Cisco Blogs


Cisco Blog > Cisco Interaction Network

Interop, Vegas…Rear View Mirror

May 13, 2013 at 3:37 pm PST

My two favorite days for a Vegas conference: arriving and leaving. Everything in between is a foot numbing, sleepless blur. But we had a great time! It was cool to be on stage hanging with our Cisco friends and getting to re-unite with old competitors, many of which are former peers.

We did not have as many videos as usual for a trip like this since we were doing the ‘stand and deliver’ thing. The topics were good however.

Jacob Rapp on Unified Access trends in the Data Center

Mark Royle catching us up on Unified Call Control

Bill and Ziad: Global Security Intelligence

This was a two-fer that Jimmy Ray and I tag teamed…I feel the urge to call it ‘Unified’ something just to complete my corporate marketing bingo card….but I did giggle a bit knowing that we stood in front of the ‘MOC SOC’ (Mock Security Operations Center). I am not even sure why I find that funny.

Please check out the Success Factors video we did with Marlowe Fenne. . I blogged about Unified Access (BINGO!) yesterday.

My work here is done.

Thanks for watching!

Robb


Twitter: @TechWiseTV, @robbboyd, @jimmyray_purser

TechWiseTV on YouTube

Keep up behind the scenes on our facebook fan page


Tags: , , , , , , , ,

Have You Registered for Centralize Policy, Control and Enforcement May 15th?

Activate the IT Transformation with Unified Access: Part 4 --  Centralized Policy, Control, and Enforcement 

Wednesday, May 15, 2013  10am-11am PDT     |       Register Now

Don’t miss the next in line of our five-part Unified Access Webinar Series  on May 15th to hear how organizations in education and healthcare rely on Cisco Identity Services Engine (ISE) to provide the identity enforcement and secure access control that allow employees, contractors, students, faculty, and guests (choose the user) to use their own devices on the network. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

First Look – The Cisco NOC Model For Wired and Wireless

IMG_2069

Your NOC Your Way at Interop

Over the last few weeks, we’ve started to unpack some of the focus-group discussions we’ve recently had with hundreds of IT professionals.  The goal of these focus groups was to help as Cisco continues to ensure we’re meeting our customers’ needs.  We’ve discussed some of the top priorities for network managers including, keeping users happy, reducing the dreaded help desk calls, and improving ROI while reducing overall operational costs.

These and other top concerns for IT professionals were paired up with Cisco and partner technologies to show real solutions.  These solutions have been on display at Interop at the Cisco booth in our NOC area and will likewise be at the Borderless Networks booth at CiscoLive Orlando.  Jimmy Ray Purser and Rob Boyd caught up with the architect of this NOC, Marlowe Fenne to get an introduction to the Unified Access solution.

In this video you’ll see quick ways to: Read More »

Tags: , , , , , , ,

What Einstein’s Theory of Relativity and the Internet of Things have in common

Cisco published earlier this week the 2013 Cisco Global IT Impact Survey, exploring the relationship between IT and the business goals of the companies they support.  Among other things, 42 percent of those interviewed responded that they know about the Internet of Things, “as well as I know Einstein’s Theory of Relativity.” In other words, beyond a passing knowledge of e=mc2, the relevance of the Internet of Things to IT is about as illuminated as a black hole.

Does that really matter at this point? you might ask.  Isn’t the Internet of Things about Nike FuelBands and talking toasters?  In fact, a lot of what we call “industrial automation” or “safety and security” is the leading edge of the Internet of Things.  It’s already here today, called into the service of greater efficiency, productivity, and safety.  This is “operational technology” instead of “information technology”:  in other words, technology that directly monitors or controls physical objects and processes, such as assembly lines on a factory floor.

This has enormous implications for IT:

1. Security threats go from the merely cyber to the cyber-physical. Gartner summed it up nicely in the WSJ last week.  And let’s not even talk about Shodan

2. Beyond BYOD.  The consumerization of personal electronic devices transformed the enterprise networking landscape.  IT adapted to the new security threats posed, figured out how to associate multiple devices to a single user, etc.  Now imagine “bring your own programmable logic controller.”

3. Redefining networking scalability and data management.  And we thought video was a huge driver of traffic on the network.  SAP and Harris Interactive recently estimated that 4 billion terabytes of data will be generated this year alone. (For some idea of the scale, take a single IoT use case — smart meters.  Jack Danahy estimated 400MB of data per year.  Not much, you say? Multiply that by, say, 1 million households, and you get 400 terabytes already. For a single use case. In one city.)

IT has much to offer, and should.  As proprietary connectivity networks converge onto TCP/IP, IT can bring its expertise in securing IP-based networks. With experience in deploying cloud services, IT can bring in network management best practices.  And with expertise in software-defined networking, IT can help re-architect networks to support immense scale, real-time requirements, analytics at the edge, and more.

From the outside-in, the Internet of Things may seem like a fast-moving train that’s zooming by too fast to board. But if you’re in IT, get on board: you’ll experience relativity and relevance.

Tags: , , , , , ,

See How Organizations Use Cisco ISE to Centralize Policy and Secure Access

Activate the IT Transformation with Unified Access: Part 4 --  Centralized Policy, Control, and Enforcement 

Wednesday, May 15, 2013  10am-11am PDT     |       Register Now

With more users and devices being added to your network every day, unified access and central policy control have become critical needs. Your organization isn’t alone.

Attend our next live workshop  on May 15th to hear how organizations in education and healthcare rely on Cisco Identity Services Engine (ISE) to provide the identity enforcement and secure access control that allow employees, contractors, students, faculty, and guests (choose the user) to use their own devices on the network. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , ,