Developing Products and Solutions in the 21st Century
On November 3rd, 2014 at the Software Defined Network-Multiprotocol label Switching SDN-MPLS (Software Defined Networking-Multiprotocol Label Switching) Conference in Washington D.C: I moderated a stellar panel titled, “Developing Products...
The New Face in CyberSecurity
The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner. With the Internet of Everything and cloud computing, CyberSecurity must be […]
A Cisco Customer Solutions Architecture (CSA) Use Case in How to Manage Threat Defense
This is part 4 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Enabling & Delivering Cloud-based Security Services – Managed Threat Defense Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) cloud manner. The reasons for this vary but these are the most common: […]
A Deep Dive in the Role of Each of the Cisco Customer Solutions Architecture (CSA) Layers
This is part 3 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Physical Infrastructure Layer The physical infrastructure layer is where the physical resources reside. This includes equipment typically used in a data center such as network devices (switches, routers, firewalls, and load balancers), computing resources, storage and facilities. Physical […]
What is the Cisco Customer Solutions Architecture (CSA) Layered Approach?
This is part 2 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. CSA Description The following figure shows a simplified view of the Cisco CSA. It has five horizontal layers: Physical Infrastructure layer, Virtualized Infrastructure layer, Services layer, Service Management and Automation layer, and App/portal layer. Supporting each layer from […]
Your Business Powered By Cisco Customer Solutions Architecture (CSA). What are Cisco CSA’s Benefits?
This is part 1 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Many IT organizations are challenged to take advantage of the new technologies enabled by Virtualization, Cloud, Analytics and IoT. Applications enabled by these new technologies must be protected from unauthorized use but remain accessible, in a secure manner, […]
Why Information and Communication Technology (ICT) Matters for Girls
I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the possibilities that technology presents for young girls and aspiring women. As a CTO […]
Virtualization: Can We Deconstruct the Problem and Opportunity?
This was the title of a November 19 2013 panel that I had moderated in Washington D.C. at the MPLS-SDN Isocore Conference. The abstract for this conference was...
Internet of Everything (IoE) Secure Framework
This is my third blog under the series of Internet of Everything (IoE) Security having written the Introduction, and having proposed proposed an architectural view. To address the highly diverse IoE environment and the related security challenges, a flexible security framework is required. Our framework is comprised of three generalized components: Authentication Authorization and Access […]
Securing the Internet of Everything: An Architectural View
As a follow up to my introductory blog on Securing the Internet of Everything, I would like to discuss further the security implications that will comprise proposed framework. As the applications of the IoT/M2M affect our daily lives, whether it is in the Industrial Control, Transportation, Smartgrid or Healthcare, it becomes imperative to ensure a secure […]
Summary: Securing the Internet of Everything: An Introduction
I recently kicked off a series about security and the Internet of Everything, a pivotal topic that starts with the roots of IoE, IoT and M2M, which I explore in more depth in the first post. Machine-to-Machine connections make up a huge portion of the Internet of Things, both general concepts for the network infrastructures […]
Securing the Internet of Everything: An Introduction
Towards developing a Secure Architecture for the Internet of Everything, I plan to kick off a series of blogs around this pivotal topic. In discussing security and the Internet of Everything, the first question that comes to mind is, “Which segment of “everything” is one referring to?”. A reasonable approach has been to understand the […]
Gotta Love Fiber!
As President of Fiber to the Home Council Asia-Pacific, I am really excited about the forthcoming annual conference to be held in May 19-21, 2013 in Auckland, New Zealand. Let’s look at some of the compelling facts for the region: By year-end 2016, nine economies are forecasted to reach FTTx household penetration rates of 20% […]
ICT for Girls, Women in Technology and a Dialogue at the European Union
April 25 2013 is a super day for girls and women in technology and Cisco was very present! I am so energized by the fantastic people I met throughout the day commencing with a breakfast session Women2020 platform hosted by DIGITALEUROPE with the topic of Women In Science, Technology, Engineering and Mathematics for Smart Growth […]
Tapping in Women Tech Talent: Our Opportunity!
On March 27 2013 I had the opportunity to participate at Cisco’s Women in Technology Forum with the theme, “Think Big, Play Big!” The event was particularly poignant as it was held under the publicity from Sheryl Sandberg’s provocative book and movement “Lean In: Women, Work, and the Will to Lead” Our CEO John Chambers […]
Cisco Gets a Gold Star for Tech-Policy and Standards Leadership
Innovation is often defined as novel technological invention. What is far less known about successful innovation efforts is that it takes a special breed of individual who possesses the rare combination of technical depth and sharp diplomatic skills. To be a successful innovator, one must be able to maneuver through political mine fields inherent with […]
Cisco Endorses OpenStand at ITU-T in Dubai
Following the ITU hosted CTO meeting held in Dubai on November 18 2012, where I represented our CTO Padmasree Warrior, I had the pleasure to present at the ITU-T Global Standards Symposium [GSS] in Dubai on November 19 2012. This panel was of particular interest to us because Cisco observed a number of industries brought […]