In my last blog, I asked the question “Is Collaboration Worth It? Every day, customers tell us collaboration is critical to their ability to compete—something top of mind right now. Why does collaboration matter? From our research and interviews with business leaders, we attribute the growing importance of collaboration to three fundamental trends:
- Competition comes from anywhere and everywhere. The barriers to entry are lower than ever, and you cannot predict who will enter your market next. It might be a startup in India, China, Africa or Eastern Europe—or competition from another industry. How do you stay ahead when you don’t know which organizations you’ll compete with next month or next year? Read More »
Tags: carl, carl_wiese, carl_wiese_blog, cisco_unified_communications, collaboration, collaboration_architecture_blog, collaboration_imperative, collaboration_imperative_blog, Collaborative, contact_center, experience, IM, intercompany_collaboration_blog, mobile, mobility, ricci, ron_ricci, ron_ricci_blog, social, unified_communications, video, virtual, virtualization, wiese
In my first blog I described how Cisco IT is interconnecting our outsourced Contact Centers using SIP trunks, replacing the more costly (and less effective) PSTN trunks. In our first round of SIP trunk deployments we expect to save almost 25% of our current contact center calling costs (or $2M per year). But there were other, less tangible benefits as well.
Read More »
Tags: border element, Call Center, coc-collaboration, contact center, CUBE, extranet, outsourced, PSTN, SIP
You have expertise and that can be a powerful differentiator for you in business.
Use a webinar to share your knowledge, attract new people and even help hone your internal processes. Here are five reasons why using webinars (and WebEx) is good for business.
1. Add value to your brand.
Leverage your in-house expertise using it to distinguish your business leadership. A good webinar parallels all of the information your company is already putting out, but adds depth to a particular area. It also can allow users to ask specific questions. Here’s how Mike Bartkus at SkillSurvey uses webinars to tell people how to avoid bad hires. While you learn new information, you tacitly trust Mike’s advice and expertise.
2. Educate and inform your audience; share your passion.
Seeing is believing. If you have a great widget, show me how it works and what it can do for me and my company. Engage me. Don’t bore me with a slide-show about your company’s history. Show me what your product or services can do and why I can’t live without them.
3. Fill the funnel.
Generate marketing leads with a successful webinar. You’ll attract those people who are most interested in the subject matter which should shorten your sales cycle. The potential audience here is unfettered by time or location, and bonus, the webinar lacks the associated travel costs of a large marketing event. It’s win-win.
4. Create a lasting impression.
“Whatever webinar you’re doing, it’s worth recording it,” says Brian Carroll, CEO of InTouch Inc. “We’ve been able to show that 300% to 500% more people watch a recorded webinar than attend a live one,” Carroll said. “If you don’t record it, you’re missing out on more than half of your audience.” Creating an asset that can be used repeatedly over time can save you money and time.
5. Move your business forward.
Webinars can help you train your employees on a new piece of software from your home office, saving you time and travel costs. You can provide employees with everything they need all at the same time, with hyperlinks, and if you record the webinar, employees can refer back to it at a later time if they need a refresher or feel that they missed something the first go round.
Read More »
Tags: event, marketing, Online Meeting, Recording, WebEX, webinar
Lock down your UC system to prevent the theft or loss of sensitive business information
Companies large and small have embraced VoIP (voice over IP) and unified communications (UC), and malicious parties are there, too. In fact, some research firms estimate that targeted attacks on VoIP infrastructure account for as much as one third of all attacks around the world, in part because companies haven’t secured their VoIP and UC systems as well as other online applications like email. Unauthorized persons can use holes in UC systems to sneak onto your network, access stored business data like sensitive customer information, or commit toll fraud.
Read More »
Tags: security, SIP_trunking, small_business, UC, unified_communications
With more than seven billion souls set to tote 10 billion mobile-connected devices by 2016, mobility has not just arrived, it’s taken over our schools, businesses and personal lives.
Just ask Mitch Davis, the CIO of Bowdoin College, a private liberal arts college in Maine. Before BYOD ever became a global IT trend, according to Mitch, the vast majority of college students were already bringing their personal devices into the campus environment.
These co-eds expected Bowdoin to fully embrace personal mobility, and, upon graduation, these same post-grads expect that their employers will do the same (this year’s Connected World Technology Report findings back this up, with more than 40 percent of recent college graduates/Gen Y employees choosing BYOD flexibility over higher pay).
Bottom line, the rules of the game are changing, and companies must move beyond basic BYOD connectivity to meet employee demands today and tomorrow. To help companies meet these demands, we’ve introduced a comprehensive approach that unifies policy, supports a better user experience and simplifies management to deliver an uncompromised user experience in any workspace. After all, Cisco wants to empower IT managers to allow employees to have their devices and use them too. That means delivering:
- A unified security policy across the whole organization – wired, wireless, VPN and now MDM – helping companies set and enforce policies;
- An uncompromised user experience over the entire wired/wireless network, across any type of device; and,
- Simplified operations and network management to understand application performance from a user’s perspective, accelerating troubleshooting and lowering operating costs.
Like Ray-Ban aviators, BYOD is here to stay. And done the right way, BYOD demands a comprehensive approach to allow current and future employees to work how they want, when and where they want, and on the devices they want – while still allowing IT the control and visibility to sleep at night.
Learn more about our announcement and new technologies here.
By the way, whether you’re a college student or have been working for 30 years, you’re eligible to take the BYOD Challenge and win a trip to 2012 London Olympics – good luck!
Tags: access point, beyond byod, bring your own device, Bring your Own Device (BYOD), byod, CIO, enterprise mobility, MDM, Mobile Device Management, mobile devices, network management, vpn, wi-fi, wifi, wireless access points, wireless LAN, wlan