research

October 20, 2014

DIGITAL TRANSFORMATION

Academia and Industry Come Together For The 1st Annual IoTWF Research Symposium

1 min read

This year we launched the first annual Research Symposium at the IoT World Forum in Chicago. This Symposium brought together scholars, industry leaders and visionaries from across the world to discuss how academia and industry can partner to address the challenges and the opportunities that IoT presents. We were delighted to be joined by impressive […]

June 25, 2014

DATA CENTER

What Cisco’s Top Cloud Infrastructure Means to You

2 min read

Arguably 2014 is already turning out to be a big year for cloud. Some have even called it “The Year of the Cloud.” Cloud implementation continues to play an essential role in overall IT strategy: A recent report says 80% of cloud adopters saw improvements within 6 months of moving to the cloud. According to […]

Next Generation Mobile Monetization

3 min read

As I described in my previous blog How the Mobile Industry Will Make Money in the Future, the history of the mobile industry has involved huge and successful waves of revenue growth.  Lucrative revenues from the first wave of voice and the second messaging wave have crested and are now in decline.  Mobile data access […]

How Will Mobile Operators Make Money in the Future?

3 min read

The mobile market continues to evolve at a blindingly fast pace. It seems as though new faster, sleeker, and more powerful mobile devices are launched every day. And new categories of mobile devices are created almost overnight. The number of applications available to run on these revolutionary new mobile devices is staggering, numbering in the […]

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

3 min read

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

6 min read

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have […]

Understanding the Changing Mobile User

1 min read

Mobile communications today is virtually indistinguishable from the first mobile call that was made four decades ago.  We have gone from monster handsets to pocket-sized portable computers.  Mobile communications has become an essential part of our daily lives.  For mobile operators and other companies operating in this space it is essential to know the facts […]

April 17, 2014

SECURITY

Not If, but When: The case for Advanced Malware Protection Everywhere

3 min read

A recent Bloor Research Market Update on Advanced Threat Protection reminds us of something that many security vendors have long been loath to acknowledge: traditional, point-in-time technologies, like anti-virus or sandboxes, are not entirely effective when defending against complex, sophisticated attacks. This is due to something we have said before and we will say again: […]