At Cisco, we often speak at different venues about how we set up and operationalized social media. We always receive so many questions on this topic that we decided to share our process and lessons learned with the larger social community in a more organized and methodical way. We have partnered with Frost and Sullivan to create a guidebook on “Operationalizing a B-to-B Social Media Center of Excellence”. This case study talks about how
- our Social Media Marketing Hub emerged
- we defined the charter, roles and responsibilities of this hub and
- we engage with the various parts of the organization, also known as spokes
Following the guidance of the Frost and Sullivan research team, we broke down the process of creating our social media center of excellence step by step. Check out a page from the case study here: Read More »
Tags: Case Study, center of excellence, create, how to, hub, roles and responsibilities, set up, spoke
Update: LISP solves the problem from client to server, IE Ingress Path Optimization. FHRP solves the problem from server to client, IE Egress Path Optimization. You can check out Egress Path Optimization here.
We recently published a Data Center Interconnect -- DCI- related document on cisco.com and I wanted to get it in front of you. Locator/Identifier Separator Protoc0l -- LISP -- provides the path optimization technology to forward transactions via the most direct path, ultimately meaning better application performance. The link for the LISP Virtual Machine Mobility paper is below.
As a side note, LISP can be used many other ways and here’s a pointer to one of our LISP pages.
For our purposes in DCI, we use LISP for path optimization and we can see here why the need arises. The box on the left shows an existing transaction that looks pretty direct. The middle box shows the workload is now in a new data center but the transaction is suboptimal, it still goes through the firsts data center. The box on the right shows the desired path, the direct path from user to workload withouth going through the first data center. It’s pretty easy to see the need here for path optimization and the desire to have the direct path to the new data center location as shown on the far right box.
Read More »
Tags: Disaster Planning, disaster recovery, LISP, LISP ASM, LISP ESM, Virtual Machine Mobility, vMotion
Use these techniques for securely accessing company data—while staying productive
Few small businesses are fully contained in one office. Chances are good that some of your employees—maybe even you—travel for business or work from a remote location. These days, no one can afford to be completely cut off from email, client databases, and other business-critical information shared on the local network. Luckily, it’s easier than ever to stay securely connected to colleagues, clients, and prospects —just follow these seven tips.
Read More »
Tags: mobility, remote_access, small_business
Historically, enterprise customers have had a mixture of deployment goals and starting points for the implementation of IPv6. These starting points very often boil down to the following:
- Core to edge
- Edge to core
- Internet Edge-only
Read More »
Tags: Cisco Validated Designs, core-to-edge design, CVDs, edge-to-core design, internet edge design, IPv6 deployment
Last month the VCE Company, the joint venture between Cisco and EMC (with investments from VMware and Intel) that makes the Vblock infrastructure platforms, released a report on Cisco’s virtual services validating their suitability on the Vblock platform. The 40 page technical report covers both Cisco’s Virtual Security Gateway (VSG) firewall, and our Virtual Wide Area Application Services (vWAAS) WAN optimization solution. Both Cisco products run as virtual machines on a VMware hypervisor and the Nexus 1000V virtual switch on an application server, or in the case of VSG, on a Nexus 1010 services appliance. Read More »
Tags: Nexus 1000v, Nexus 1010, Vblock, Virtual Security Gateway, Virtual Wide Area Application Services, vsg, vWAAS