The document discusses trends in internet traffic and network usage. By 2020, there will be over 50 billion devices connected to the internet, with each person owning on average 7-8 connected devices. IP traffic will quadruple by 2015, with video traffic making up the majority. By 2012, over 70% of enterprises will use cloud computing services. The network is becoming the central platform connecting all devices, systems, applications and people.
The document discusses the bring your own device (BYOD) trend and related security challenges. It notes that BYOD is already popular, with 53% of employees using personal laptops and 35% using smartphones for work. The document also addresses how organizations will need to accept BYOD, with 90% expected to allow it by 2014. It poses questions about how to securely allow access from various devices and implement security policies. Finally, it briefly outlines some of Cisco's security solutions that can help organizations address the BYOD trend and evolving threats.
The document discusses the Internet of Everything (IoE) and its potential impact. It notes that IoE could grow global corporate profits by 21% by 2022 and includes billions of business-to-business connections. The top seven sectors for IoE opportunities are identified as manufacturing, public sector, energy/utilities, healthcare, finance/insurance, transportation, and wholesale/distribution.
Cisco ist weltweit der führende Anbieter von Netzwerktechnik für Computernetze.
Während des Girls'Day werden Blicke in den Arbeitsalltag der Vertriebsmitarbeiter/innen und Systemingenieure/innen ermöglicht. Das Arbeiten in einem internationalen Konzern und der Umgang mit web-basierten Arbeitsmitteln möchten wir am Girls´Day vermitteln.
Wir werden aufzeigen, daß virtuelle Treffen, die Zukunft des Internets und Spaß am Arbeitsplatz kein Widerspruch sind...
Mein Beitrag dazu war wie oben beschrieben "Soziale Medien - Risiken und Nebenwirkungen aus Sicht eines Arbeitgebers" - Auch im 5. Jahr macht das immer noch einen riesen Spass!
The document discusses Bring Your Own Device (BYOD) and virtual desktop infrastructure (VDI). It provides an overview of Cisco's approach to enabling BYOD and VDI, including:
1. Cisco's distinct approach to securely supporting BYOD and VDI through technologies like mobile device management, secure connectivity solutions, and policy management.
2. Cisco's Enterprise Network Vision which aims to securely connect people, clouds, and things through a simple, secure network with one policy and one management.
3. Cisco's BYOD architecture which leverages solutions like the Cisco Identity Services Engine and Cisco AnyConnect to provide secure connectivity, policy management, and application delivery to personal and corporate devices.
The document discusses Cisco's strategy to deliver a secure, intelligent platform for digital business. It covers Cisco's approaches to reinventing the network through intent-based networking, embracing a multicloud world, unlocking the power of data through analytics and insights, and focusing on the human experience. Security is emphasized as foundational.
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
The document discusses the UK's Code of Practice for Consumer IoT Security. It provides context on why the code was developed, including to address risks from poorly secured IoT devices. The code outlines 13 security practices for IoT manufacturers, including not using default passwords and keeping software updated. The document also discusses options for regulating adherence to the code and challenges in enforcing security standards.
Cisco Connect 2018 Philippines - next-generation customer care and the connec...NetworkCollaborators
This document discusses key trends in customer experience and digital technologies that will impact customer interactions by 2020. It outlines 6 major technology trends: 1) Smart Stores that blend physical and digital retail, 2) Hyper-Personalization using data and AI to offer highly customized experiences, 3) Intelligent Assistants that will facilitate more conversations between customers and bots, 4) Remote Experts using virtual interactions to provide expert advice and support, 5) Instant Fulfillment technologies like drones and autonomous vehicles that enable same-day delivery, and 6) Augmented Reality that combines digital and physical worlds in areas like virtual shopping. The presentation argues that customers' rising expectations around personalized, convenient experiences will drive companies to adopt these new technologies to transform their customer
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew ShikiarFIDO Alliance
The document summarizes a presentation by Andrew Shikiar on solving password problems. It discusses the FIDO Alliance's work in establishing open authentication standards using public key cryptography and single gestures as an alternative to passwords. It provides an overview of key developments in 2019, including growing platform support for FIDO2, expanded addressable user base, global market validation, and membership growth. It outlines new work areas like device and user verification to strengthen identity assurance and plans for future developer focus and the first FIDO conference.
The document discusses the bring your own device (BYOD) trend and related security challenges. It notes that BYOD is already popular, with 53% of employees using personal laptops and 35% using smartphones for work. The document also addresses how organizations will need to accept BYOD, with 90% expected to allow it by 2014. It poses questions about how to securely allow access from various devices and implement security policies. Finally, it briefly outlines some of Cisco's security solutions that can help organizations address the BYOD trend and evolving threats.
The document discusses the Internet of Everything (IoE) and its potential impact. It notes that IoE could grow global corporate profits by 21% by 2022 and includes billions of business-to-business connections. The top seven sectors for IoE opportunities are identified as manufacturing, public sector, energy/utilities, healthcare, finance/insurance, transportation, and wholesale/distribution.
Cisco ist weltweit der führende Anbieter von Netzwerktechnik für Computernetze.
Während des Girls'Day werden Blicke in den Arbeitsalltag der Vertriebsmitarbeiter/innen und Systemingenieure/innen ermöglicht. Das Arbeiten in einem internationalen Konzern und der Umgang mit web-basierten Arbeitsmitteln möchten wir am Girls´Day vermitteln.
Wir werden aufzeigen, daß virtuelle Treffen, die Zukunft des Internets und Spaß am Arbeitsplatz kein Widerspruch sind...
Mein Beitrag dazu war wie oben beschrieben "Soziale Medien - Risiken und Nebenwirkungen aus Sicht eines Arbeitgebers" - Auch im 5. Jahr macht das immer noch einen riesen Spass!
The document discusses Bring Your Own Device (BYOD) and virtual desktop infrastructure (VDI). It provides an overview of Cisco's approach to enabling BYOD and VDI, including:
1. Cisco's distinct approach to securely supporting BYOD and VDI through technologies like mobile device management, secure connectivity solutions, and policy management.
2. Cisco's Enterprise Network Vision which aims to securely connect people, clouds, and things through a simple, secure network with one policy and one management.
3. Cisco's BYOD architecture which leverages solutions like the Cisco Identity Services Engine and Cisco AnyConnect to provide secure connectivity, policy management, and application delivery to personal and corporate devices.
The document discusses Cisco's strategy to deliver a secure, intelligent platform for digital business. It covers Cisco's approaches to reinventing the network through intent-based networking, embracing a multicloud world, unlocking the power of data through analytics and insights, and focusing on the human experience. Security is emphasized as foundational.
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
The document discusses the UK's Code of Practice for Consumer IoT Security. It provides context on why the code was developed, including to address risks from poorly secured IoT devices. The code outlines 13 security practices for IoT manufacturers, including not using default passwords and keeping software updated. The document also discusses options for regulating adherence to the code and challenges in enforcing security standards.
Cisco Connect 2018 Philippines - next-generation customer care and the connec...NetworkCollaborators
This document discusses key trends in customer experience and digital technologies that will impact customer interactions by 2020. It outlines 6 major technology trends: 1) Smart Stores that blend physical and digital retail, 2) Hyper-Personalization using data and AI to offer highly customized experiences, 3) Intelligent Assistants that will facilitate more conversations between customers and bots, 4) Remote Experts using virtual interactions to provide expert advice and support, 5) Instant Fulfillment technologies like drones and autonomous vehicles that enable same-day delivery, and 6) Augmented Reality that combines digital and physical worlds in areas like virtual shopping. The presentation argues that customers' rising expectations around personalized, convenient experiences will drive companies to adopt these new technologies to transform their customer
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew ShikiarFIDO Alliance
The document summarizes a presentation by Andrew Shikiar on solving password problems. It discusses the FIDO Alliance's work in establishing open authentication standards using public key cryptography and single gestures as an alternative to passwords. It provides an overview of key developments in 2019, including growing platform support for FIDO2, expanded addressable user base, global market validation, and membership growth. It outlines new work areas like device and user verification to strengthen identity assurance and plans for future developer focus and the first FIDO conference.
The FIDO Alliance Today: Status and NewsFIDO Alliance
The FIDO Alliance invites you to learn how simplify strong authentication for web services.
This presentation was part of our FIDO Alliance Seminar in Tokyo, Japan, in November, 2015.
The document discusses the Internet of Everything (IoE) and how it combines connections between machines, machines and people, and people. It notes that IoE uses connections to improve lives by connecting everything that can be connected, including examples from daily life. Finally, it discusses how IoE will drive innovation through increased collaboration enabled by technologies like mobility, cloud, and analytics.
Learn about FIDO Alliance status and plans. From FIDO Alliance Seminar in Washington, D.C., in October, 2015.
FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Public Sphere: Gov 2.0 - Martin Stewart WeeksPia Waugh
The document discusses the emergence of a new model of government centered around concepts like participation, collaboration, transparency and engagement. It argues that governments need to harness distributed intelligence, create social capital, and build new platforms to better connect citizens, knowledge, and services. The network is presented as a platform to empower the edges and enable large-scale creativity and collaboration between governments and their constituents. The new approach is proposed as "Government 2.0".
The Internet Report - Ep.3: April 6-12, 2020ThousandEyes
All about Internet outages. Learn how the Internet is holding up during COVID-19. A week-over-week comparison of global network outage events across ISPs, public cloud provider networks, UCaaS networks and edge networks like CDNs, DNS, and SECaaS.
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
The FIDO Alliance has launched a new microsite, LoginWithFIDO.com, for high level, non-technical information about FIDO for consumers and service providers. As part of this project, we wanted to learn more about consumer attitudes and habits around authentication. What are their password habits? What do they think about the FIDO approach? Do they want to see FIDO at login?
Modern Authentication for a Connected WorldFIDO Alliance
The document provides an agenda for the Cloud Identity Summit on June 19, 2017 hosted by the FIDO Alliance. The agenda includes presentations on FIDO specifications and updates, the use of FIDO for government requirements, case studies on FIDO and Facebook login and Google Security Keys, and a panel on FIDO authentication and IoT. The event would welcome attendees and feature presentations from the FIDO Alliance executive director, Microsoft, Venable LLP, Yubico, and Google before closing with a panel on FIDO and IoT.
This document brings together a set
of latest data points and publicly
available information relevant for
Hybrid Cloud Infrastructure
Industry. We are very excited to share
this content and believe that readers
will benefit from this periodic
publication immensely.
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
This document discusses how authentication technology and government policies need to evolve together. It argues that FIDO authentication addresses regulatory needs in a secure, usable way. The document notes that governments are recognizing that two-factor authentication can now happen within a single device and that they should promote the "right" authentication standards like FIDO that are secure by default. Major reports recommend FIDO to overcome identity challenges in a way that empowers consumers.
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...Koshi Ikegawa
In the World Economic Forum 2019, Data Free Flow with Trust (DFFT) was advocated. Especially for some domains such as medical institutions and governments, where privacy protection is essential, it must handle sensitive data such as healthcare data and personal information. A distributed ledger technology makes it possible to share data among multiple organizations with trust. However, it is not suitable for sensitive data because the distributed ledger discloses stored data to all organizations. In this research, we solve the problem with an approach to store the sensitive data on external storage in a specific organization for each data to avoid sharing the data with all organizations.
[Hyperledger Grobal Forum 2021. June 08-10 2021. Online.]
Data sovereignty issues: a 15 minute debrief for not-for-profitsrgtechnologies
The government has recently torn up a contract because a supplier was hosting their data overseas. This poses a threat to not-for-profit organisations across Australia, are you at risk of losing funding? In this 15 minute debrief for not-for-profit executives, we will explain all the important issues relating to data sovereignty.
Introduction to FIDO Alliance
by Brett McDowell, FIDO Alliance, Executive Director
from the FIDO Alliance Seminar in New York City on March 3, 2016, entitled "Key Trends in Strong Authentication"
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Gaming systems and the gaming industry have evolved since the days of the first computer games. Connectivity and interactivity has changed everything, blending best practices of PC, mobile and social games into a $100B market that is rife with opportunity — and threats. No longer is gaming just a matter of getting a high score or of beating your friend sitting next to you on the couch; multiplayer, networked games replete with virtual (or real) currency dramatically have changed the value line and threat matrices in the gaming industry.
Secure identity credentials and related attributes are essential to maintaining the integrity of the gaming ecosystem. This webinar will explore ways that the gaming market can address the imperative to provide users with stronger authentication within an improved user experience, and will detail some approaches therein.
Join this webinar to learn:
The basics of FIDO Authentication
How game developers and service providers can reduce risk while improving user experience
The risks of weak authentication facing the gaming industry
Unique perspective from two leading solution providers on the approaches to stronger, simpler authentication for gaming
Featured Speakers
Dave Signh, Platform Security Division, Product Manager, Intel
Shawn Lin, Product Support Application Engineer, Synaptics
Andrew Shikiar, Senior Director of Marketing, FIDO Alliance
Thou shalt be aware of complex legal and risk issues surrounding data hosting and jurisdiction when using cloud services. National, local, and international laws may apply differently to data stored in the cloud. Additionally, over a third of data breaches involve mistakes by third parties like cloud providers. Proper vetting of cloud providers is important to understand what data will be subject to what laws and ensure adequate security, privacy, and insurance protections are in place.
Download this presentation to learn how workspace design and technology can be brought together to create environments where teams and individuals communicate, work, play, learn and innovate. For more information please visit our website here: http://bit.ly/1iahl59
Standardization Opportunity for India: Forces Changing our WorldMahbubul Alam
Standardization Opportunity for India: Forces Changing our World
#1 Social Networks
#2 Innovation Driven by Consumer
#3 Power to the People
#4 Next Generation 100% Digital
#5 Internet of Everything: Connected World
Internet of everything - Деловой Интернет 2013Oleg Konovalov
The document traces the evolution of connectivity from the invention of the telegraph 170 years ago to the present day Internet of Everything. It discusses how connectivity has digitized access to information, business processes, and interactions. The Internet of Everything is presented as connecting people, processes, data, and physical things to create new opportunities to leverage data for decision making. The value of the Internet of Everything is estimated to grow global corporate profits by 21% by 2022 through improved asset utilization, employee productivity, supply chain management, customer experience, and innovation.
This document summarizes a Cisco presentation on advanced web security deployment options. It discusses trends showing increasing threats from social networks, search engines and online advertising. Cisco's web security portfolio includes on-premise, cloud and virtual deployment options with centralized management. Options include the Cisco Web Security Appliance (WSA), Cisco Cloud Web Security (CWS), and integrating security features into the Cisco ASA firewall and ISR router. The presentation demonstrates these options and recommends choices based on factors like location, security needs, network and operations. It highlights features of the WSA, CWS and ASA like URL filtering, application control, multiple anti-malware engines and cloud-based threat intelligence updates.
The FIDO Alliance Today: Status and NewsFIDO Alliance
The FIDO Alliance invites you to learn how simplify strong authentication for web services.
This presentation was part of our FIDO Alliance Seminar in Tokyo, Japan, in November, 2015.
The document discusses the Internet of Everything (IoE) and how it combines connections between machines, machines and people, and people. It notes that IoE uses connections to improve lives by connecting everything that can be connected, including examples from daily life. Finally, it discusses how IoE will drive innovation through increased collaboration enabled by technologies like mobility, cloud, and analytics.
Learn about FIDO Alliance status and plans. From FIDO Alliance Seminar in Washington, D.C., in October, 2015.
FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Public Sphere: Gov 2.0 - Martin Stewart WeeksPia Waugh
The document discusses the emergence of a new model of government centered around concepts like participation, collaboration, transparency and engagement. It argues that governments need to harness distributed intelligence, create social capital, and build new platforms to better connect citizens, knowledge, and services. The network is presented as a platform to empower the edges and enable large-scale creativity and collaboration between governments and their constituents. The new approach is proposed as "Government 2.0".
The Internet Report - Ep.3: April 6-12, 2020ThousandEyes
All about Internet outages. Learn how the Internet is holding up during COVID-19. A week-over-week comparison of global network outage events across ISPs, public cloud provider networks, UCaaS networks and edge networks like CDNs, DNS, and SECaaS.
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
The FIDO Alliance has launched a new microsite, LoginWithFIDO.com, for high level, non-technical information about FIDO for consumers and service providers. As part of this project, we wanted to learn more about consumer attitudes and habits around authentication. What are their password habits? What do they think about the FIDO approach? Do they want to see FIDO at login?
Modern Authentication for a Connected WorldFIDO Alliance
The document provides an agenda for the Cloud Identity Summit on June 19, 2017 hosted by the FIDO Alliance. The agenda includes presentations on FIDO specifications and updates, the use of FIDO for government requirements, case studies on FIDO and Facebook login and Google Security Keys, and a panel on FIDO authentication and IoT. The event would welcome attendees and feature presentations from the FIDO Alliance executive director, Microsoft, Venable LLP, Yubico, and Google before closing with a panel on FIDO and IoT.
This document brings together a set
of latest data points and publicly
available information relevant for
Hybrid Cloud Infrastructure
Industry. We are very excited to share
this content and believe that readers
will benefit from this periodic
publication immensely.
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
This document discusses how authentication technology and government policies need to evolve together. It argues that FIDO authentication addresses regulatory needs in a secure, usable way. The document notes that governments are recognizing that two-factor authentication can now happen within a single device and that they should promote the "right" authentication standards like FIDO that are secure by default. Major reports recommend FIDO to overcome identity challenges in a way that empowers consumers.
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...Koshi Ikegawa
In the World Economic Forum 2019, Data Free Flow with Trust (DFFT) was advocated. Especially for some domains such as medical institutions and governments, where privacy protection is essential, it must handle sensitive data such as healthcare data and personal information. A distributed ledger technology makes it possible to share data among multiple organizations with trust. However, it is not suitable for sensitive data because the distributed ledger discloses stored data to all organizations. In this research, we solve the problem with an approach to store the sensitive data on external storage in a specific organization for each data to avoid sharing the data with all organizations.
[Hyperledger Grobal Forum 2021. June 08-10 2021. Online.]
Data sovereignty issues: a 15 minute debrief for not-for-profitsrgtechnologies
The government has recently torn up a contract because a supplier was hosting their data overseas. This poses a threat to not-for-profit organisations across Australia, are you at risk of losing funding? In this 15 minute debrief for not-for-profit executives, we will explain all the important issues relating to data sovereignty.
Introduction to FIDO Alliance
by Brett McDowell, FIDO Alliance, Executive Director
from the FIDO Alliance Seminar in New York City on March 3, 2016, entitled "Key Trends in Strong Authentication"
The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.
Gaming systems and the gaming industry have evolved since the days of the first computer games. Connectivity and interactivity has changed everything, blending best practices of PC, mobile and social games into a $100B market that is rife with opportunity — and threats. No longer is gaming just a matter of getting a high score or of beating your friend sitting next to you on the couch; multiplayer, networked games replete with virtual (or real) currency dramatically have changed the value line and threat matrices in the gaming industry.
Secure identity credentials and related attributes are essential to maintaining the integrity of the gaming ecosystem. This webinar will explore ways that the gaming market can address the imperative to provide users with stronger authentication within an improved user experience, and will detail some approaches therein.
Join this webinar to learn:
The basics of FIDO Authentication
How game developers and service providers can reduce risk while improving user experience
The risks of weak authentication facing the gaming industry
Unique perspective from two leading solution providers on the approaches to stronger, simpler authentication for gaming
Featured Speakers
Dave Signh, Platform Security Division, Product Manager, Intel
Shawn Lin, Product Support Application Engineer, Synaptics
Andrew Shikiar, Senior Director of Marketing, FIDO Alliance
Thou shalt be aware of complex legal and risk issues surrounding data hosting and jurisdiction when using cloud services. National, local, and international laws may apply differently to data stored in the cloud. Additionally, over a third of data breaches involve mistakes by third parties like cloud providers. Proper vetting of cloud providers is important to understand what data will be subject to what laws and ensure adequate security, privacy, and insurance protections are in place.
Download this presentation to learn how workspace design and technology can be brought together to create environments where teams and individuals communicate, work, play, learn and innovate. For more information please visit our website here: http://bit.ly/1iahl59
Standardization Opportunity for India: Forces Changing our WorldMahbubul Alam
Standardization Opportunity for India: Forces Changing our World
#1 Social Networks
#2 Innovation Driven by Consumer
#3 Power to the People
#4 Next Generation 100% Digital
#5 Internet of Everything: Connected World
Internet of everything - Деловой Интернет 2013Oleg Konovalov
The document traces the evolution of connectivity from the invention of the telegraph 170 years ago to the present day Internet of Everything. It discusses how connectivity has digitized access to information, business processes, and interactions. The Internet of Everything is presented as connecting people, processes, data, and physical things to create new opportunities to leverage data for decision making. The value of the Internet of Everything is estimated to grow global corporate profits by 21% by 2022 through improved asset utilization, employee productivity, supply chain management, customer experience, and innovation.
This document summarizes a Cisco presentation on advanced web security deployment options. It discusses trends showing increasing threats from social networks, search engines and online advertising. Cisco's web security portfolio includes on-premise, cloud and virtual deployment options with centralized management. Options include the Cisco Web Security Appliance (WSA), Cisco Cloud Web Security (CWS), and integrating security features into the Cisco ASA firewall and ISR router. The presentation demonstrates these options and recommends choices based on factors like location, security needs, network and operations. It highlights features of the WSA, CWS and ASA like URL filtering, application control, multiple anti-malware engines and cloud-based threat intelligence updates.
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
The document discusses the Internet of Everything (IoE) and its key components of connecting people, processes, data and things. It outlines how the IoE enables new and better connections through applications like smart buildings, lighting, payments and more. It also discusses challenges of implementing the IoE like security issues, limited bandwidth and latency. The document provides an overview of how fog computing and cloud can help address these challenges and unlock business value across industries like manufacturing, transportation, retail and smart cities.
Cisco provides an overview of connecting the remaining 99% of the world that is still unconnected. The presentation discusses how the Internet has evolved from connecting people to now connecting people, processes, data, and things through technologies like mobility, cloud, and video. Cisco sees an opportunity to create insights, increase efficiency, expand markets through an "Internet of Everything" and estimates the business value of this at $14.4 trillion over 10 years. Cisco aims to solve customers' challenges through intelligent networks and ensure customer success with their market position, R&D investments, acquisitions, partners and expertise.
Joseph Bradley, IoE in action, Cisco LiveFelipe Lamus
The document discusses the growth of internet-connected devices and the implications of digital disruption. By 2020, about 50 billion objects are expected to be connected to the internet. Digital disruption is being driven by the convergence of mobile technology, social media, cloud computing, and big data. The internet of everything (IoE) is projected to create $19 trillion in value over 10 years, with both private sector industries and public sector organizations realizing significant benefits from implementing IoE solutions. Examples are provided of how IoE is already creating value for retailers, cities, and manufacturers through applications such as smart lighting, parking, and factory automation.
This document summarizes key points from the IoT World Forum conference in Chicago in October 2014. It discusses Cisco and Intel's definitions of the Internet of Things, essential elements of edge to cloud IoT solutions, and examples of cost savings and benefits achieved through IoT implementations. It also outlines VMware and AirWatch's roles in IoT, the growing number of connected devices, and several industry leaders collaborating through the Industrial Internet Consortium.
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoESymantec
This document contains a collection of documents from Cisco related to social media monitoring and engagement. It includes summaries of customer conversations, word clouds of common terms, and timelines of social mentions. It also provides best practices for prioritizing social media conversations, setting up rules and triggers for automated responses, identifying influencers, and integrating social data across departments. The document advocates for experimenting with real-time marketing approaches and personalizing engagement based on social personas.
1. The document discusses Oracle's cloud computing strategy and offerings, including providing private, public, and hybrid cloud options across software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS).
2. It addresses challenges with first generation clouds like security risks, data isolation, visibility and control issues. Oracle aims to provide more integrated and secure cloud services.
3. The presentation provides an overview of Oracle's approach to cloud security, including securing each layer of the cloud infrastructure and services as well as integration points between layers and systems.
The rules of the game in IT are changing rapidly and companies facing these market transitions are looking for ways to build an intelligent network platform that can help lines of business capture new business opportunities. Cisco Borderless Networks is the architecture that allows enterprise of any size, to leverage technology transitions through our portfolio of services - rich, secure, and efficient products and solutions. Customers are able to connect anyone, anywhere, anytime, and on any device – securely, reliably, and seamlessly.
The document provides an introduction to IoT and the Arduino prototyping platform. It discusses that IoT involves connecting physical devices to collect and exchange data. It then covers the history of IoT and how connectivity is driving innovation and changes in business models. It also discusses how the Arduino is an open-source prototyping platform and how the workshop will use components like LEDs, resistors, and breadboards to complete examples like blinking an LED. The document promotes democratization of innovation through the DIY movement and platforms like Arduino.
The document provides an introduction to IoT and the Arduino prototyping platform. It discusses that IoT involves connecting physical devices to exchange data over the internet. It then covers the history of IoT and how connectivity is driving innovation. The rest of the document demonstrates how to use Arduino components like LEDs and resistors on a breadboard to prototype basic IoT devices. It also discusses the Arduino IDE and how the DIY movement is lowering barriers to IoT innovation.
This document discusses IPv6 transition and the state of IPv6 adoption. It notes that while IPv4 address exhaustion is a real issue, users do not care and prefer NAT for security. Transition requires cooperation across users, ISPs, devices and content. Statistics show rapid growth of IPv6 adoption by major networks worldwide in the last two years. Full transition to IPv6 is needed to enable unlimited connectivity for cloud/mobile internet and the internet of things going forward.
IoT World Forum Press Conference - 10.14.2014Bessie Wang
1. The document summarizes Cisco's Internet of Things (IoT) World Forum that took place in Chicago in October 2014.
2. It discusses Cisco's strategy and focus areas around IoT, including IoT infrastructure, vertical solutions, services, investment, and partner ecosystem.
3. It also highlights announcements around new IoT products and technologies from Cisco at the forum, such as new platforms and applications for Fog computing and improved IoT security capabilities.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
11. 11
The Next Network and the Internet of Things
The Network is the Platform
Consumer
Video
Security
Networked Home
Industrial
(Internet of Things)
Buildings
Transportation
Physical Security
Utilities (Smart Grid)
Healthcare
Education
Entertainment
Government
Business
Wireless
Storage
Voice
Today there are 13 Billion devices connected to the network, that’s 2 connected devices per person on earthCisco 2011 Visual Networking Index details the stunning numbers that are associated with the growth of networks. By 2020 there will be 50 Billion devices connected to the InternetSo in the next 9 years there will be a 4-fold increase in the number of devices. Source: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.htmlTransition: Those are the numbers today. What is in store for the rest of the decade?The world around us is changing rapidly and so is the way we access and consume information. Today, networks connect over 23 billion devices. Within that figure, networked consumers typically use 2 diverse devices to access information from the internet. But this is just the beginning of what’s to come. Some estimates project that more than 50 billion devices will be connected to the internet in the next decade.
That translates to 1 person owning 6 devices on averageNote that in addition to smart phones, tablets and other “human enabled” devices, the internet will also include many times the number of sensors that don’t have a screen, keypad or require human interaction. The Internet of Things will also grow to include sensors in cattle so that when a cow is sick it transmits a message to the farmer. Each cow would transmit 200 mb of data a year. Cisco’s Planetary Skin Institute (planetaryskin.org) is working with NASA to marry data from satellites, land sensors and the internet to interpret data on climate change. IPv6 will allow for a vast number of network addresses to support this expansion. (Source: Cisco’s Dave Evans Blog posting, July 15, 2011: http://blogs.cisco.com/news/the-internet-of-things-infographic/)Cellular communication between objects, machines, or sensors has led to the growth of M2M connections. These connections are in the form of smart metering, business and consumer surveillance, inventory management, fleet management, and healthcare modules, all of which are designed for operational excellence. M2M technologies are being used across a broad spectrum of industries. As real-time information monitoring is helping companies to deploy new video-based security systems and hospitals and helping healthcare professionals to remotely monitor the progress of their patients, bandwidth-intensive M2M connections become more prevalent. Traditional appliances and devices, such as home appliances, vehicles, energy meters, and vending machines-which traditionally have not been connected directly to cellular networks-are now entering the network.High-bandwidth scenarios for M2M are becoming real in many categories, including the following.• Business and consumer security and surveillance: Video streams such as commercial security cameras, nannycams, and petcams, accessed through mobile-enabled residential or commercial gateways, fall into this category.• Health care: In the medical, well-being, and sports and fitness industries, devices and services used by medical personnel are being connected to reduce errors.• Inventory and fleet management: Wi-Fi is being considered as an adjunct to cellular-based fleet management connectivity, to allow a vehicle to use cellular technology in the field, and support lower-cost, higher-speed Wi-Fi to download and upload data while in fleet headquarters and loading areas.• Telematics: Trip assistance, navigation, and vehicle management are gaining greater consumer adoption, along with broadband-to-the-car offerings that use a cellular connection to the vehicle and then distribute the connection to notebook PCs and other devices within the vehicle through Wi-Fi.M2M capabilities similar to mobile devices are migrating from second-generation (2G) to 3G and 4G technologies. Globally, M2M traffic will grow 22-fold from 2011 to 2016, a compound annual growth rate of 86 percent, with M2M traffic reaching 508,022 terabytes per month in 2016. M2M will account for 5 percent of total mobile data traffic in 2016, compared to 4 percent at the end of 2011. The average M2M module will generate 266 megabytes of mobile data traffic per month in 2016, up from 71 megabytes per month in 2011.(Source: Cisco VNI p. 19)Uneven access to these devices:Of course, the ownership of devices will not be spread evenly. The digital divide will be operational on a global level. Much of developing world does not yet have access to electricity or the internet:"Some 1.6 billion people, about one quarter of the world’s population, have no access to electricity today. Eighty percent of these people live in rural areas of the developing world, mainly in South Asia and sub-Saharan Africa ..." (Source: IEA, "The Developing World and the Electricity Challenge," Jan. 2005, http://www.iea.org/Textbase/work/2005/poverty/blurb.pdf)ITU data suggest that the number of ‘unconnected’ (by early 2008) is substantial:About half of the world’s population (over threebillion) does not have a mobile phoneAn estimated 5.2 billion people are not using the Internet. By the end of 2007, ITU estimates that about 20 percent of the world's population are not covered by a mobile cellular network and are without basic access to ICTs.(Source: http://www.itu.int/ITU-D/ict/statistics/ict/index.html)Coming off a low base, The Middle East and Africa will have the strongest mobile data traffic growth (between now and 2020) of any region at 104 percent CAGR. This region will be followed by Asia Pacific at 84 percent and Central and Eastern Europe at 83 percent. (Cisco VNI)Total content = by 2020 1 zettabyte (ZB)The amount of online rich media consumption is increasing exponentially on an annual basis. Global Internet traffic was once measured in megabytes, but thanks to the rapid increase in file sharing, video web mail and video calling, annual global IP traffic will soon exceed three-quarters of a zettabyte. A zettabyte is equal to 1 billion terabytes or one sextillion bytes. How much is that? If the 11 oz coffee on the desk in front of you is equal to 1 GB (gigabyte) then 1 ZB (zettabyte) would have the same volume as the Great Wall of China! (Source: http://share.cisco.com/dawn-of-the-zettabyte-era.html)Transition: Let’s not get overwhelmed with big numbers! What does the rate of change translate to in terms we can all understand?Assuming that bears out, that means potentially having to manage up to 6 devices or more on average <CLICK>And with the number of devices exploding, the number of applications is also growing exponentially <CLICK> As a result, the amount of content that needs to be managed is also increasing. Think about it – by 2020, there will be a zettabyte of data traversing networks. Pop quiz for all you – do you know how may zeroes a zettabyte has (answer: 10 raised to the power of 21 bytes or 1 billion terabytes)? It’s huge. Organizations are facing a very different world as they move into the new decade and a new global economy. The way we live, the way we work, the way we are entertained, the way we play; it’s all changing.
By the time we are done with this presentation, over 6,000 tablets will have been sold. And we’re not talking about Aspirin or Ibuprofen tablets! Since Apple introduced the iPad in 2010, the market for so-called “tablet” computers has exploded. By 2015 Gartner predicts tablets will account for 60% of all PC sales selling 326 million units then, compared to 63 million units in 2011. (Source: http://www.gartner.com/it/page.jsp?id=1800514)Now, don’t you wish you’d bought Apple stock in 2009? :-)Transition: Many tablets and mobile devices are used to consume as opposed to create content. And what’s the one form of content we all enjoy consuming? Right – video!If this wasn’t enough change, just think that in the time it is taking to say this sentence <CLICK>another 190 internet-enabled tablets will have been sold <CLICK> More important, most of these devices will enter your corporate infrastructure without IT even knowing about it. In fact, in just five years, more people will be connected through mobile devices than traditional desktops. Mobility is major trend facing enterprises.
Video traffic will quadruple all IP traffic by 2014When the Internet first started it was all ASCII characters, plain text messages and emails. Then came the browser and we started to see graphics: pictures and simple audio. Then voice over IP happened. Now the big driver of the growth of IP traffic is video.Global IP traffic in 2010 stands at 20.2 exabytes per month and quadruples by 2015, to reach 80.5 exabytes per month. Consumer IPtraffic will reach 70 exabytes per month and business IP traffic will surpass 10 exabytes per month. Video is the main driver of this 4x increase.Global Internet video traffic surpassed global peer-to-peer (P2P) traffic in 2010, and by 2012 Internet video will account for over 50 percent of consumer Internet traffic. As anticipated, as of 2010 P2P traffic is no longer the largest Internet traffic type, for the first time in 10 years. Internet video was 40 percent of consumer Internet traffic in 2010 and will reach 50 percent by year-end 2012.It would take over 5 years to watch the amount of video that will cross global IP networks every second in 2015. Every second, 1 million minutes of video content will cross the network in 2015.Internet video is now 40 percent of consumer Internet traffic, and will reach 62 percent by the end of 2015, not including the amount of video exchanged through P2P file sharing. The sum of all forms of video (TV, video on demand [VoD], Internet, and P2P) will continue to be approximately 90 percent of global consumer traffic by 2015.(Source: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html)Transition: We grew up watching video on the TV set at home. Then we might have watched video on the desktop or laptop. But today, what about video on mobile devices? How much of the traffic on mobile devices is video?
Two-thirds of the world's mobile data traffic will be video by 2016Mobile video will increase 25-fold between 2011 and 2016, accounting for over 70 percent of total mobile data traffic by the end of the forecast period. Because mobile video content has much higher bit rates than other mobile content types, mobile video will generate much of the mobile traffic growth through 2016. Mobile video will grow at a CAGR of 90 percent between 2011 and 2016, the highest growth rate of any mobile application category that we forecast. Of the 10.8 exabytes per month crossing the mobile network by 2016, 7.6 exabytes will be due to video. (Source: Cisco VNI)There will be no place for a “bad hair day” when you communicate in the future. Will you have your video face on?Mobile-connected tablets will generate almost as much traffic in 2016 as the entire global mobile network in 2012. The amount of mobile data traffic generated by tablets in 2016 (1.1 exabytes per month) will be approximately equal to the total amount of global mobile data traffic in 2012 (1.3 exabytes per month).As mobile network connection speeds increase, the average bit rate of content accessed through the mobile network will increase. High-definition video will be more prevalent, and the proportion of streamed content as compared to side-loaded content is also expected to increase with average mobile network connection speed.● The shift toward on-demand video will affect mobile networks as much as it will affect fixed networks.● Traffic can increase dramatically even while the total amount of time spent watching video remainsrelatively constant.(Source: Cisco VNI)Transition: Where will all this video for these countless mobile devices be hosted? Not on the handset. In data centers serving content through the cloud...And video is going mobile. Analysts estimate that two thirds of the world’s mobile data traffic will be video by 2015.
Enterprise-class cloud technology will be used by 70% of enterprises by 201278% of Enterprises will be pursuing a Private Cloud Strategy by 2014A cloud is a powerful combination of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand, and delivered economically, without compromising security or functionality. We are moving to an interconnected "world of many clouds," where people will have access to cloud services anytime, on any device, anywhere in the world. Enterprises, service providers, small businesses, and governments are looking for cloud solutions to solve some of their biggest business and technology challenges. A solution to these challenges requires an approach that fully integrates the three pillars of cloud: cloud applications and services, data centers, and networks. (Source: http://www.cisco.com/web/solutions/trends/cloud/index.html)From 2000 to 2008, peer-to-peer file sharing dominated Internet traffic. As a result, the majority of Internet traffic did not touch a data center, but was communicated directly between Internet users. Since 2008, most Internet traffic has originated or terminated in a data center. Data center traffic will continue to dominate Internet traffic for the foreseeable future, but the nature of data center traffic will undergo a fundamental transformation brought about by cloud applications, services, and infrastructure. By 2015, one-third of data center traffic will be cloud traffic.Global data center traffic:• Annual global data center IP traffic will reach 4.8 zettabytes by the end of 2015. In 2015, global data center IP traffic will reach 402 exabytes per month.• Global data center IP traffic will increase fourfold over the next 5 years. Overall, data center IP traffic will grow at a compound annual growth rate (CAGR) of 33 percent from 2010 to 2015.Global cloud traffic:• Annual global cloud IP traffic will reach 1.6 zettabytes by the end of 2015. In 2015, global cloud IP traffic will reach 133 exabytes per month.• Global cloud IP traffic will increase twelvefold over the next 5 years. Overall, cloud IP traffic will grow at a CAGR of 66 percent from 2010 to 2015.• Global cloud IP traffic will account for more than one-third (34 percent) of total data center traffic by 2015.(Source: Cisco Global Cloud Index: Forecast and Methodology, 2010-2015)This also relates back to the growth in mobile devices and multi-media consumption on those devices.Mobile devices have memory and speed limitations that might prevent them from acting as media consumption devices, were it not for cloud applications and services. Cloud applications and services such as Netflix, YouTube, Pandora, and Spotify allow mobile users to overcome the memory capacity and processing power limitations of mobile devices. A user with an 8 GB smartphone who streams cloud video and music will consume more content over the course of 2 years than can be stored on the device itself. A smartphone user adopting Netflix, Pandora, and Facebook will generate more than twice the volume of traffic generated by a smartphone user adopting only email and web applications. Because many Internet video applications can be categorized as cloud applications, mobile cloud traffic follows a curve similar to video. Globally, cloud applications will account for 71 percent (7.6 exabytes per month) of total mobile data traffic in 2016, compared to 45 percent (269 petabytes per month) at the end of 2011. Mobile cloud traffic will grow 28-fold from 2011 to 2016, a compound annual growth rate of 95 percent.(Source: Cisco VNI p.11)Transition: What does the cloud-enablement of data centers mean for the consumer? Will we still be using the Wintel “fat clients” (laptops & PC’s with local storage and processing power) than we have all grown up with?
56% of organizations want desktop virtualization (VXI)Rather than provision each person in the organization with their own personal Wintel “space heater” complete with storage, memory, and fan to cool it (!) the shared resources model inherent in desktop virtualization offers advantages over the traditional model, in which every computer operates as a completely self-contained unit with its own operating system, peripherals, and application programs. Overall hardware expenses may diminish as users can share resources allocated to them on an as-needed basis. Virtualization potentially improves the data integrity of user information because all data can be maintained and backed-up in the data center.Potential advantages include:simpler provisioning of new desktopsreduced downtime in the event of server or client hardware-failureslower cost of deploying new applicationsdesktop image-management capabilitieslonger refresh cycle for client desktop infrastructuresecure remote access to an enterprise desktop environment (no one can leave a virtual device in the back of a taxi and lose the company secrets, as often happens with laptops).(Source: http://en.wikipedia.org/wiki/Desktop_virtualization#Advantages_and_disadvantages)Desktop Virtualization built on Cisco VXI data center delivers: Simplified, streamlined desktop operations with fewer servers and cables to manageSecure, pervasive VM-aware networking and security for virtual desktopsScalable, predictable performance with uncompromised user experienceFaster payback and ongoing savings with an optimized infrastructure and investment protectionCisco desktop virtualization technologies, services, and best practices combine with partner offerings to deliver:Open, industry-leading approach for resource efficiency and controlCisco Validated Designs that reduce the risk of moving from proof-of-concept to full-scale productionThe foundation for next-generation workspaces built on Cisco VXIData center virtualization and cloud computing transition:● The number of workloads per installed traditional server will increase from 1.4 in 2010 to 2.0 in 2015.● The number of workloads per installed cloud server will increase from 3.5 in 2010 to 7.8 in 2015.● By 2014, more than 50 percent of all workloads will be processed in the cloud.(Source: Cisco Global Cloud Index: Forecast and Methodology, 2010-2015)[NOTE: Cisco Finance presenters can also talk to the cost/benefits on virtualization vs. fat clients]Transition:So, now I’ve blinded you with science and a set of astounding statistics, what does this mean for Cisco and for you, our customers? Quite simply, the statistics I’ve just shared are the core drivers for our strategy and goals.As a result, we’re going to start seeing traditional desktops shift to virtual desktops. According to a Forrester survey of IT professionals, 56% of you want to utilize virtual desktops.
The role of the network was to provide connectivity from that desktop to the server that hosted an application. And back then, we were identified by that singular IP address associated with that computer node. That IP address was our identity.Transition:What’s the network evolved into? Well, now, it looks like this ...
Everything extends from the NetworkFrom the Desktop to the Data Center, the network unites everything. It sits like a giant “T” on top of a cumulo-nimbus cloud with pretty lights surounding it and lightbulbs on each side :-)Transition: Let’s see what this means in terms of Enterprise Networking ...So now device proliferation, mobility, cloud and virtualization are disrupting the traditional way of managing the control over their network. But the CIO is not quite ready to give up that control. He or she may be willing to move the control point and suddenly the network becomes the obvious place for that to happen <CLICK>Since everything extends from the network, it provides the context, the policy, the presence and much more intelligent information to make sure the right access is granted to the right application. Fast, reliable and secure.
Enterprise Megatrends are in these areas:Mobility for Consumer DevicesImmersive Collaboration and Pervasive Video Cloud in terms of Software as a Service (Saas)Data Center and VirtualizationWith implications for:Security in response to accelerating Cyber-ThreatsIT Productivity in terms of Service and Network ManagementGreen and efficient use of energyMegatrends:Mobility for Consumer Devices: Access a borderless network, anywhere, anytime on any device.Immersive Collaboration and Pervasive Video: Immersive Cisco TelePresence meetings connect team members face-to-face with an exceptional user experience.Cloud and Software as a Service (SaaS): Use the power of the networked datacenter and Cisco’s UCS and V-Block solutions to deliver Software as a Service over the cloud.Data Center and Virtualization: Consolidate resources in the data center with a networking fabric that allows for virtualization of servers and storage.Implications:Security in response to accelerating Cyber-Threats: Today’s enterprises are grappling with an array of security issues brought about by changing attitudes and work habits among their employees, and the dynamics of a more collaborative, connected, and mobile world. To address these threats it is neccesary to assess the totality of your network. Know where your IT infrastructure begins and ends—so many enterprises simply have no idea of the entirety of their network. Also, know what your ‘normal’ is so you can quickly identify and respond to a problem. Cisco stays ahead of the latest threats using real-time threat intelligence from Cisco Security Intelligence Operations (SIO). Cisco SIO is the world’s largest cloud-based security ecosystem, using SensorBase data of almost 1 million live data feeds from deployed Cisco email, web, firewall, and intrusion prevention system (IPS) solutions. (Source: Cisco 2011 Annual Security Report)IT Productivity in terms of Service and Network Management: Cisco network and automation products improve operational efficiency and reduce downtime, using class-leading products and solutions for managing an enterprise network, increasing efficiency with IT automation products that save time, provide clear visibility, and strengthen control over operations. (Source: http://www.cisco.com/en/US/products/sw/netmgtsw/index.html)Green and efficient use of energy: Rising energy costs, environmental concerns, government and industry directives, and heightened public scrutiny are all forcing "green" issues and practices to the forefront of business and IT plans. As a resource that touches everything, the network is ideally suited to bolster these efforts and provide much-needed relief from increasing environmental pressures.As the centerpiece of many of the world's networks, Cisco's routing and switching systems are uniquely positioned to have a positive, broad-based impact along four primary fronts:Power EfficiencyOptimized power suppliesPerformance-to-Power gainIntelligent power managementOperational EfficiencyIntegrated servicesCollaboration servicesNetwork virtualizationContinuous InnovationEvolving servicesProgressive designRegulatory complianceExtended Service LifeService readinessPlatform extensibilityComponent reuse and sharingCisco Network Systems solutions offer a range of additional benefits, including helping your business:Control energy costs and consumptionMeet regulatory requirements and business directivesImprove operational efficiency and effectiveness of ITDrive "green" business practices, such as remote collaboration and telecommutingOptimize resource utilization and minimize e-waste(Source: http://www.cisco.com/en/US/solutions/ns726/netsol_generic_enabling_green_practices.html)Transition:Now lets conclude by taking a look at the enabling technologies in the Intelligent Network ...
The Intelligent Network is enabled by technologies such as Unified Access, Virtualization Experience Infrastructure (VXI), Next Generation Wide Area Nextworks (WAN), Unified Fabric and Unified Compute.Enabling Technologies: Cisco Unified Access: Drives solutions to deliver ubiquitous access at the network edge by converging disparate wired and wireless infrastructures.Cisco VXI: Cisco Virtualization Experience Infrastructure (VXI) is an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. It helps IT provide an exceptionally flexible and secure converged infrastructure for an uncompromised user experience.Next-Gen WAN: The Cisco Next Generation Enterprise WAN (NGEW) is a Cisco end-to-end architecture that provides foundation building blocks for next-generation enterprise networks. The hierarchical design provides the scalability required by large enterprises and can be extended and replicated throughout multiple regions and theaters. This consistency leads to ease of deployment, maintenance, and troubleshooting.Unified Fabric: Cisco Unified Fabric is one of the pillars of the Cisco Unified Data Center, which unifies computing, storage, networking, and management resources to simplify IT operations, reduce costs, and increase performance. Specifically, a Cisco Unified Fabric is a data center network that supports both traditional LAN traffic and all types of storage traffic, including traditional non-IP-based protocols such as Fibre Channel and IBM Fibre Connection (FICON), tying everything together with a single OS (Cisco NX-OS Software), a single management GUI, and full interoperability between the Ethernet and non-Ethernet portions of the network.Cisco Unified Compute Systems (UCS): Is an x86 architecture data center server platform composed of computing hardware, virtualization support, switching fabric, and management software. The idea behind the system is to reduce total cost of ownership and improve scalability by integrating the different components into a cohesive platform that can be managed as a single unit.Call to Action: Please talk to your Cisco sales team about how these enabling technologies can assist your organization prepare for the astounding growth in networking between now and 2020.Transition: Thanks for listening to my presentation, does anyone have any comments, observations or questions?