innovation

January 15, 2014

DIGITAL TRANSFORMATION

At CES, Glitzy Wearables, Snazzy Smart Cars, and, Yes, Trash Cans

Walking the miles of aisles at the 2014 Consumer Electronics Show (CES) in Las Vegas, it’s easy to see how the Internet of Everything (IoE) is revolutionizing our lives. Super-smart homes, cars, drones, and all manner of entertainment are on display seemingly everywhere, along with a mind-boggling a…

January 13, 2014

DIGITAL TRANSFORMATION

With IoE and a Smartphone, You Can Shop Like a Superhero

Superheroes and their super strengths have long captured our imaginations. And since many of these abilities are normal human traits stretched to a magical extreme, you may well have pictured how your own life would change with super speed, agility, or senses. Today, such daydreams are getting just…

December 20, 2013

DIGITAL TRANSFORMATION

The IoE Enterprise: Diverse, Inclusive, and Hyperconnected

If it seems as if the roles of chief information officer (CIO) and chief diversity officer (CDO) rarely overlap, think again. In today’s hypercompetitive — and hyperconnected — global marketplace, inclusion, collaboration, and technology are merging as essential drivers of innovation and business su…

December 13, 2013

SECURITY

Big Data in Security – Part V: Anti-Phishing in the Cloud

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to b…

December 12, 2013

SECURITY

Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop

Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it…

December 11, 2013

SECURITY

Big Data in Security – Part III: Graph Analytics

Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are t…

December 10, 2013

DIGITAL TRANSFORMATION

A Room with a View (of Crucial Big Data Insights)

What’s the problem with Big Data? You guessed right — it’s BIG. Big Data empowers organizations to discern patterns that were once invisible, leading to breakthrough ideas and transformed business performance. But there is simply so much of it, and from such myriad sources — customers, competitors,…

December 10, 2013

SECURITY

Big Data in Security – Part II: The AMPLab Stack

Following part one of our Big Data in Security series on TRAC tools, I caught up with talented data scientist Mahdi Namazifar to discuss TRAC’s work with the Berkeley AMPLab Big Data stack. Researchers at University of California, Berkeley AMPLab built this open source Berkeley Data Analytics…

December 9, 2013

SECURITY

Big Data in Security – Part I: TRAC Tools

Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley,…