Communicating in an IP World 30 How Technology Is Transforming Business

Total Page:16

File Type:pdf, Size:1020Kb

Communicating in an IP World 30 How Technology Is Transforming Business CISCO SYSTEMS USERS MAGAZINE SECOND QUARTER 2004 Communicating in an IP World 30 How Technology Is Transforming Business 19 Power over Ethernet 65 Service-Driven Metro Networks 80 Branch of the Future 57 Business Ready Data Center cisco.com/packet Reprinted with permission from Packet® magazine (Volume 16, No. 2), copyright © 2004 by Cisco Systems, Inc. All rights reserved. PACKET MAGAZINE FROM THE EDITOR DAVID BALL EDITOR-IN-CHIEF JERE KING PUBLISHER What’s in a Name? JENNIFER REDOVIAN MANAGING EDITOR SUSAN BORTON SENIOR EDITOR f the name is ip communications, the JOANIE WEXLER answer is lots. When I first heard the term used to refer CONTRIBUTING EDITOR to IP telephony service, I must admit, I didn’t like it. I R.J. SMITH thought it was far too broad and generic. After all, isn’t SUNSET CUSTOM PUBLISHING I PRODUCTION MANAGER e-mail a form of IP communications? As a matter of fact, it is. And so is IP telephony, and video telephony, and con- MICHELLE GERVAIS, NICOLE MAZZEI MARK RYAN, NORMA TENNIS ferencing, and voice mail, and unified messaging. SUNSET CUSTOM PUBLISHING IP communications, it turns out, is a great way to PRODUCTION describe the myriad ways in which we can communicate JEFF BRAND ART DIRECTOR and collaborate over an IP network. IP communications, EMILY BURCH as a solution from Cisco, not only encompasses the ser- DESIGNER vices noted above; it includes contact centers (or, more pre- ELLEN SOKOLOFF cisely, Customer Interaction Networks), voice gateways DIAGRAM ILLUSTRATOR and applications, security solutions, and network man- BILL LITTELL PRINT PRODUCTION MANAGER agement. These applications and services are not only CECELIA GLOVER TAYLOR incremental to your existing network investment, but they go a long way in boosting pro- CIRCULATION DIRECTOR ductivity and driving down total cost of ownership. Because of it, IP communications is SPENCER TOY transforming the way businesses communicate, internally and externally. COVER PHOTOGRAPH And that’s what we focus on in this issue of Packet® (starting on page 30). We share SPECIAL THANKS TO THE FOLLOWING CONTRIBUTORS: STEVE ANDERSON, GREG BEACH, with you real-life, innovative uses of IP telephony; audio and videoconferencing; unified KAREN DALAL, GRACE HU-MORLEY, JANICE KING, messaging; and other IP communications solutions in several industries, including trans- BRIAN MCDONALD, MARCUS PHIPPS, KARYN SCOTT, BILL STEPHENS, LAURA STIFF portation, manufacturing, government, and education (page 36). Learn how Cisco’s new ADVERTISING INFORMATION: video telephony solution is helping to break down the cost and usage barriers associated Kristen Bergman, 408-525-2542 with traditional video telephony and conferencing systems (page 45). We also offer ten [email protected] top tips to help guide a successful IP telephony implementation—gleaned from Cisco’s View Packet magazine at cisco.com/packet. own IP telephony deployment and lessons learned such as the importance of under- PUBLISHER INFORMATION: standing your users’ expectations and requirements (page 48). Packet magazine (ISSN 1535-2439) is published quarterly by Cisco Systems and distributed free of Integral to many of these IP communications services and applications is the Cisco IP charge to users of Cisco products. Application to Phone. In fact, Cisco IP phones are displacing approximately 5000 circuit-based, tradi- mail at Periodicals Rates pending at San Jose, California, and additional mailing offices. tional phones each business day, up from 2000 per business day a year ago. While the POSTMASTER: Please send direct address corrections productivity gains associated with IP phones’ simple adds, moves, and changes are sub- and other correspondence to [email protected] stantial, the real business value is being realized by those companies that integrate their or to Packet in care of: business processes with their new communications infrastructure and tap into exciting Packet Magazine PO Box 2080 applications that make the network work for them. Skokie, Illinois 60076-9324 Many Cisco partners are developing easy-to-use applications based on open standards USA Phone: 847-647-2293 such as Extensible Markup Language (XML), which demonstrate the power of Cisco IP phones to solve business problems, streamline business communications, and bolster Aironet, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, Cisco IOS, Cisco Networking Academy, Cisco Press, the Cisco employee productivity and customer satisfaction (see page 41). Powered Network logo, the Cisco Systems logo, Cisco Unity, IOS, IP/TV, iQ, Packet, PIX, SMARTnet, and StackWise are registered As business-wise and increasingly popular as IP-based communications are, they do not trademarks or trademarks of Cisco Systems, Inc., and/or its affil- diminish the value of communicating face to face—which is exactly how we hope to speak iates in the USA and certain other countries. All other trademarks mentioned in this publication are the property of their respective with you at this year’s US Networkers conference in New Orleans, Louisiana (July 11 through owners. 16). Come “Meet the Editors” at the Packet booth in the World of Solutions. Talk to us about Packet copyright © 2004 by Cisco Systems, Inc. All rights your job, the network challenges you’ve overcome, and IP communications or other inno- reserved. Printed in the USA. vative applications or services you’ve recently deployed. We’re especially interested to hear No part of this publication may be reproduced in any form, or how your company or organization is leveraging network technology to compete or change by any means, without prior written permission from Cisco Systems, Inc. the rules in your respective industry. This publication is distributed on an “as-is” basis, without war- We want to hear from you. Because when it comes to the pages of Packet, your voice ranty of any kind either express or implied, including but not is our greatest asset. limited to the implied warranties of merchantability, fitness for a particular purpose, or noninfringement. This publication could contain technical inaccuracies or typographical errors. Later issues may modify or update information provided in this issue. Neither the publisher nor any contributor shall have any liabili- ty to any person for any loss or damage caused directly or indi- Editor-in-Chief rectly by the information contained herein. Packet This magazine is printed on recycled paper. [email protected] 10% SECOND QUARTER 2004 PACKET 1 TOTAL RECOVERED FIBER Reprinted with permission from Packet® magazine (Volume 16, No. 2), copyright © 2004 by Cisco Systems, Inc. All rights reserved. Mail Tracking Down Top Talkers because in some situations Lightweight Directory Protocol (LDP) is also used Affan Basalamah presented a very inter- (although using LDP is not a good idea esting Reader Tip [First Quarter 2004] on for obvious reasons). I am interested in how to track down “top talkers” on a fully your comments on this. meshed network using alias commands to speed up the process. While the discus- Second, the article refers to EXP bits in sion of aliases is very useful, the tip never the shim header, but there are no EXP bits. I think that these are referred to as Tech Tips Top His List addressed the real problem in this situa- tion. Without a network analysis module COS bits instead of EXP bits, which again creates confusion because the The First Quarter 2004 issue of (NAM) or other tools, how do you find the EXP bits terminology, though used in the Packet® was excellent with its cov- IP address of the top talker in the first past, is now deprecated. erage of security, IOS®, high avail- place? I believe this is of far more value in ability, etc. I read with particular a real-world situation, and is the first step —Noman Bari, CTTC PVT. Ltd., Karachi, Pakistan interest of the AutoSecure feature in solving a customer’s complaint that The following is a response by author in Cisco IOS Software Release 12.3 “the network is slow.” Santiago Alvarez.—Editors Mainline. But all the information is —Blue Beckham, APS, Phoenix, Arizona, USA very helpful to us because we’re Regarding the first point, MPLS does installing a Cisco infrastructure at The following is a response by Cisco not imply traffic engineering. Large our facilities. I am familiar with Hot Technical Support Engineer Phillip MPLS deployments worldwide don’t Standby Router Protocol (HSRP) Remaker.—Editors make use of MPLS-TE. Because TE tech- and Virtual Router Redundancy The tip is how to locate the port where an niques are applied at different levels Protocol (VRRP) but was not famil- IP address lives once you identify the IP (for example, TDM, SDH, ATM, etc.), iar with Gateway Load Balancing address. We assume you found a suspi- MPLS acts as a qualifier that defines the Protocol (GLBP) until now. The arti- cious IP address by other means. Using context under which TE is being dis- cle on GLBP written by Rick the Cisco Intrusion Detection System cussed. Regarding the second point, my Williams, “High Availability for (IDS) product line is an excellent way to notation is consistent with RFC 3032 Campus Networks,” is especially find devices with anomalous behavior. (www.faqs.org/rfcs/rfc3032.html) and useful to me. I probably will be You can also use NetFlow and NetFlow industrywide use. able to use GLBP for my dual-con- statistics on routers to find top talkers. nected remote sites to do load sharing. I also liked the security Point of Confusion best practices section of the article CORRECTION “Proactive Protection.” Last year In the article “Is It Time to Converge? The article “A Winning Game Plan” the NetFlow feature on the routers [Fourth Quarter 2003], I am confused on [First Quarter 2004, page 33] inac- helped me to track down most talk- two points. First, I think adding the TE curately stated that storage-area ing devices and shut them down to acronym to MPLS (MPLS-TE) is mislead- networks are often located offsite.
Recommended publications
  • Skates and Rays Diversity, Exploration and Conservation – Case-Study of the Thornback Ray, Raja Clavata
    UNIVERSIDADE DE LISBOA FACULDADE DE CIÊNCIAS DEPARTAMENTO DE BIOLOGIA ANIMAL SKATES AND RAYS DIVERSITY, EXPLORATION AND CONSERVATION – CASE-STUDY OF THE THORNBACK RAY, RAJA CLAVATA Bárbara Marques Serra Pereira Doutoramento em Ciências do Mar 2010 UNIVERSIDADE DE LISBOA FACULDADE DE CIÊNCIAS DEPARTAMENTO DE BIOLOGIA ANIMAL SKATES AND RAYS DIVERSITY, EXPLORATION AND CONSERVATION – CASE-STUDY OF THE THORNBACK RAY, RAJA CLAVATA Bárbara Marques Serra Pereira Tese orientada por Professor Auxiliar com Agregação Leonel Serrano Gordo e Investigadora Auxiliar Ivone Figueiredo Doutoramento em Ciências do Mar 2010 The research reported in this thesis was carried out at the Instituto de Investigação das Pescas e do Mar (IPIMAR - INRB), Unidade de Recursos Marinhos e Sustentabilidade. This research was funded by Fundação para a Ciência e a Tecnologia (FCT) through a PhD grant (SFRH/BD/23777/2005) and the research project EU Data Collection/DCR (PNAB). Skates and rays diversity, exploration and conservation | Table of Contents Table of Contents List of Figures ............................................................................................................................. i List of Tables ............................................................................................................................. v List of Abbreviations ............................................................................................................. viii Agradecimentos ........................................................................................................................
    [Show full text]
  • Use Style: Paper Title
    3rd National Conference On Emerging Trends In Computer Science & Engineering (NCETCSE-2017) INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) ISSN: 2349-4689 FOG COMPUTING Securing the Cloud and its Applications in IOT [1]Kavana S P, [2]Swathi V S, [3]Ujwal S, & [4]Shivaraja H M Dept. of CSE & ISE BGS Institute of Technology Abstract— Cloud computing will significantly change the way efficiently, though it may also be used for security and we use our computer & store our personal and public compliance reasons. Popular fog computing applications information because of its flexibility and scalability cloud include smart grid, smart city, smart buildings, vehicle competing is considered as one of the most exciting technology. network and software-defined network [1]. Now a day The threat in cloud is data security. The fog computing is every organization from large-scale to small-scale industry introduced in order to overcome the limitations in cloud [2] computing. The fog computing is associated with the Advanced depends on the cloud computing technology to store Encryption Standard (AES) Algorithm. Which is considered to their data and to retrieve the data. As per the survey in the be the most advanced and secured standard for encryption of year 2010. The number of devices connected to the internet electronic data. Fog computing is not the replacement of cloud has exceeded the world’s population and it is believed that computing, it is defined as cloud computing paradigm. The term in the next five years from now it would be above 50 “fog computing” or “fogging” describes a decentralized billion of devices connected to the internet increases there computing infrastructure, where computing resources and will be problem in the storage as well as information application services are brought to the edge of the network retrieval process.
    [Show full text]
  • Carlos César Elogia Qualidade Da Obra De Requalificação Da Estrada De Água D´Alto
    2 Carlos César elogia qualidade da obra de requalificação da estrada de Água d´Alto Editorial Newsletter, ou melhor, Boletim de Notícias este tempo da “arroba” a difusão informativa at- Os principais investimentos em curso e os grandes inge novas dimensões .através das Tecnologias objectivos deste departamento do Governo Regional Nde Informação. Este Boletim Informativo da Sec- dos Açores são ilustrados de modo a permitir um maior retaria Regional da Ciência, Tecnologia e Equipamentos conhecimento e proximidade com a realidade da nossa (doravante SRCTE) procurará, de modo despretensioso Região. Esta legislatura está indissociavelmente marcada mas rigoroso, chegar às caixas de correio de todos quan- por objectivos e práticas que visam a inovação e a qualifi- tos se interessem pelas competências e atribuições da cação num quadro de melhoria da vida das pessoas, afi- SRCTE. nal a primeira e última metas do nosso desenvolvimento. Este Boletim Informativo materializa e ilustra as medi- Novos desafios requerem novas perspectivas políticas das e acções do Governo dos Açores nas áreas da Ciên- que devem abrir novas janelas de oportunidades. cia, Tecnologia, Comunicações, Obras Públicas/Edificios e Transportes Terrestre, Protecção civil e do trabalho É no quadro de uma Nova Autonomia da Informação e laboratorial em engenharia civil. Trata-se de informar so- do Conhecimento e nesta busca “digital” e insatisfação bre o grau de cumprimento do programa doX Governo recorrente que queremos sempre mais para os Açores. Regional dos Açores, presidido por Carlos César, nos sectores referidos. Desejo a todos um Feliz Natal e um Próspero 2012. A visão diacrónica e transversal a todas as ilhas é igualmente uma exigência que cultivamos no quadro da diversidade e unidade regional.
    [Show full text]
  • Entrepreneurship and the Industry Life Cycle the Changing Role of Human Capital and Competences Studies on Entrepreneurship, Structural Change and Industrial Dynamics
    Studies on Entrepreneurship, Structural Change and Industrial Dynamics Serena Cubico · Giuseppe Favretto João Leitão · Uwe Cantner Editors Entrepreneurship and the Industry Life Cycle The Changing Role of Human Capital and Competences Studies on Entrepreneurship, Structural Change and Industrial Dynamics Series editors João Leitão University of Beira Interior, Covilhã, Portugal Tessaleno Devezas University of Beira Interior, Covilhã, Portugal The ‘Studies on Entrepreneurship, Structural Change and Industrial Dynamics’ series showcases exceptional scholarly work being developed on the still unexplored complex relationship between entrepreneurship, structural change and industrial dynamics, by addressing structural and technological determinants of the evolutionary pathway of innovative and entrepreneurial activity. The series invites proposals based on sound research methodologies and approaches to the above topics. Volumes in the series may include research monographs and edited/ contributed works. Please send the completed proposal form downloadable from this page (see “For Authors and Editors”) to the series editors. More information about this series at http://www.springer.com/series/15330 Serena Cubico • Giuseppe Favretto • João Leitão • Uwe Cantner Editors Entrepreneurship and the Industry Life Cycle The Changing Role of Human Capital and Competences Editors Serena Cubico Giuseppe Favretto Department of Business Administration Department of Business Administration University of Verona University of Verona Verona, Italy Verona, Italy João Leitão Uwe Cantner Department of Management and Friedrich Schiller University Jena Economics Jena, Germany University of Beira Interior Covilhã, Portugal ISSN 2511-2023 ISSN 2511-2031 (electronic) Studies on Entrepreneurship, Structural Change and Industrial Dynamics ISBN 978-3-319-89335-8 ISBN 978-3-319-89336-5 (eBook) https://doi.org/10.1007/978-3-319-89336-5 Library of Congress Control Number: 2018944276 © Springer International Publishing AG, part of Springer Nature 2018 This work is subject to copyright.
    [Show full text]
  • Membership Directory 2016–2017
    Membership Directory 2016–2017 Moving Forward Together INTERNATIONAL ASSOCIATION OF MOVERS IAM is planning an exciting new online membership directory next year. It will be built around the ability to search IAM’s membership by region and specialty, among other attributes. The directory will be linked to our member database, so your search results will always be current, and new member companies and branches will immediately appear in the directory. This new format will be a significant upgrade for our members, and IAM looks forward to presenting it to you. INTERNATIONAL ASSOCIATION OF MOVERS 5904 Richmond Highway, Suite 404 Alexandria, Virginia 22303 USA Phone (703) 317-9950 Fax (703) 317-9960 E-mail: [email protected] Website: www.IAMovers.org © 2016 International Association of Movers This Directory is intended solely for the personal use of members of the International Association of Movers (IAM). Neither this Directory nor any of the information contained herein may be reproduced either in whole or in part without prior written consent of IAM. All other uses are expressly prohibited. The Directory may not be used for any bulk mailings or solicitations. IAM has made its best effort to ensure the accuracy of this Directory, prepared with the best information available at the time of publication (August 2016). The Association disclaims liability for any inaccuracies, errors or omissions. TABLE OF CONTENTS IAM LEADERSHIP ......................................................................................................9 GOVERNING
    [Show full text]
  • Relatórios Científicos E Técnicos Do Ipma – Série Digital
    2 RELATÓRIOS CIENTÍFICOS E TÉCNICOS DO IPMA – SÉRIE DIGITAL Destinam-se a promover uma divulgação rápida de resultados de carácter científico e técnico, resultantes da actividade de investigação e do desenvolvimento e inovação tecnológica nas áreas de investigação do mar e da atmosfera. Esta publicação é aberta à comunidade científica e aos utentes, podendo os trabalhos serem escritos em Português, Francês ou Inglês. Edição IPMA Rua C - Aeroporto de Lisboa 1749-007 LISBOA Portugal Corpo Editorial Francisco Ruano – Coordenador Aida Campos Irineu Batista Lourdes Bogalho Mário Mil-Homens Rogélia Martins Teresa Drago Edição Digital Anabela Farinha As instruções aos autores estão disponíveis no sitio web do IPMA http://ipma.pt ou podem ser solicitadas aos membros do Corpo Editorial desta publicação Capa Conceição Almeida ISSN 2183-2900 Todos os direitos reservados 3 A investigação realizada no IPMA de suporte ao aconselhamento científico para a gestão de espécies de raias Bárbara Serra-Pereira, Catarina Maia, Neide Lagarto e Ivone Figueiredo Instituto Português do Mar e da Atmosfera, IPMA I.P., Divisão de Modelação e Gestão de Recursos da Pesca (DivRP) R. Alfredo Magalhães Ramalho, 6, 1495-006 Lisboa, Portugal Recebido em 2018.07.10 Aceite em 2018.09.04 RESUMO O IPMA é o responsável nacional pelo estudo e avaliação do estado de exploração de algumas espécies de raias de interesse comercial. Cerca de 80% dos desembarques de espécies de raia são resultado de pescaria acessória da frota polivalente portuguesa, constituída por embarcações detentoras de licenças para várias artes de pesca (e.g. redes de tresmalho, redes de emalhar, palangre) e que operam na plataforma continental portuguesa.
    [Show full text]
  • GAVS Pulse Magazine
    December 2016 Blogger's Corner Coffee VIEW POINT with THE Reading Lounge Star Team Tech-Watch Trekking at Nagalapuram Drones in movies Kiru Editor's Notes Drones by Bindu Vijayan Drones are the 'new cool' in technology, their Drones have become the eyes for scientists to popularity increasing for a variety of purposes, survey areas for archaeological sites, they are used from atmospheric research, war, military, sports to detect crop damage and pick out illegal hunting, photography, wildlife, disaster relief, they are even the technology has come such a long way in such sent inside hurricanes to study wild storms, the list short time and impacted society, and then of goes on. course there are drones to replace lightbulbs, drones hunting to catch prey in a net, and beat this Here's something interesting I came across, when – a lazy man gets his drone to pull his kayak! you hear how it is used for the good of mankind, the news must spread – In a first, Drones are being In the US more than 550,000 unmanned aircrafts used to collect medical samples from a remote have registered since the FAA created a drone region in Madagascar's Ifanadiana district that has registration system. You can face fines and even jail no roads, a trip to the place takes more than 10 time if you don't abide by the rules. Respect the hours by foot. The doctors at Stony Brook no-fly zones set by the system, and contact the University Medicine are using drones to offer control tower if you are near an airport.
    [Show full text]
  • Defending Connected Vehicles Against Malware: Challenges and a Solution Framework Tao Zhang, Fellow, IEEE, Helder Antunes, and Siddhartha Aggarwal (Invited Paper)
    10 IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014 Defending Connected Vehicles Against Malware: Challenges and a Solution Framework Tao Zhang, Fellow, IEEE, Helder Antunes, and Siddhartha Aggarwal (Invited Paper) Abstract—Vehicles face growing security threats as they become Researchers and hobbyists have been able to compromise tire increasingly connected with the external world. Hackers, research- pressure monitoring systems (TPMS), which are implemented on ers, and car hobbyists have compromised security keys used by the “ ” fi many vehicles today, to set false low tire pressure warnings [3], electronic control units (ECUs) on vehicles, modi ed ECU software, fl and hacked wireless transmissions from vehicle key fobs and tire which can fool a driver into believing she actually has a at tire monitoring sensors, using low-cost commercially available tools. while traveling at high speeds. Once again, this can be accom- However, the most damaging security threats to vehicles are only plished easily and using low cost and widely available tools. emerging. One such threat is malware, which can infect vehicles in a The most damaging security threats, however, are only emerg- variety of ways and cause severe consequences. Defending vehicles ing as vehicles connect to the Internet, provide onboard Wi-Fi against malware attacks must address many unique challenges that have not been well addressed in other types of networks. This paper hotspot services, communicate with other vehicles and Intelli- identifies those vehicle-specific challenges, discusses existing solu- gent Transportation System (ITS) infrastructures, and support tions and their limitations, and presents a cloud-assisted vehicle advanced applications such as over-the-air (OTA) ECU firmware malware defense framework that can address these challenges.
    [Show full text]
  • Iiot Distributed Computing in the Edge Contents
    The Industrial Internet of Things Distributed Computing in the Edge Version 1.1 2020-10-18 John Zao (NCTU), Chuck Byers (IIC), Brett Murphy (RTI), Salim AbiEzzi (VMware) Don Banks (Arm), Kyoungho An (RTI), Frank Michaud (Cisco Systems), Katalin Bartfai-Walcott (Intel) IIoT Distributed Computing in the Edge Contents CONTENTS 1 Why Distribute Computing Towards the Edge? .................................................................. 2 1.1 Business Benefits ................................................................................................................. 2 1.2 Desired Properties ............................................................................................................... 4 2 A Framework .................................................................................................................... 6 2.1 Edge Systems ...................................................................................................................... 8 2.2 Communication Pathways ................................................................................................. 10 2.3 Deployment Models .......................................................................................................... 11 2.4 Supporting Technologies .................................................................................................... 12 3 Trusted Computing Module ............................................................................................. 14 3.1 Booting Trusted Hardware ................................................................................................
    [Show full text]
  • Fog Computing
    International Journal of Trend in Research and Development, Volume 4(1), ISSN: 2394-9333 www.ijtrd.com Fog Computing- An Overview 1A.DhivyaDharshana, 2K.Ramya and 3N.Kanimozhi, 1,2Student, 3Assistant Professor, 1,2,3Department of Information Technology, Sri Krishna Arts and Science College, Coimbatore, Tamil Nadu, India Abstract-- In this paper we have given an overview about FOG COMPUTING with its history, introduction, merits demerits ,applications and conclusion .Fog computing, also known as fog networking or fogging, is a decentralized computing infrastructure in which data, compute, storage and applications are distributed in the most logical, efficient place between the data source and the cloud. Fog computing essentially extends cloud computing and services to the edge of the network, bringing the advantages and power of the cloud closer to where data is created and acted upon. Keywords-- Fog, Edge computing. I. HISTORY Figure 2: Fog Computer Architecture On November 19, 2015, Cisco Systems, ARM Holdings, Dell, Intel, Microsoft, and Princeton University, founded the Open One use case for fog computing is a smart traffic light system, Fog Consortium, to promote interests and development in fog which can change its signals based on surveillance of incoming computing. Cisco Sr. Managing-Director Helder Antunes traffic to prevent accidents or reduce congestion. Data could became the consortium's first chairman and Intel's Chief IoT also be sent to the cloud for longer-term analytics. Strategist Jeff Faders became its first president. [1] Other cases described by Cisco might include rail safety; power II. INTRODUCTION restoration from a smart grid network; and cyber security.
    [Show full text]
  • Openfog Consortium
    OpenFog Consortium “Fog! The Journey so far…” Helder Antunes, OpenFog Chairman – Cisco Sr. Director https://www.youtube.com/watch?v=tuo5Pxc4w3c&feature=youtu.be What is fog computing? CLOUD FOG COMPUTING A system-level horizontal architecture that distributes computing, storage, and networking closer to users, and anywhere along the Cloud-to-Thing continuum Why Fog? It’s necessary to run IoT, 5G and AI applications Barcelona Project • Aggregating multiple services in the cabinets ▪ CAPEX and OPEX reduction for City and provide more opportunities to create new services for its citizens •Sensory aggregation & Telemetry •Connectivity on demand •Video Surveillance •Power Management •Traffic Management Cars/Buses/Trains/ Stations Streets/Tracks Police •Onboard Monitoring •Passenger Safety •Safety/Risk Protection • 4G • 4G • 4G and/or WiFi Mesh • GPS/Asset • Surveillance connected • Surveillance • Counting/Warning Analytics • Video storage • VoIP • Monitoring • Entertainment WiFi • Link to traffic management • Autonomy • Parking • Drone Ground Support Upstream Midstream Downstream •Rig/Well In a Box •Remote Monitoring •Intelligent Station • Employee WiFi • Surveillance • PoS backup • Remote Expert • Sensor Monitoring/Alarms • Surveillance & Access Control • Surveillance/Sensors/Alarms • Local WiFi •Oil Sands Operations •Intelligent Transport • Power Management • Pit Surveillance • GPS and Asset Tracking • Heavy Eqpt Monitoring • Real time visual display • Anti-Collision • VoIP Communications These scenarios require SCALE Security Cognition Agility
    [Show full text]
  • Page 1 of 3 EXPRESSO
    EXPRESSO - Ter um lóbi é o segredo Page 1 of 3 Edição Premium Gestão E-xpresso NOVO Versão Html Ter um lóbi é o segredo 1.º Caderno Hélder Antunes, director na Cisco, no Silicon Valley, explica o que Economia os governantes ainda não perceberam Única Actual Alterar Controlo da Opinião tamanho Tâmega muda Edições Anteriores de mãos Lojas Internacionais “Ter empresas portuguesas cotadas no Sapo salta para Expresso via Satélite NASDAQ é um «plus», mas isso não é uma Cabo Verde panaceia”, afirma Hélder Antunes, a Zeinal Bava à propósito da recente aquisição da Chipideia Actualidade frente da PT a pela MIPS, que assim, (“às cavalitas”, no partir de 2008 Economia dizer de Epifânio da Franca, fundador da Desporto empresa portuguesa) consegue chegar a Empresário Multimédia este mercado financeiro de Nova Iorque. português compra equipa Expresso TV Para o responsável pela área de segurança de F1 Dossiês da Cisco Systems, que vive e trabalha há Road-show dos Postais décadas na Califórnia, esta aquisição é um portos começa Enviados sinal de vitalidade das tecnológicas na China Rede Expresso portuguesas, mas considera que, antes de Estratégia chegarem ao NASDAQ, é mais importante África O despertar do que “tenham acesso a quem decide e gigante Comunidade influencia”. A questão é, por isso, política. Macroeconomia Fóruns Crise do Blogues Para que tal aconteça, Hélder Antunes, diz «subprime» na ser fundamental haver um lóbi português no Opinião ementa do Silicon Valley. “Mesmo países como a Ecofin Guia do Estudante Roménia já perceberam isso: ainda há “Até países como a Roménia já Cartaz pouco tempo fui contactado por um perceberam como funciona” Fundos propõem BCBM representante do lóbi romeno perguntando se eu estava interessado em fazer o «outsourcing» de engenharia para este diferente Gourmet país”, exemplifica o quadro superior da Cisco.
    [Show full text]