Cisco Blogs


Cisco Blog > Education

Flipping the Classroom – Is it Really all About Technology?

Los Gatos High School, located in Los Gatos, California, recently switched to block scheduling, effectively decreasing the number of school days by 15 a year.  For science teacher, Steve Hammack, what began as a way to provide students with the lecture content they would necessarily need to pass his courses in the face of a decreased number of school days, has ended up as a new model for students to learn massive amounts of information for his AP Biology and Physics classes.  For a technology fan who spends her days at Cisco Systems focused on educators who are using technology to improve learning outcomes, I was intrigued.

I quickly became aware of Mr. Hammack’s approach when I walked into my teenage son’s bedraggled bedroom and heard a familiar voice emanating from the direction of his PC.  It sounded like someone I’d met at back-to-school night.  My son, Joe, a senior at Los Gatos, was reclined in his chair, feet up on his bed, notebook on his lap, busily listening to the voice and taking copious notes.  As I entered his room, Joe clicked a pause button and asked, “What’s up?”  “What’s up with you?  What are you doing?”  He pointed to his screen and said, “Listening to my biology lecture for Mr. Hammack’s class.  We do this every night, then we have a quiz or test every day when we come into class.” Interested, I said, “Tell me more.  Do you like it?”

Read More »

Tags: , , ,

Mythbusters: All Data Encryption is the Same, Right?

Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security

Although most wireless LAN (WLAN) equipment comes with many settings preconfigured, encryption isn’t one of them. In this latest installment of Mythbusters, we explain why the encryption protocol you choose—Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)—makes a difference.

Read More »

Tags: , , , ,

Innovation in the 21st Century City

As a global director of the Cisco Internet Business Solutions Group’s Urban Innovation team, I’ve seen how broadband connectivity can radically transform urban life, while forcing us to rethink our entire approach to designing and managing cities. I recently had the opportunity to share some of my ideas on the subject at the 2011 World Council of UCLG (United Cities and Local Governments) in Florence, Italy.

The Council represents nearly half the world’s population, from 36 countries and more than 1,000 cities—everywhere from Istanbul and Dakar to Helsinki and New York. In Florence, more than 400 mayors, along with municipal ministers, directors, innovators and other experts, met to discuss the daunting challenges facing today’s cities, while offering solutions in a creative and interactive forum. Topics ranged from transportation, utilities, and infrastructure to tourism and environmental sustainability.

Mayor Matteo Renzi of Florence, the host of the event, has worked with Cisco on innovation initiatives in his city. In addition to helping him plan the conference, I was granted the opportunity to moderate some sessions on urban innovation. Read More »

Tags: , , , , , , , , , , , , , ,

Medianet – Horizontal and Vertical Integration

medianet network architecture for videoMedianet is the architecture for video and the architecture has two very simple concepts:

  1. Horizontal integration:
    Deliver a consistent experience
  2. Vertical integration:
    Build intelligence into the network

Learn more.

IPv6 Internet Announced, IP Address Apocalypse Called Off

Although we released this some time ago, not long before the run out of IPv4 addresses we thought we’d repost it again given the announcement earlier in the week of the launch date for the IPv6 Internet. The great news is with the IPv6 Internet happening on June 6, 2012 there is no need to fight your colleagues for IP addresses or hide under your desk. Provided, of course, that your network architect or IT Read More »

Tags: , , , , ,