Digital Transformation

Do you Trust your IoT Device and its Vendor?

Does your vendor care about deploying security patches or firmware updates? Do they understand the constrains of an Internet of Things (IoT) architecture? Do they communicate important actions you need to take and are committed to conducting business at the highest standards? If you have not asked y…

Data-Driven Hacks Part 5: How Can You Make Trust Key to Your Success?

As you package together these hacks, be sure to include this final hack. It’s critical—and, surprisingly, often overlooked. Hack No. 4: Trust is the Key to Success The final consideration for proactive change is building trust by sharing data that shows you’re listening. This is worth repeating. Bui…

Embedded switches for custom needs and extreme conditions

Guest Blogger: Hari Srinivasan, Sr. Product Manager Hari Srinivasan manages the Industrial Ethernet and Embedded Switching products at Cisco’s IoT Networking group.   From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, a…

Data-Driven Hacks Part 4: How Can You Rely on a Diverse Listening Infrastructure?

In Part 3 of my hack blog series, I shared the value of accessing talent to dig into your data. Together with understanding process, you’ll be a step ahead in transitioning your business in a very competitive landscape. Today, I’m introducing my third data-driven hack. A hack you need to get started…

Data-Driven Hacks Part 3: How Can You Access Talent to Dig into Data?

In my previous blog, I introduced the power of understanding your process to make improvements and increase productivity. This hack is especially important to be an expert—and make decisions based on that expertise. My second of four data-driven hacks relates to talent. Finding it. Leveraging it. Re…

Best Security Practices for Fog Computing

For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…

Data-Driven Hacks Part 2: How Can You Master the Past to Own the Future?

In my previous blog, I introduced the fact that real time isn’t always enough. In many cases, real-time data leads to reactive decisions. Not very conducive in our ever-evolving digital world. But you’re not alone. I have four hacks—all driven by data—that can help your organization benefit from a v…

The Data-Driven Hacks You Need Now to Be Proactive (Part 1)

Imagine this. You receive a notification that the nuclear power plant you work in is about to explode. You’re in the plant’s breakroom—dead center in the building. Isn’t it a little too late to receive this news? Chances are, you don’t work in a nuclear power plant. And chances are, you’ll never ha…

IoT Endpoints Are Coming Out of the Closet

Embrace the future of enterprise security, scale and management by protecting IoT endpoint devices as if they were inside the building-networking closet. “Growth, growth and more growth” describes the exponential explosion of the global IoT market growing from $157B in 2016 to $457B by 2020, attaini…