In just a couple of days, many of you will be taking planes, trains, and automobiles to sunny Barcelona. I see that the weather forecast is for 65ºF / 19ºC for the opening day of Mobile World Congress. I really appreciate how the MWC timeframe has gradually crept closer to Spring over these past few years. Maybe you are not paying attention to the weather as much as me. You would if you had the same view that I have out my window, where it is currently 20ºF / -6ºC. Yes, I should clean off my roof. But I do like that my garage roof serves as an historical record of the unmerciful winter we have had here in Boston in northeast U.S., where we have had over 100 inches / 250 cm of snow so far.
So my main point is, if you don’t go to MWC 2015 next week, you are going to miss Read More »
Tags: mobile world congress, mobility, mwc, Service Provider, virtualization, VoWifi, wifi
In the more than ten years, I have worked in developing security solutions, I have witnessed the steady evolution of security threats and the incredible strides made to combat them. Recent high profile security breaches have shown that a breach in security can have serious consequences.. It can lead to loss or destruction of business assets, bad publicity and its associated effect on a company’s brand, hefty regulatory fines, disruption of services and costs associated with numerous lawsuits. The main task of a hacker is to access business assets through the network without being detected. The threats are normally cloaked within ubiquitous traffic flows such as web or email. Whatever the nature of a threat, an attack leaves signatures behind that can be used to “un-cloak” the threat. Threat defense and visibility is the watchword.
It has been exhausting to many of us, to be constantly engaged in the never ending cat and mouse game we play to manage and detect cyber threats. When it comes to securing private and public clouds, a new generation of Read More »
Tags: Cisco Cloud Security Architecture, cloud, cloud architecture, cloud consumers, cloud security, cyber threats, invisible threats, Service Provider
By Vince Pandolfi, Consulting Systems Engineer, Service Provider The latest Wi-Fi physical layer standard 802.11ac, has been ratified and is enjoying widespread adpotion in the client device marketplace. The hype has been with us for a few years now proclaiming tremendous gains in throughput. The mechanisms 802.11ac uses to gain these speed improvements can also be used to improve client quality of experience and not necessarily just be used for higher data rates. The three key elements of a connect include distance, speed and reliability. These are in most cases mutually exclusive or at least have inverse relationships. You gain distance by trading throughput and reliabilty and gain Read More »
Tags: 802.11ac, carrier, deployment, layer, mobility, Service Provider, wifi
By Igor Dayen, SP Product and Solutions Marketing
When I look at the sky, I see an infinite number of stars. It is a moment of inspiration when I gaze at the sky in hope of spotting something miraculous. Looking at the Telecom industry and its new innovations, I feel the same. A new star is rising almost every day. Well … to find Cisco innovations and its stars look no further: the Service provider booth at Cisco Live Milan 2015 is bringing everything that you every wished to see under the stardom of the service provider. Please let me take you through the “starlog” of innovations and demos that will be available for you to engage in and learn about how they advance your business.
Stardate 2015. You may know that the Cisco NVI forecast predicts significant traffic growth and Moore’s Law has never failed us. Therefore Cisco’s service provider strategy is to stay ahead of the curve and deliver SP solutions to Read More »
Tags: asr 9000, autonomic networking, cisco live, Cisco Live Milan, Cloud VPN, convergence, Core Networks, epn, esp, evolved programmable network, evolved services platform, IP and Optical, NCS 2000, NCS 4000, NCS 6000, network function virtualization, NFV, nV technology, open network architecture, Optical Networks, QvBN, QvPC, SDN, segment routing, Service Provider, Service Provider Strategy, software defined networks, SP, SP Strategy, virtualization, virtualized managed services, vMS
2014 ended with a flurry of technology conferences in Europe and the Middle East. In November, the European Commission’s (EC) annual Information and Communications Technology (ICT) Conference addressed how to make the EC a 21 Century organization. In December, the International Telecommunications Union Telecommunications Standardization Sector ( ITU-T) hosted a meeting in Doha, Qatar for CTOs. Among the issues discussed were updates on the Global Standardization Landscape, status of Internet of Things Standardization and next generation video technologies and standards. Also in Doha, at the same time The ITU hosted World Telecom whose theme was “Future in Focus: how disruptive developments in technology, business and society are transforming the ICT industry.” All the meetings gave us much to think about for 2015. Günther Oettinger , European Union Commissioner for Digital Economy and Society kicked-off the ICT DIGIT-IT conference by outlining his strategy for achieving a digital transformation within the European Union. He went on to detail specific areas he thought needed the most attention including:
- Effective Workplace
- Real time administration
- Open Data
- Collaborative working tools
- Security and cyber-security (mentioned as number 1 priority)
- Growing usage of Cloud for non-strategic data
- Importance of Big Data and Internet of Everything
- Openness and Collaboration between the different EU organizations
- Attracting young generation within EU, build and retain talent
As Commissioner Oettinger concluded his presentation, I was struck by how similar Read More »
Tags: 2015, Big Data, cloud, Doha, global stand, Internet of Everything, Service Provider