In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known histori...
In thefirst partwe discussed how video services are evolving within enterprise networks. Content may be sourced from internal servers, BYOD end points or external content providers, thereby creating a mix of managed and unmanaged ...
Over the last several months, I've been pleased to invite Mark Townsley, Cisco Fellow and recognized expert on Internet Protocol (IP), to discuss IPv6 as a key enabler of theInternet of Everything (IoE). In his series of guest blo...
Delivering unified management for converged infrastructure solutions, Cisco UCS Director is an award-winning choice for managing your vBlock, FlexPod or other converged infrastructure solution. In previous blogs, I have ment...
Earlier this week, the IEEE Standards Association (IEEE-SA) announced the winners of the 2013 IEEE-SA Awards to honor standards development contributions. We are pleased to announce that Andrew Myles, Engineering Technical Lead at...
When folks ask me what policy actions are going to take place in 2014, an election year, my knee jerk reaction is to say, "not much." But when I spend a moment to think about it, there is a substantial agenda of things that can be...
As the saying goes, the constants in life are death and taxes. We all know there are more than those two, including change and its counterpart, disruption. Business success will result from responsiveness and adaptation that will ...
The Internet of Everything (IoE) is no longer a prediction. It is reality. As I think about the infrastructure needed to truly capture its value, I immediately think the network needs to be: Agile Intelligent Secure Why are t...
Following part three of our Big Data in Security series on graph analytics, I'm joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam soluti...
Following part two of our Big Data in Security series on University of California, Berkeley's AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciti...
As part of our ongoing Partner Voices blog series, we had the opportunity to hear from MCPc. During the past 11 years, MCPc has bet long on Cisco, using networking, switching, telepresence, and digital media tools within its own b...
The London EyeLast week I started my SDN reflections on the London Gartner Data Center Conference, and I found I had quite a lot to discuss. Last week I covered: Do we need SDN? SDN and the Gartner Hype Cycle SDN Deployme...