Cisco Blogs


Cisco Blog > The Platform

Announcing Cisco’s Data & Analytics Conference

It is an exciting day for me. Today, we are announcing our first annual Data & Analytics Conference in Chicago, October 20-22. If you’ve previously joined us for Data Virtualization Day, you’ll find this expanded experience responds to your feedback and the changes your business is experiencing as the industry embraces the relevance of analytics.

To share our enthusiasm, and in honor of David Lettermen’s Final Late Show broadcast, here are the Top 10 reasons why you should join us at our conference this Fall:

Read More »

Tags: , , , ,

IoT Security: Keep Calm and Connect On

Secuirty in IOT Experts Panel at LiveWorx 5-5-15

There’s a lot of hype around securing the Internet of Things (IoT). At the end of the day, I suggest that a more reasoned approach is in order. Securing the IoT will not be achieved by frantic worry about the volume of endpoints. Myopic focus on the volume of devices in an IoT ecosystem can lead to an important misstep: forgetting that it’s the Internet of Things. That means that all this data is passing through the network. Therefore, tackling security can only occur with diligent attention to the core of the IoT, namely, the network stack. In that way security can become as pervasive as the IoT itself.

I recently had the privilege of participating in a panel discussion at LiveWorx’s CXO Forum on Securing the IoT. Here are two predictions with respect to the IoT and security that I shared with the audience and my co-panelists at the event:

  1. Access and identity management will be critical in an IoT ecosystem. However, the username and password won’t be part of tomorrow’s approach: the password will die – and soon. It’s not radical to point out that passwords are insufficient on their own for authenticating access to sensitive data. I don’t think that means we’re going to go immediately to 21 levels of authentication, for example. We do need a human factor, and it can be biometric, or it can be at an endpoint. We’re familiar with straightforward biometrics such as the iPhone’s fingerprint scan, but there are also newer methodologies that track the exact way a human swipes a smartphone screen. We can leverage technologies such as this to enhance security in the IoT and its member devices.
  1. Our industry must work together in public-private partnerships to put a stop to the proliferation of regulations – country by country or region by region – that are creating a tangled web of laws, regulations, and guidelines around security. Conflicting guidance, standards, and regulations cause confusion rather than clarity. International standards bodies and government regulators should consider removing territorial blinders and revisiting the real mission: ensuring, to the greatest extent possible, that information and communications technology (ICT) are genuine and free from compromise and will not permit control over the operations for which they are used.

While strong international standards for IoT security and new authentication methods are just two pieces of the larger puzzle that will make IoT more secure, they are essential pieces. We at Cisco are working to make inroads in both these areas. Stay tuned.

IoT Truck

Tags: , ,

Opportunities and Value Through Data Science (Part 1)

I recently attended the Strata + Hadoop World Conference in San Jose, and came away impressed with the accelerating pace of innovation in the world of Big Data. Companies and startups are innovating in every area of the Big Data value chain – from automating how data is collected, cleaned, and organized; to data governance and management; to data storage using a plethora of NoSQL database technologies; and to the numerous emerging tools for data science. Read More »

Tags: , , , , , , , ,

Analytics Opens a Window into Each Shopper’s Journey

The key to retail today is customer understanding —where each customer stands on his or her personal shopping journey, whether in-store or out. Retailers must “know” each shopper as never before. And they must offer the kinds of contextual, personally relevant experiences that will optimize their merchandise mix, create faster inventory turns, and drive greater customer engagement.

After all, the typical customer today is mobile, connected, and has heightened expectations. Many are accustomed to a deeper level of real-time interaction from innovative online retailers than from traditional brick-and-mortar stores.

Yet, as a recent Cisco study revealed, offline retailers – or retailers that combine on and offline capabilities – have their own unique advantages – if they step up to the opportunities of the Internet of Everything (IoE) economy. By blending the benefits of the physical store — such as the ability to touch, compare, and try on products — with the benefits of the virtual world, retailers can create a new value proposition that can’t be matched by their online-only competitors. In the process, they not only drive their own industry’s disruption but challenge for market leadership.

Read More »

Tags: , , , , , , , , , , , , , ,

Trading Mobile Dollars for IoT Pennies

Jeff Zucker of NBC Universal coined the prescient expression “Trading analogue dollars for digital pennies” in 2008 to describe the huge gap that he was observing between the lucrative promises of online and digital advertising and the reality of the meager revenues that it was in fact producing.  Could the same be true of the Internet of Things (IoT) revolution?  Are we trading the hundreds of dollars that we are generating from mobile users for the pennies that providers get for connecting “things”?

Connecting the 50 billion projected devices, or things, to the Internet is the cornerstone of the Internet of Things.  Given the challenges of remoteness, mobility and the cost of wiring up these devices, many of these connections will be made over mobile networks.  In fact, Beecham Research estimates that the number of cellular machine-to-machine connections will grow to 1 billion by 2020, up from 172 million in 2013.  It is no wonder that the mobile operators are salivating at the prospect of all this new revenue to be earned from connecting inanimate objects.  This windfall is especially at a time when there traditional mobile business is under attack.  Changes in voice usage and bundled minutes are causing voice revenues to decline and data revenues are under attack from Wi-Fi connections and over-the-top providers (see The Mobile Paradox). Read More »

Tags: , , , ,