Articles
Developing Products and Solutions in the 21st Century
On November 3rd, 2014 at the Software Defined Network-Multiprotocol label Switching SDN-MPLS (Software Defined Networking-Multiprotocol Label Switching) Conference in Washington D.C: I moderated a stellar panel titled, “Developing Products and Services in the 21st Century.” Quite a few of the attend…
The New Face in CyberSecurity
The demand for CyberSecurity professionals began to overtake the supply of talent 4-5 years ago. The estimated world-wide shortage is one million skilled security professionals. The sophistication and growth in number cyber attacks have outpaced the industries’ ability to respond in a timely manner.…
A Cisco Customer Solutions Architecture (CSA) Use Case in How to Manage Threat Defense
This is part 4 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Enabling & Delivering Cloud-based Security Services – Managed Threat Defense Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) clou…
A Deep Dive in the Role of Each of the Cisco Customer Solutions Architecture (CSA) Layers
This is part 3 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Physical Infrastructure Layer The physical infrastructure layer is where the physical resources reside. This includes equipment typically used in a data center such as network devices (switches,…
What is the Cisco Customer Solutions Architecture (CSA) Layered Approach?
This is part 2 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. CSA Description The following figure shows a simplified view of the Cisco CSA. It has five horizontal layers: Physical Infrastructure layer, Virtualized Infrastructure layer, Services layer, Ser…
Your Business Powered By Cisco Customer Solutions Architecture (CSA). What are Cisco CSA’s Benefits?
This is part 1 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series. Many IT organizations are challenged to take advantage of the new technologies enabled by Virtualization, Cloud, Analytics and IoT. Applications enabled by these new technologies must be protec…
Why Information and Communication Technology (ICT) Matters for Girls
I am writing this blog as the 2014 recipient of the IEEE Women in Engineering Region 8 Clementina Saduwa Award named after an amazing woman whose life was cut short in 2007. On a personal level, I am extremely passionate about the possibilities that technology presents for young girls and aspiring w…
Virtualization: Can We Deconstruct the Problem and Opportunity?
This was the title of a November 19 2013 panel that I had moderated in Washington D.C. at the MPLS-SDN Isocore Conference. The abstract for this conference was designed to be a bit provocative, specifically: “ Virtualization as a concept is not new. However, in the context of Software Defined Networ…
Internet of Everything (IoE) Secure Framework
This is my third blog under the series of Internet of Everything (IoE) Security having written the Introduction, and having proposed proposed an architectural view. To address the highly diverse IoE environment and the related security challenges, a flexible security framework is required. Our fram…
2