analytics

January 10, 2014

NETWORKING

Cisco CMX @ CES 2014

This week CES was once again held in Las Vegas with in excess of 100,000 people in attendance. Cisco demonstrated a number of CMX and IoT related things this week. Firstly “The Internet of Everything:  On The Go” In the Cisco booth some future thinking was applied with a concept that ima…

January 9, 2014

NETWORKING

Mobile Location Based Services Trends of 2013

The holiday season which began with Cyber Monday on December 2nd 2013 has just ended and analyzing the impact on mobile commerce sales and location based services unveils some very interesting trends. Firstly, at the macro level: Online shopping increased in the USA in 2013 by over 16% compared to…

December 31, 2013

NETWORKING

Year in Review: Top 10 Mobility Blogs of 2013

Takeaway: The Cisco Enterprise Mobility group has stayed ahead of the competition by staying innovative and cutting edge while delivering quality, high performing products and solutions, while displaying thought leadership on major technological trends such as 802.11ac and location-based services. W…

December 23, 2013

NETWORKING

Looking for Santa? Use Cisco Location-Based Wi-Fi!

As children all around the world are eagerly anticipating Santa’s arrival on Christmas Eve, children in hospitals around the Americas were able to get their wish list in before the big day. This month, Cisco teamed up with several children’s hospitals with a Santa Connection project, which allowed c…

December 17, 2013

DIGITAL TRANSFORMATION

Digital Disruptors and the Future of Consulting

In my role as leader of the Analytics Practice for Cisco® Consulting Services, I often meet with clients who remind me of how the nature of consulting is changing. Traditionally, a consultant’s value and relevance to the customer has been derived from his or her business background and knowledge of…

December 13, 2013

SECURITY

Big Data in Security – Part V: Anti-Phishing in the Cloud

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to b…

December 12, 2013

SECURITY

Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop

Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it…

December 11, 2013

SECURITY

Big Data in Security – Part III: Graph Analytics

Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are t…

December 10, 2013

SECURITY

Big Data in Security – Part II: The AMPLab Stack

Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics…