operations
Mobility Trends in the Air Industry 2014
Mobile usage and penetration within the Air Industry is an interesting topic that most of us can relate to and understand to one degree or another. Having attended the recent Air Passenger EXPO in Barcelona, some of the published reports make for interesting reading. Here are some interesting perspe…
Mobile Trends & Airport Passenger Terminal Expo 2014
The annual Passenger Terminal EXPO is underway this week in Barcelona. The event provides a powerful international platform for the airport and airline sectors to interact and share common issues, goals and solutions about the airport industry, with a particular and unique focus on the terminal. Cis…
Cisco CMX @ CES 2014
This week CES was once again held in Las Vegas with in excess of 100,000 people in attendance. Cisco demonstrated a number of CMX and IoT related things this week. Firstly “The Internet of Everything: On The Go” In the Cisco booth some future thinking was applied with a concept that ima…
Big Data in Security – Part V: Anti-Phishing in the Cloud
In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to b…
Big Data in Security – Part IV: Email Auto Rule Scoring on Hadoop
Following part three of our Big Data in Security series on graph analytics, I’m joined by expert data scientists Dazhuo Li and Jisheng Wang to talk about their work in developing an intelligent anti-spam solution using modern machine learning approaches on Hadoop. What is ARS and what problem is it…
Big Data in Security – Part III: Graph Analytics
Following part two of our Big Data in Security series on University of California, Berkeley’s AMPLab stack, I caught up with talented data scientists Michael Howe and Preetham Raghunanda to discuss their exciting graph analytics work. Where did graph databases originate and what problems are t…
Big Data in Security – Part I: TRAC Tools
Recently I had an opportunity to sit down with the talented data scientists from Cisco’s Threat Research, Analysis, and Communications (TRAC) team to discuss Big Data security challenges, tools and methodologies. The following is part one of five in this series where Jisheng Wang, John Conley,…
It’s About Retail, Not Technology
Hello, and welcome to my inaugural blog! I am happy to be here sharing my thoughts and experiences with you, because I have to tell you: I have the coolest job in the world. I’ve spent my entire life in retail, starting as a part-time worker while in school and moving up through merchandising and op…
The Gold Value of a “Connected Mine”
By Tony Shakib, Vice President of IoT Vertical Business, Cisco I’ve been in IT for a long time and I often hear that data is worth its weight in gold. Well, I recently spoke with Canadian-based Dundee Mining Company about how the data generated from their mines is now “connecte…
1