If you missed BIO 2012, you missed a lot. The public and private sector came together this week on Boston to examine innovation opportunities to promote economic growth through collaborative research and development projects. The event drew 16,505 industry leaders from 49 states and 65 countries. Boston was host to universities, researchers, state, local and federal government economic development representatives, clinicians and private industries. This was science at its best at a truly global event. Discussions around where the biotech industry is going and how pharma is changing took center stage most of the week.
A positive trend was noted in a special state of bioscience development report that analyzes state and national biotech employment patterns. Despite job losses in the U.S. private sector, it showed that US biotech industry actually added jobs between 2001 and 2010. Throughout the week multiple conversations and meetings took place discussing how the ability to collaborate was a key element to attracting biotech projects. Many countries visited the Cisco booth to discover what they needed to do to create an infrastructure to welcome biotech development. How can governments work together with biotech companies to produce and atmosphere that welcomes and fosters innovation?
Read More »
Tags: #economic growth, biotech, economic development, healthcare, innovation, private sector, public sector, research, university
Mobile used to mean the connectivity service that you bought from your local mobile network operator that freed you from the wire connected to the wall. The rise of Wi-Fi has changed all that. Most mobile devices are now Wi-Fi-enabled (see blog posting “What Is a Mobile Device Anymore?”). Wi-Fi has broken the MNO’s monopoly of providing wireless freedom to consumers. While Wi-Fi may not provide all of the features of mobile cellular technology, consumers now have a choice in how they want to connect their devices wirelessly to the Internet – mobile cellular or Wi-Fi.
To learn more about what consumers are doing with their mobile devices, and how and where they are using them, the Cisco Internet Business Solutions Group (IBSG) recently conducted a survey of U.S. mobile users. Following are our top three findings related to mobile connectivity: Read More »
Tags: Cisco, devices, ereaders, IBSG, mobile, research, Service Provider, Smartphones, survey, tablet PCs, Tablets, wi-fi
By Lionel Walters, Guest Columnist
I grew up in suburban Sydney and enjoyed many of the benefits and conveniences of life in a large and established community. I was close to family and friends, had easy access to basic services such as education and health care, and had an almost unlimited selection of entertainment and retail options. In those blissful days of my youth, I had everything I needed within a distance of a few short kilometers.
My situation changed somewhat when I started my career. For the first time I found myself joining thousands of others in a daily commute to inner Sydney. I’m sure I was not alone in feeling that the two hours of travel each day could be better spent in other pursuits, but like so many before me, I took it in stride because I believed it was the price to pay if I wanted to realize the Australian Dream.
Read More »
Tags: Asia-Pacific, Australia, broadband, Connected Life, IT, research, Tasmania, vni, VNI-SA
Rely on the trusty Internet Business Services Group within the Cisco to come up with insightful research nuggets on how we all really work. Their latest IBSG Horizons Study, “The Everywhere Employee“, gives some fascinating detail on the dollars and sense underlying the idea of working “your way”.
Most interesting to me, of course, is the part about telecommuting. Did you know that 44% of knowledge workers telecommute at least one day a week? And that this one day a week alone saves companies $2,400 a year per employee?
So let’s do the math (my favorite part). In a 10,000 person company, 4,400 employees work one day a week from somewhere else, which translates to a whopping $11 million a year. Enough to pay for some nice executive bonuses!
This pairs nicely with the findings of a study Stanford University professors published in November 2011, “Does Working from Home Work?”. They gave an emphatic “yes” and also ran the numbers specific to their use case (which examined full-time telecommuters), located in Appendix A4.
So how does this relate to video? In every way possible. Not only can you use a nice, sleek EX90 TelePresence unit on your home office desk, you can use Jabber video on your tablet. Or take your laptop into the neighborhood coffeeshop and join the video-based Webex meeting (just please remember to mute: coffee grinders are loud).
See you on video!
Tags: collaboration, jabber, research, ROI, roi of collaboration, telecommuting, TelePresence, video, WebEX
In the recently posted research paper “Off-Path TCP Sequence Number Inference Attack: How Firewall Middleboxes Reduce Security“, Zhiyun Qian and Z. Morley Mao from the University of Michigan discuss a method to try to infer the sequence numbers in use by a TCP connection -- and if successful, how to try to hijack the connection and inject data on it in order to, as an example, steal credentials to web sites (banking, social networking, etc.)
Before talking further about their research, I would like to talk a bit about the Maginot Line. The Maginot Line was a line of fortifications located in France, established after World War I, and roughly following France’s borders with Germany and Italy. The idea behind it: in case of another war with Germany, the line would hold the enemy attacks, giving the French Army the chance to regroup and counterattack. The problem: the line only extended so far up North. So during World War II, and instead of attacking the line from the East, the German army completely bypassed it – by attacking Belgium first and then flanking the line.
So a lot of resources were allocated to set-up defenses for a very specific attack scenario – but that scenario never happened, as an easier way was found to bypass the defenses. And the mere fact of allocating so many resources to counter a specific threat significantly reduced the number of resources available to protect against other threats.
The method posited by Qian and Mao on their research paper strongly reminds me of the assumptions made by the French while building the Maginot Line.
Read More »
Tags: Attack, research, security, TCP