IoT
Solving Security and Compliance Problems with Cisco Business Critical Services
Organizations today need to be both nimble and secure. They’re adopting Cloud, IoT, and machine learning at increasingly quickening speed as well as evolving their applications and endpoints as well as campus, data center, and WAN networking to adapt to their digital business as well as address secu…
Embedded switches for custom needs and extreme conditions
Guest Blogger: Hari Srinivasan, Sr. Product Manager Hari Srinivasan manages the Industrial Ethernet and Embedded Switching products at Cisco’s IoT Networking group. From supporting soldiers in the battlefield or first responders at a disaster scene, to maintaining high-value infrastructure, a…
Cisco and Downer Partnership Delivers First Smart Cities Project
Cisco and Downer have an ongoing strategic Internet of Things (IoT) partnership that was recently expanded to include Smart Cities. Downer, a diversified engineering and services company headquartered in Australia, in August of 2017, secured a contract to build out and, with the system owner, co-man…
Delivering IoT with Best-in-Class Wi-Fi through the Aironet Developer Platform
Suppose you wanted to have the ability to know where hundreds of ship-board guests were spending their time on a cruise—pool-side, buffet, bar, theatre—to improve the guest experience. Or in a healthcare environment, you need to know where critical medical equipment is located in real time. In a mul…
Best Security Practices for Fog Computing
For several years now, Cisco has been advocating for Fog Computing as an essential element of a scalable, reliable and cost effective IoT architecture. By developing Industrial IoT solutions based on Cisco IOx, data originating from “things” can be locally filtered, analyzed and manipulated on IIoT…
New VPNFilter malware targets at least 500K networking devices worldwide
Intro For several months, Talos has been working with public- and private-sector threat intelligence partners and law enforcement in researching an advanced, likely state-sponsored or state-affiliated actor’s widespread use of a sophisticated modular malware system we call “VPNFilter.…
How We Use Fog Computing: Vertical Markets, Use Cases, and Applications
Cisco is fortunate to have technical leaders who are helping to shape the industry approach to emerging technologies such as fog computing. I’m pleased to have as a guest blogger Chuck Byers, senior software engineering lead in Cisco’s Enterprise Networking IoT Engineering group. As co-chair of the…
Greater Wi-Fi Adoption brings the need of higher security
Over the last few years, Wi-Fi has become the primary mode for network access. This is especially true in the consumer market where the rapid adoption of Smart Home technology, streaming media and IoT devices has increased the number of devices in the home. The need for flexible workspace and ubiqui…
Imagine What’s Possible in a 5G World
Stop where you are and consider this: there’s a colossal chance you’re reading this text on your mobile phone. Are you? Maybe not, but probably so. However, even if you’re not reading this text on your phone, statistics suggest you’ve read an article or a blog or some other web-based text on your mo…