SlideShare uma empresa Scribd logo
1 de 15
© 2012 Cisco and/or its affiliates. All rights reserved. 1© 2012 Cisco and/or its affiliates. All rights reserved. 1
Syed Hoda
General Manager, Emerging Solutions Group
Cisco
© 2012 Cisco and/or its affiliates. All rights reserved. 2
Source: Cisco Visual Networking Index 2011
© 2012 Cisco and/or its affiliates. All rights reserved. 2
© 2012 Cisco and/or its affiliates. All rights reserved. 3
by 2020
will flow through the network
Translates to each
owning on average
Source: Cisco Visual Networking Index 2011
© 2012 Cisco and/or its affiliates. All rights reserved. 3
© 2012 Cisco and/or its affiliates. All rights reserved. 4
Source: Goldman Sachs, 2010, Cisco
Over
will have been
By the we are done
with this
© 2012 Cisco and/or its affiliates. All rights reserved. 4 4
© 2012 Cisco and/or its affiliates. All rights reserved. 5
willquadruple
allIPTRAFFICby
Source: Cisco Visual Networking Index 2011
© 2012 Cisco and/or its affiliates. All rights reserved. 5
© 2012 Cisco and/or its affiliates. All rights reserved. 6
Source: Cisco Visual Networking Index 2011
With
Video by
being
of the world’s
© 2012 Cisco and/or its affiliates. All rights reserved. 6
© 2012 Cisco and/or its affiliates. All rights reserved. 7
by 2012
of enterprises
Enterprise-class
willbeusedby
Source: State of the CIO 2011 Study,
CIO Magazine
© 2012 Cisco and/or its affiliates. All rights reserved. 7
of enterprises
will be pursuing a
by
Sources: Gartner (February 2012)
© 2012 Cisco and/or its affiliates. All rights reserved. 8
of ORGANIZATIONS
want
Source: Forrester, 2010
© 2012 Cisco and/or its affiliates. All rights reserved. 8
© 2012 Cisco and/or its affiliates. All rights reserved. 9
The
Network Data
CenterDesktop
© 2012 Cisco and/or its affiliates. All rights reserved. 10
The
Network Data
CenterDesktop
11
The Next Network and the Internet of Things
The Network is the Platform
Consumer
Video
Security
Networked Home
Industrial
(Internet of Things)
Buildings
Transportation
Physical Security
Utilities (Smart Grid)
Healthcare
Education
Entertainment
Government
Business
Wireless
Storage
Voice
© 2012 Cisco and/or its affiliates. All rights reserved. 12
Enterprise
MegatrendsTHE NETWORK
IMMERSIVE
COLLABORATION
Pervasive Video
GREEN, Energy Efficiency
IT PRODUCTIVITY, Service & Network Management
SECURITY, Accelerating Cyber-Threats
CLOUD
SaaS | DC / V
MOBILITY
Consumer
Device
© 2012 Cisco and/or its affiliates. All rights reserved. 13
Unified
Access
Unified
Fabric
Unified
Compute
Next Gen
WAN
MOBILITY
Consumer
Device
THE INTELLIGENT NETWORK
CLOUD
SaaS | DC / V
IMMERSIVE
COLLABORATION
Pervasive Video
GREEN, Energy Efficiency
IT PRODUCTIVITY, Service & Network Management
SECURITY, Accelerating Cyber-Threats
14
© 2012 Cisco and/or its affiliates. All rights reserved. 15
Thank you.

Mais conteúdo relacionado

Mais procurados

The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsFIDO Alliance
 
Internet de Todo IoE
Internet de Todo IoEInternet de Todo IoE
Internet de Todo IoEschangan1
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance
 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPia Waugh
 
The Internet Report - Ep.3: April 6-12, 2020
The Internet Report -  Ep.3: April 6-12, 2020The Internet Report -  Ep.3: April 6-12, 2020
The Internet Report - Ep.3: April 6-12, 2020ThousandEyes
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected WorldFIDO Alliance
 
T-Bytes Hybrid cloud infrastructure
T-Bytes Hybrid cloud infrastructure T-Bytes Hybrid cloud infrastructure
T-Bytes Hybrid cloud infrastructure EGBG Services
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO Alliance
 
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...Koshi Ikegawa
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsrgtechnologies
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the CloudNEXTDC
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of TomorrowCisco Canada
 

Mais procurados (16)

The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Internet de Todo IoE
Internet de Todo IoEInternet de Todo IoE
Internet de Todo IoE
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Public Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart WeeksPublic Sphere: Gov 2.0 - Martin Stewart Weeks
Public Sphere: Gov 2.0 - Martin Stewart Weeks
 
The Internet Report - Ep.3: April 6-12, 2020
The Internet Report -  Ep.3: April 6-12, 2020The Internet Report -  Ep.3: April 6-12, 2020
The Internet Report - Ep.3: April 6-12, 2020
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
 
T-Bytes Hybrid cloud infrastructure
T-Bytes Hybrid cloud infrastructure T-Bytes Hybrid cloud infrastructure
T-Bytes Hybrid cloud infrastructure
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government Requirements
 
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...
Trust Data Sharing and Utilization Infrastructure for Sensitive Data using Hy...
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profits
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Data Sovereignty and the Cloud
Data Sovereignty and the CloudData Sovereignty and the Cloud
Data Sovereignty and the Cloud
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 

Semelhante a Pv2020 syed hoda cisco

Standardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our WorldStandardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our WorldMahbubul Alam
 
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...Cisco Service Provider Mobility
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Oleg Konovalov
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoECCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoERick Huijbregts
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013John Earnhardt
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruptionimec
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
Cisco connect Felipe Lamus
Cisco connect Felipe LamusCisco connect Felipe Lamus
Cisco connect Felipe LamusFelipe Lamus
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveFelipe Lamus
 
Thursday Sponsor Conf
Thursday Sponsor Conf  Thursday Sponsor Conf
Thursday Sponsor Conf Bessie Wang
 
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoEWhy Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoESymantec
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Shubha Govil
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Shubha Govil
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 

Semelhante a Pv2020 syed hoda cisco (20)

Standardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our WorldStandardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our World
 
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...
What Do Consumers Want from Wi-Fi? Insights from Cisco IBSG Consumer Research...
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoECCET-GBC Fueling Innovation for Construction and Real Estate with IoE
CCET-GBC Fueling Innovation for Construction and Real Estate with IoE
 
Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013Cisco IoE Value Index event presentation - 19 june 2013
Cisco IoE Value Index event presentation - 19 june 2013
 
Internet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry DisruptionInternet of Everything (IoE): Driving Industry Disruption
Internet of Everything (IoE): Driving Industry Disruption
 
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
Cisco connect Felipe Lamus
Cisco connect Felipe LamusCisco connect Felipe Lamus
Cisco connect Felipe Lamus
 
Joseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco LiveJoseph Bradley, IoE in action, Cisco Live
Joseph Bradley, IoE in action, Cisco Live
 
Thursday Sponsor Conf
Thursday Sponsor Conf  Thursday Sponsor Conf
Thursday Sponsor Conf
 
A Futurist Perspective
A Futurist PerspectiveA Futurist Perspective
A Futurist Perspective
 
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoEWhy Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
IPv6 Transition
IPv6 TransitionIPv6 Transition
IPv6 Transition
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Pv2020 syed hoda cisco

  • 1. © 2012 Cisco and/or its affiliates. All rights reserved. 1© 2012 Cisco and/or its affiliates. All rights reserved. 1 Syed Hoda General Manager, Emerging Solutions Group Cisco
  • 2. © 2012 Cisco and/or its affiliates. All rights reserved. 2 Source: Cisco Visual Networking Index 2011 © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2012 Cisco and/or its affiliates. All rights reserved. 3 by 2020 will flow through the network Translates to each owning on average Source: Cisco Visual Networking Index 2011 © 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. 4 Source: Goldman Sachs, 2010, Cisco Over will have been By the we are done with this © 2012 Cisco and/or its affiliates. All rights reserved. 4 4
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. 5 willquadruple allIPTRAFFICby Source: Cisco Visual Networking Index 2011 © 2012 Cisco and/or its affiliates. All rights reserved. 5
  • 6. © 2012 Cisco and/or its affiliates. All rights reserved. 6 Source: Cisco Visual Networking Index 2011 With Video by being of the world’s © 2012 Cisco and/or its affiliates. All rights reserved. 6
  • 7. © 2012 Cisco and/or its affiliates. All rights reserved. 7 by 2012 of enterprises Enterprise-class willbeusedby Source: State of the CIO 2011 Study, CIO Magazine © 2012 Cisco and/or its affiliates. All rights reserved. 7 of enterprises will be pursuing a by Sources: Gartner (February 2012)
  • 8. © 2012 Cisco and/or its affiliates. All rights reserved. 8 of ORGANIZATIONS want Source: Forrester, 2010 © 2012 Cisco and/or its affiliates. All rights reserved. 8
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. 9 The Network Data CenterDesktop
  • 10. © 2012 Cisco and/or its affiliates. All rights reserved. 10 The Network Data CenterDesktop
  • 11. 11 The Next Network and the Internet of Things The Network is the Platform Consumer Video Security Networked Home Industrial (Internet of Things) Buildings Transportation Physical Security Utilities (Smart Grid) Healthcare Education Entertainment Government Business Wireless Storage Voice
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. 12 Enterprise MegatrendsTHE NETWORK IMMERSIVE COLLABORATION Pervasive Video GREEN, Energy Efficiency IT PRODUCTIVITY, Service & Network Management SECURITY, Accelerating Cyber-Threats CLOUD SaaS | DC / V MOBILITY Consumer Device
  • 13. © 2012 Cisco and/or its affiliates. All rights reserved. 13 Unified Access Unified Fabric Unified Compute Next Gen WAN MOBILITY Consumer Device THE INTELLIGENT NETWORK CLOUD SaaS | DC / V IMMERSIVE COLLABORATION Pervasive Video GREEN, Energy Efficiency IT PRODUCTIVITY, Service & Network Management SECURITY, Accelerating Cyber-Threats
  • 14. 14
  • 15. © 2012 Cisco and/or its affiliates. All rights reserved. 15 Thank you.

Notas do Editor

  1. Today there are 13 Billion devices connected to the network, that’s 2 connected devices per person on earthCisco 2011 Visual Networking Index details the stunning numbers that are associated with the growth of networks. By 2020 there will be 50 Billion devices connected to the InternetSo in the next 9 years there will be a 4-fold increase in the number of devices. Source: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.htmlTransition: Those are the numbers today. What is in store for the rest of the decade?The world around us is changing rapidly and so is the way we access and consume information. Today, networks connect over 23 billion devices. Within that figure, networked consumers typically use 2 diverse devices to access information from the internet. But this is just the beginning of what’s to come. Some estimates project that more than 50 billion devices will be connected to the internet in the next decade.
  2. That translates to 1 person owning 6 devices on averageNote that in addition to smart phones, tablets and other “human enabled” devices, the internet will also include many times the number of sensors that don’t have a screen, keypad or require human interaction. The Internet of Things will also grow to include sensors in cattle so that when a cow is sick it transmits a message to the farmer. Each cow would transmit 200 mb of data a year. Cisco’s Planetary Skin Institute (planetaryskin.org) is working with NASA to marry data from satellites, land sensors and the internet to interpret data on climate change. IPv6 will allow for a vast number of network addresses to support this expansion. (Source: Cisco’s Dave Evans Blog posting, July 15, 2011: http://blogs.cisco.com/news/the-internet-of-things-infographic/)Cellular communication between objects, machines, or sensors has led to the growth of M2M connections. These connections are in the form of smart metering, business and consumer surveillance, inventory management, fleet management, and healthcare modules, all of which are designed for operational excellence. M2M technologies are being used across a broad spectrum of industries. As real-time information monitoring is helping companies to deploy new video-based security systems and hospitals and helping healthcare professionals to remotely monitor the progress of their patients, bandwidth-intensive M2M connections become more prevalent. Traditional appliances and devices, such as home appliances, vehicles, energy meters, and vending machines-which traditionally have not been connected directly to cellular networks-are now entering the network.High-bandwidth scenarios for M2M are becoming real in many categories, including the following.• Business and consumer security and surveillance: Video streams such as commercial security cameras, nannycams, and petcams, accessed through mobile-enabled residential or commercial gateways, fall into this category.• Health care: In the medical, well-being, and sports and fitness industries, devices and services used by medical personnel are being connected to reduce errors.• Inventory and fleet management: Wi-Fi is being considered as an adjunct to cellular-based fleet management connectivity, to allow a vehicle to use cellular technology in the field, and support lower-cost, higher-speed Wi-Fi to download and upload data while in fleet headquarters and loading areas.• Telematics: Trip assistance, navigation, and vehicle management are gaining greater consumer adoption, along with broadband-to-the-car offerings that use a cellular connection to the vehicle and then distribute the connection to notebook PCs and other devices within the vehicle through Wi-Fi.M2M capabilities similar to mobile devices are migrating from second-generation (2G) to 3G and 4G technologies. Globally, M2M traffic will grow 22-fold from 2011 to 2016, a compound annual growth rate of 86 percent, with M2M traffic reaching 508,022 terabytes per month in 2016. M2M will account for 5 percent of total mobile data traffic in 2016, compared to 4 percent at the end of 2011. The average M2M module will generate 266 megabytes of mobile data traffic per month in 2016, up from 71 megabytes per month in 2011.(Source: Cisco VNI p. 19)Uneven access to these devices:Of course, the ownership of devices will not be spread evenly. The digital divide will be operational on a global level. Much of developing world does not yet have access to electricity or the internet:"Some 1.6 billion people, about one quarter of the world’s population, have no access to electricity today. Eighty percent of these people live in rural areas of the developing world, mainly in South Asia and sub-Saharan Africa ..." (Source: IEA, "The Developing World and the Electricity Challenge," Jan. 2005, http://www.iea.org/Textbase/work/2005/poverty/blurb.pdf)ITU data suggest that the number of ‘unconnected’ (by early 2008) is substantial:About half of the world’s population (over threebillion) does not have a mobile phoneAn estimated 5.2 billion people are not using the Internet. By the end of 2007, ITU estimates that about 20 percent of the world's population are not covered by a mobile cellular network and are without basic access to ICTs.(Source: http://www.itu.int/ITU-D/ict/statistics/ict/index.html)Coming off a low base, The Middle East and Africa will have the strongest mobile data traffic growth (between now and 2020) of any region at 104 percent CAGR. This region will be followed by Asia Pacific at 84 percent and Central and Eastern Europe at 83 percent. (Cisco VNI)Total content = by 2020 1 zettabyte (ZB)The amount of online rich media consumption is increasing exponentially on an annual basis. Global Internet traffic was once measured in megabytes, but thanks to the rapid increase in file sharing, video web mail and video calling, annual global IP traffic will soon exceed three-quarters of a zettabyte. A zettabyte is equal to 1 billion terabytes or one sextillion bytes. How much is that? If the 11 oz coffee on the desk in front of you is equal to 1 GB (gigabyte) then 1 ZB (zettabyte) would have the same volume as the Great Wall of China! (Source: http://share.cisco.com/dawn-of-the-zettabyte-era.html)Transition: Let’s not get overwhelmed with big numbers! What does the rate of change translate to in terms we can all understand?Assuming that bears out, that means potentially having to manage up to 6 devices or more on average <CLICK>And with the number of devices exploding, the number of applications is also growing exponentially <CLICK> As a result, the amount of content that needs to be managed is also increasing. Think about it – by 2020, there will be a zettabyte of data traversing networks. Pop quiz for all you – do you know how may zeroes a zettabyte has (answer: 10 raised to the power of 21 bytes or 1 billion terabytes)? It’s huge. Organizations are facing a very different world as they move into the new decade and a new global economy. The way we live, the way we work, the way we are entertained, the way we play; it’s all changing.
  3. By the time we are done with this presentation, over 6,000 tablets will have been sold. And we’re not talking about Aspirin or Ibuprofen tablets! Since Apple introduced the iPad in 2010, the market for so-called “tablet” computers has exploded. By 2015 Gartner predicts tablets will account for 60% of all PC sales selling 326 million units then, compared to 63 million units in 2011. (Source: http://www.gartner.com/it/page.jsp?id=1800514)Now, don’t you wish you’d bought Apple stock in 2009? :-)Transition: Many tablets and mobile devices are used to consume as opposed to create content. And what’s the one form of content we all enjoy consuming? Right – video!If this wasn’t enough change, just think that in the time it is taking to say this sentence <CLICK>another 190 internet-enabled tablets will have been sold <CLICK> More important, most of these devices will enter your corporate infrastructure without IT even knowing about it. In fact, in just five years, more people will be connected through mobile devices than traditional desktops. Mobility is major trend facing enterprises.
  4. Video traffic will quadruple all IP traffic by 2014When the Internet first started it was all ASCII characters, plain text messages and emails. Then came the browser and we started to see graphics: pictures and simple audio. Then voice over IP happened. Now the big driver of the growth of IP traffic is video.Global IP traffic in 2010 stands at 20.2 exabytes per month and quadruples by 2015, to reach 80.5 exabytes per month. Consumer IPtraffic will reach 70 exabytes per month and business IP traffic will surpass 10 exabytes per month. Video is the main driver of this 4x increase.Global Internet video traffic surpassed global peer-to-peer (P2P) traffic in 2010, and by 2012 Internet video will account for over 50 percent of consumer Internet traffic. As anticipated, as of 2010 P2P traffic is no longer the largest Internet traffic type, for the first time in 10 years. Internet video was 40 percent of consumer Internet traffic in 2010 and will reach 50 percent by year-end 2012.It would take over 5 years to watch the amount of video that will cross global IP networks every second in 2015. Every second, 1 million minutes of video content will cross the network in 2015.Internet video is now 40 percent of consumer Internet traffic, and will reach 62 percent by the end of 2015, not including the amount of video exchanged through P2P file sharing. The sum of all forms of video (TV, video on demand [VoD], Internet, and P2P) will continue to be approximately 90 percent of global consumer traffic by 2015.(Source: http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html)Transition: We grew up watching video on the TV set at home. Then we might have watched video on the desktop or laptop. But today, what about video on mobile devices? How much of the traffic on mobile devices is video?
  5. Two-thirds of the world's mobile data traffic will be video by 2016Mobile video will increase 25-fold between 2011 and 2016, accounting for over 70 percent of total mobile data traffic by the end of the forecast period. Because mobile video content has much higher bit rates than other mobile content types, mobile video will generate much of the mobile traffic growth through 2016. Mobile video will grow at a CAGR of 90 percent between 2011 and 2016, the highest growth rate of any mobile application category that we forecast. Of the 10.8 exabytes per month crossing the mobile network by 2016, 7.6 exabytes will be due to video. (Source: Cisco VNI)There will be no place for a “bad hair day” when you communicate in the future. Will you have your video face on?Mobile-connected tablets will generate almost as much traffic in 2016 as the entire global mobile network in 2012. The amount of mobile data traffic generated by tablets in 2016 (1.1 exabytes per month) will be approximately equal to the total amount of global mobile data traffic in 2012 (1.3 exabytes per month).As mobile network connection speeds increase, the average bit rate of content accessed through the mobile network will increase. High-definition video will be more prevalent, and the proportion of streamed content as compared to side-loaded content is also expected to increase with average mobile network connection speed.● The shift toward on-demand video will affect mobile networks as much as it will affect fixed networks.● Traffic can increase dramatically even while the total amount of time spent watching video remainsrelatively constant.(Source: Cisco VNI)Transition: Where will all this video for these countless mobile devices be hosted? Not on the handset. In data centers serving content through the cloud...And video is going mobile. Analysts estimate that two thirds of the world’s mobile data traffic will be video by 2015.
  6. Enterprise-class cloud technology will be used by 70% of enterprises by 201278% of Enterprises will be pursuing a Private Cloud Strategy by 2014A cloud is a powerful combination of cloud computing, networking, storage, management solutions, and business applications that facilitate a new generation of IT and consumer services. These services are available on demand, and delivered economically, without compromising security or functionality. We are moving to an interconnected "world of many clouds," where people will have access to cloud services anytime, on any device, anywhere in the world. Enterprises, service providers, small businesses, and governments are looking for cloud solutions to solve some of their biggest business and technology challenges. A solution to these challenges requires an approach that fully integrates the three pillars of cloud: cloud applications and services, data centers, and networks. (Source: http://www.cisco.com/web/solutions/trends/cloud/index.html)From 2000 to 2008, peer-to-peer file sharing dominated Internet traffic. As a result, the majority of Internet traffic did not touch a data center, but was communicated directly between Internet users. Since 2008, most Internet traffic has originated or terminated in a data center. Data center traffic will continue to dominate Internet traffic for the foreseeable future, but the nature of data center traffic will undergo a fundamental transformation brought about by cloud applications, services, and infrastructure. By 2015, one-third of data center traffic will be cloud traffic.Global data center traffic:• Annual global data center IP traffic will reach 4.8 zettabytes by the end of 2015. In 2015, global data center IP traffic will reach 402 exabytes per month.• Global data center IP traffic will increase fourfold over the next 5 years. Overall, data center IP traffic will grow at a compound annual growth rate (CAGR) of 33 percent from 2010 to 2015.Global cloud traffic:• Annual global cloud IP traffic will reach 1.6 zettabytes by the end of 2015. In 2015, global cloud IP traffic will reach 133 exabytes per month.• Global cloud IP traffic will increase twelvefold over the next 5 years. Overall, cloud IP traffic will grow at a CAGR of 66 percent from 2010 to 2015.• Global cloud IP traffic will account for more than one-third (34 percent) of total data center traffic by 2015.(Source: Cisco Global Cloud Index: Forecast and Methodology, 2010-2015)This also relates back to the growth in mobile devices and multi-media consumption on those devices.Mobile devices have memory and speed limitations that might prevent them from acting as media consumption devices, were it not for cloud applications and services. Cloud applications and services such as Netflix, YouTube, Pandora, and Spotify allow mobile users to overcome the memory capacity and processing power limitations of mobile devices. A user with an 8 GB smartphone who streams cloud video and music will consume more content over the course of 2 years than can be stored on the device itself. A smartphone user adopting Netflix, Pandora, and Facebook will generate more than twice the volume of traffic generated by a smartphone user adopting only email and web applications. Because many Internet video applications can be categorized as cloud applications, mobile cloud traffic follows a curve similar to video. Globally, cloud applications will account for 71 percent (7.6 exabytes per month) of total mobile data traffic in 2016, compared to 45 percent (269 petabytes per month) at the end of 2011. Mobile cloud traffic will grow 28-fold from 2011 to 2016, a compound annual growth rate of 95 percent.(Source: Cisco VNI p.11)Transition: What does the cloud-enablement of data centers mean for the consumer? Will we still be using the Wintel “fat clients” (laptops & PC’s with local storage and processing power) than we have all grown up with?
  7. 56% of organizations want desktop virtualization (VXI)Rather than provision each person in the organization with their own personal Wintel “space heater” complete with storage, memory, and fan to cool it (!) the shared resources model inherent in desktop virtualization offers advantages over the traditional model, in which every computer operates as a completely self-contained unit with its own operating system, peripherals, and application programs. Overall hardware expenses may diminish as users can share resources allocated to them on an as-needed basis. Virtualization potentially improves the data integrity of user information because all data can be maintained and backed-up in the data center.Potential advantages include:simpler provisioning of new desktopsreduced downtime in the event of server or client hardware-failureslower cost of deploying new applicationsdesktop image-management capabilitieslonger refresh cycle for client desktop infrastructuresecure remote access to an enterprise desktop environment (no one can leave a virtual device in the back of a taxi and lose the company secrets, as often happens with laptops).(Source: http://en.wikipedia.org/wiki/Desktop_virtualization#Advantages_and_disadvantages)Desktop Virtualization built on Cisco VXI data center delivers: Simplified, streamlined desktop operations with fewer servers and cables to manageSecure, pervasive VM-aware networking and security for virtual desktopsScalable, predictable performance with uncompromised user experienceFaster payback and ongoing savings with an optimized infrastructure and investment protectionCisco desktop virtualization technologies, services, and best practices combine with partner offerings to deliver:Open, industry-leading approach for resource efficiency and controlCisco Validated Designs that reduce the risk of moving from proof-of-concept to full-scale productionThe foundation for next-generation workspaces built on Cisco VXIData center virtualization and cloud computing transition:● The number of workloads per installed traditional server will increase from 1.4 in 2010 to 2.0 in 2015.● The number of workloads per installed cloud server will increase from 3.5 in 2010 to 7.8 in 2015.● By 2014, more than 50 percent of all workloads will be processed in the cloud.(Source: Cisco Global Cloud Index: Forecast and Methodology, 2010-2015)[NOTE: Cisco Finance presenters can also talk to the cost/benefits on virtualization vs. fat clients]Transition:So, now I’ve blinded you with science and a set of astounding statistics, what does this mean for Cisco and for you, our customers? Quite simply, the statistics I’ve just shared are the core drivers for our strategy and goals.As a result, we’re going to start seeing traditional desktops shift to virtual desktops. According to a Forrester survey of IT professionals, 56% of you want to utilize virtual desktops.
  8. The role of the network was to provide connectivity from that desktop to the server that hosted an application. And back then, we were identified by that singular IP address associated with that computer node. That IP address was our identity.Transition:What’s the network evolved into? Well, now, it looks like this ...
  9. Everything extends from the NetworkFrom the Desktop to the Data Center, the network unites everything. It sits like a giant “T” on top of a cumulo-nimbus cloud with pretty lights surounding it and lightbulbs on each side :-)Transition: Let’s see what this means in terms of Enterprise Networking ...So now device proliferation, mobility, cloud and virtualization are disrupting the traditional way of managing the control over their network. But the CIO is not quite ready to give up that control. He or she may be willing to move the control point and suddenly the network becomes the obvious place for that to happen <CLICK>Since everything extends from the network, it provides the context, the policy, the presence and much more intelligent information to make sure the right access is granted to the right application. Fast, reliable and secure.
  10. Enterprise Megatrends are in these areas:Mobility for Consumer DevicesImmersive Collaboration and Pervasive Video Cloud in terms of Software as a Service (Saas)Data Center and VirtualizationWith implications for:Security in response to accelerating Cyber-ThreatsIT Productivity in terms of Service and Network ManagementGreen and efficient use of energyMegatrends:Mobility for Consumer Devices: Access a borderless network, anywhere, anytime on any device.Immersive Collaboration and Pervasive Video: Immersive Cisco TelePresence meetings connect team members face-to-face with an exceptional user experience.Cloud and Software as a Service (SaaS): Use the power of the networked datacenter and Cisco’s UCS and V-Block solutions to deliver Software as a Service over the cloud.Data Center and Virtualization: Consolidate resources in the data center with a networking fabric that allows for virtualization of servers and storage.Implications:Security in response to accelerating Cyber-Threats: Today’s enterprises are grappling with an array of security issues brought about by changing attitudes and work habits among their employees, and the dynamics of a more collaborative, connected, and mobile world. To address these threats it is neccesary to assess the totality of your network. Know where your IT infrastructure begins and ends—so many enterprises simply have no idea of the entirety of their network. Also, know what your ‘normal’ is so you can quickly identify and respond to a problem. Cisco stays ahead of the latest threats using real-time threat intelligence from Cisco Security Intelligence Operations (SIO). Cisco SIO is the world’s largest cloud-based security ecosystem, using SensorBase data of almost 1 million live data feeds from deployed Cisco email, web, firewall, and intrusion prevention system (IPS) solutions. (Source: Cisco 2011 Annual Security Report)IT Productivity in terms of Service and Network Management: Cisco network and automation products improve operational efficiency and reduce downtime, using class-leading products and solutions for managing an enterprise network, increasing efficiency with IT automation products that save time, provide clear visibility, and strengthen control over operations. (Source: http://www.cisco.com/en/US/products/sw/netmgtsw/index.html)Green and efficient use of energy: Rising energy costs, environmental concerns, government and industry directives, and heightened public scrutiny are all forcing "green" issues and practices to the forefront of business and IT plans. As a resource that touches everything, the network is ideally suited to bolster these efforts and provide much-needed relief from increasing environmental pressures.As the centerpiece of many of the world's networks, Cisco's routing and switching systems are uniquely positioned to have a positive, broad-based impact along four primary fronts:Power EfficiencyOptimized power suppliesPerformance-to-Power gainIntelligent power managementOperational EfficiencyIntegrated servicesCollaboration servicesNetwork virtualizationContinuous InnovationEvolving servicesProgressive designRegulatory complianceExtended Service LifeService readinessPlatform extensibilityComponent reuse and sharingCisco Network Systems solutions offer a range of additional benefits, including helping your business:Control energy costs and consumptionMeet regulatory requirements and business directivesImprove operational efficiency and effectiveness of ITDrive "green" business practices, such as remote collaboration and telecommutingOptimize resource utilization and minimize e-waste(Source: http://www.cisco.com/en/US/solutions/ns726/netsol_generic_enabling_green_practices.html)Transition:Now lets conclude by taking a look at the enabling technologies in the Intelligent Network ...
  11. The Intelligent Network is enabled by technologies such as Unified Access, Virtualization Experience Infrastructure (VXI), Next Generation Wide Area Nextworks (WAN), Unified Fabric and Unified Compute.Enabling Technologies: Cisco Unified Access: Drives solutions to deliver ubiquitous access at the network edge by converging disparate wired and wireless infrastructures.Cisco VXI: Cisco Virtualization Experience Infrastructure (VXI) is an end-to-end systems approach that delivers the next generation virtual workspace by unifying virtual desktops, voice, and video. It helps IT provide an exceptionally flexible and secure converged infrastructure for an uncompromised user experience.Next-Gen WAN: The Cisco Next Generation Enterprise WAN (NGEW) is a Cisco end-to-end architecture that provides foundation building blocks for next-generation enterprise networks. The hierarchical design provides the scalability required by large enterprises and can be extended and replicated throughout multiple regions and theaters. This consistency leads to ease of deployment, maintenance, and troubleshooting.Unified Fabric: Cisco Unified Fabric is one of the pillars of the Cisco Unified Data Center, which unifies computing, storage, networking, and management resources to simplify IT operations, reduce costs, and increase performance. Specifically, a Cisco Unified Fabric is a data center network that supports both traditional LAN traffic and all types of storage traffic, including traditional non-IP-based protocols such as Fibre Channel and IBM Fibre Connection (FICON), tying everything together with a single OS (Cisco NX-OS Software), a single management GUI, and full interoperability between the Ethernet and non-Ethernet portions of the network.Cisco Unified Compute Systems (UCS): Is an x86 architecture data center server platform composed of computing hardware, virtualization support, switching fabric, and management software. The idea behind the system is to reduce total cost of ownership and improve scalability by integrating the different components into a cohesive platform that can be managed as a single unit.Call to Action: Please talk to your Cisco sales team about how these enabling technologies can assist your organization prepare for the astounding growth in networking between now and 2020.Transition: Thanks for listening to my presentation, does anyone have any comments, observations or questions?