Bridging the IoT Computing Gap: Edge Compute, IoT Gateways, and AWS
Exciting demo from Cisco at AWS re:Invent -- an example of Cisco working with AWS to help developers bridge the IoT computing gap from cloud to the edge.
Empowering Customers at the Edge
Over the past several years, an immense transition has taken place as networks have become more diverse and complex. Companies large and small have many branch sites – users at the edge that need to connect securely and quickly to the network and the cloud. Software-defined wide area networking (SD-WAN) technologies are enabling customers to […]
Your Branch Could Save You Millions or More from Security Attacks
Like a trusted partner, Cisco is there. With the ISR 4000s, you’re in good hands. Why all the cleverly-crafted references to insurance companies and security at the branch?
Microsoft Patch Tuesday – October 2016
Patch Tuesday has once again arrived! Microsoft’s monthly release of security bulletins to address vulnerabilities provides fixes for 37 newly disclosed security flaws. Today’s release sees a total of 10 bulletins with five of the bulletins rated critical, addressing vulnerabilities in Edge, Graphics Component, Internet Explorer, Video Control, and Adobe Flash Player. Four bulletins are […]
It’s Time to Talk Industry Collaboration, Not Just Data
How "collaboration, collaboration, collaboration" leads to better decision making.
How To Gain an Edge by Taking Data Analytics to the Edge
In Part 1 of this blog series, I talked about how data integration provides a critical foundation for capturing actionable insights that generate improved outcomes. Now, in Part 2, I’ll focus on the two other challenges that must be met to extract value from data: 1) automating the collection of data, and 2) analyzing the […]
A Partner Experience with the new Cisco WAP371 802.11ac Wireless Access Point
Hello all, Hello all, I trust everyone’s week is going well. Today we get to hear from Michiel Beenen, the founder of TechConnect, based in the Netherlands. Michiel recently heard about the new Cisco WAP371 and wanted to see if this new 802.11ac wireless access point hit the mark. He has already deployed the WAP321 […]
Attack Analysis with a Fast Graph
This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]
The Three Mega Trends in Cloud and IoT
A consequence of the Moore Nielsen prediction is the phenomenon known as Data Gravity: big data is hard to move around, much easier for the smaller applications to come to it. Consider this: it took mankind over 2000 years to produce 2 Exabytes (2×1018 bytes) of data until 2012; now we produce this much in […]