented ordering around the stage. The concertmaster sets the tune. The conductor lifts the baton. And then, with the pull of a bow across a string, or breath across a mouthpiece, the music begins. Throughout the performance, each section of the orchestra plays a specific part – either separately or together – to create a harmonized work of art.
The prestigious Czech National Orchestra, known for its versatility, lived up to its reputation during a recent performance (for a new BNP product called Hello Bank!). They put their instruments – some hundreds of years old – aside in favor of newer, more common instruments: smartphones and tablets.