Digital Transformation

Do you Trust your IoT Device and its Vendor?

Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture?

Data-Driven Hacks Part 5: How Can You Make Trust Key to Your Success?

The final consideration for proactive change is building trust by sharing data that shows you’re listening. This is worth repeating. Build trust by sharing data.

Embedded switches for custom needs and extreme conditions

From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, access to highly secure broadband for voice, video, and data communications is critical....

Data-Driven Hacks Part 4: How Can You Rely on a Diverse Listening Infrastructure?

Listening more expansively is something you can begin today. No waiting. No deep research. Just ask yourself a few questions and begin.

Data-Driven Hacks Part 3: How Can You Access Talent to Dig into Data?

Invest in someone who has specialized subject matter expertise that can turn the influences that you identified into insights that can move the needle.

Best Security Practices for Fog Computing

For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture.

Data-Driven Hacks Part 2: How Can You Master the Past to Own the Future?

I have four hacks—all driven by data—that can help your organization benefit from a vast array of insights. Here’s hack No. 1.

The Data-Driven Hacks You Need Now to Be Proactive (Part 1)

People often talk about the value of real-time data, but sometimes real time is too late. See why your company’s insights might be less than useful when implementing change.

IoT Endpoints Are Coming Out of the Closet

“Growth, growth and more growth” describes the exponential explosion of the global IoT market growing from $157B in 2016 to $457B by 2020, attaining a CAGR of 28.5%.