Cisco Blogs


Cisco Blog > SP360: Service Provider

The Enterprise’s Inclination to Private Cloud

By Uwe Lambrette, Director of Service Provider Solutions, Cisco Internet Business Solutions Group (IBSG)

Cisco IBSG’s recent interviews with about 45 enterprise CIOs and architects clearly revealed that enterprises have a preference for private cloud. They want to maintain control over their IT, especially where the architecture is new and skills need to be built. In addition, they are not comfortable with accepting externally provided cloud solutions (although there are certainly exceptions).

At the same time, the survey indicated that once enterprises have gained private-cloud experience, they are more willing to allocate this architecture to an external provider.

This is reminiscent of the classic outsourcing
 cycle, where corporate functions are moved externally once they have become a commodity.

This trend has Read More »

Tags: , , , , , , , , , , , , , ,

BYOD: Extending the Network Edge into the Connected Home

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Up to this point, I’ve made a strong case for how important visibility into the connected home network is to service providers.  I’ve shown how the culture of Bring Your Own Device (BYOD) is already taking root, and why it is essential for service providers to meet the needs of consumers and businesses if they want to stay competitive.  The question remains, how will service providers achieve this?

On March 28, 2012, Cisco announced its intent to acquire privately-held ClearAccess, a provider of TR-069-based software to service providers for the provisioning and management of residential and mobile devices.  ClearAccess management and software capabilities will augment Cisco Prime – Cisco’s network management software portfolio – by offering a set of powerful and sophisticated tools for provisioning, monitoring and managing bandwidth usage, parental controls, and diagnostics to connected devices in the home.

TR-069 technology provides a standardized means for describing remote home gateways.  TR-069 can be likened to the DOCSIS standard used by cable companies, and there are many flavors to Read More »

Tags: , , , , , , , , , , , , ,

BYOD: Beyond the Triple Play

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Service providers have already penetrated the connected home network with equipment such as set-top boxes and Internet gateway routers to provide Triple Play services – voice, video, and data.  From this established base, Service providers have the opportunity to further extend into quad and quintuple plays by offering additional services such as wireless/cellular and security-based/home automation.  In fact, with the right infrastructure, the connected home network becomes extremely flexible and capable of supporting a wide range of new and innovative services.  Service providers are the natural candidate to offer – and capitalize upon – these services.

The key to generating more than just Triple Play revenues is visibility into the home network.  Effectively, Service providers need to push the edge of their networks further into the connected home.  In this way, they can enable the Bring Your Own Device (BYOD) reality by: Read More »

Tags: , , , , , , , , , ,

BYOD: What Businesses Need

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Bring Own Your Device (BYOD) in the context of the business world reflects the fact that many consumers bring their work home with them.  Specifically, they connect devices they have received as part of their job – laptops, smartphones, and tablets – to the home network and use them as they would at the workplace.

While the added productivity of BYOD and working at home is attractive to businesses, the risk of exposure is not.  Laptops, for example, can store or access sensitive data like financial information or critical trade secrets that need to be protected.  In some cases, such as personal or health data, the law requires that this information must be secured.

The reality is that it is not always possible to ensure that a device is secure.  As a consequence, Read More »

Tags: , , , , , , , , , ,

BYOD: What Consumers Want

By Ross Fujii, CTO of Cisco Network Management Technology Group (NMTG)

Before exploring how service providers can capitalize upon the opportunities that Bring Your Own Device (BYOD) offers, it is critical to understand what consumers actually need and want from their home network.  A few usage scenarios will illustrate the key characteristics of the next-generation connected home:

  • You’re watching the news on your smartphone as you take a walk around the neighborhood.  When you get home, you pause the video stream and resume it on your IPTV in the comfort of your living room couch.
  • You’ve heard about a new TV show you want to check out.  You have no idea whether Read More »

Tags: , , , , , , , , , ,