Cisco Blogs


Cisco Blog > Internet of Everything

The Secret to Mobility in a Multiple Device World

The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark.

Not so long ago, getting on the Internet was a static experience. It was a desktop PC tethered to the company network, or for the elite the “double, double, toil and trouble” of a modem firing up, followed by a long wait for a sluggish home connection.

The new era of mobility takes computing beyond the PC’s limitations, surpassing it by a long shot. It’s becoming less about devices than what you can do as the workspace evolves, offering adaptability and choice based upon who you are, where you are, and what you need to accomplish. Whether it’s a quick phone call, a web conferencing session, instant messaging, or file sharing, removing the limitations of location and devices lets organizations work together better and make decisions faster.

What is driving these changes? When people think of mobility, they usually focus on the devices used to access the net. Slick new smart phone displays, multi-touch tablet screens, and futuristic industrial designs are definitely eye-catching. Consumers are snapping up these new devices, and companies are embracing bring-your-own-device (BYOD) programs. But what’s happening behind the scenes and on the screens is just as important—if not more important.

Read More »

Tags: , , , , , , , , , , , ,

Cloud for Local Government Global Blog Series: Connecting “The Last Frontier”…

March 21, 2013 at 8:18 am PST

While Alaska is the largest state, it’s the least densely populated. With local government agencies and departments dispersed across more than 600,000 square miles, creating a reliable and efficient statewide IT infrastructure is no easy feat.

When Corey Kos became the state of Alaska’s enterprise architect in 2010, he set out on a mission to create an infrastructure that would deliver IT services via private cloud, reducing overall expenses and allowing Alaska’s government employees to work efficiently. Three years later Kos has exceeded his objectives and successfully connected ‘The Last Frontier.’ Read More »

Tags: , , , , ,

March 2013 Cisco IOS Software Security Advisories: T-7 and Counting!

It’s that time of year again, folks. On Wednesday of next week, the Cisco Product Security Incident Response Team (PSIRT) will release the first Cisco IOS Software Security Advisory Bundled Publication of 2013. As a reminder, Cisco releases bundles of Cisco IOS Software Security Advisories on the fourth Wednesday of March and September each calendar year. As is the case with the vast majority of our security advisories, vulnerabilities scheduled for disclosure in the upcoming bundle will normally have a Common Vulnerability Scoring System (CVSS) Base Score from 7.0 to 10.0.

Read More »

Tags: , , , , ,

Collaboration and the Internet of Everything

Kiss your old running shoes good-bye. Change is constant. And technology has always been about change and convergence. But the massive, global-scale change occurring now is happening at rates faster than anyone ever predicted.

stinky shoesAnd this is disruptive change. It’s change that requires you to act, adapt, and move quickly to take advantage of the opportunities that come with it.

Cisco has a long history of showcasing disruption and convergence at Enterprise Connect since the early days of VoiceCon. TDM to voice over IP; the convergence of voice, video, and data; unified communications: In each case we saw how converging technology and collaborative behavior has helped disrupt the traditional way of doing things and created more value for businesses and users.

Today technology is creating disruption in unexpected places.

Read More »

Tags: , , , , , , ,

Addressing Ongoing Security and Compliance Requirements

Organizations continue to face threats to their brands, reputations, and profits from attacks on their information systems. The Payment Card Industry Data Security Standard (PCI DSS) is designed to protect credit card information. During my five-year tenure at Cisco, I’ve been focused on PCI. The challenge that we have faced when deploying a solution to help customers become compliant and maintain a secure enterprise is the complexity. At the various trade shows that I have attended to discuss PCI, I have encountered a lot of head-shaking and looks of disgust as I bring up the topic of PCI. To help simplify PCI compliance, Cisco has released the latest Cisco Compliance Solution for PCI DSS 2.0 to make it easier for organizations to maintain a secure, compliant network.

Read More »

Tags: , , , ,