Since Henry Ford, the alchemy of turning raw materials into mass-produced products has been complicated and challenging. At best, it has been a delicate and precarious balancing act; at worst, something akin to herding cats. The trick has always been
Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks. That’s why Cisco is pleased to announce the IoT Security Grand Challenge, an industry-wide initiative to bring the global security
Despite its overwhelming business benefits, the Internet of Things (IoT) also significantly increases security risks, via a dramatic increase in attack surface and diversity of potential threats. And since IoT is a significant component of the larger
This week marks the 25th anniversary of the World Wide Web, an important milestone as we look at how far we’ve come and how the Internet of Everything (IoE) is shaping our future. Developed by Sir Tim Berners-Lee, a researcher at CERN, the Web was
We are looking forward to an exciting 2014 where many are predicting this is the year of the Internet of Everything. We foresee this trend affecting the banking industry as well. As most consumers get connected using their latest version of a
In my role as Cisco’s Chief Futurist, I get many questions about what the future holds and how new technology and emerging solutions will change our lives. Given the positive feedback and the volume of questions being submitted from the community
March is a rather event-laden month for Open Source and Open Standards in networking: the 89th IETF, EclipseCon 2014, RSA 2014, the Open Networking Summit, the IEEE International Conference on Cloud (where I’ll be talking about the role of Open Source
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a
Is the combination of cloud computing and mobility a perfect storm of security threats? Actually, yes. And you should prepare for them as if there is a storm coming. As businesses become increasingly mobile, so does sensitive data. In fact, in a