Cisco Blogs


Cisco Blog > Corporate Social Responsibility

5 Keys To Creating A Lasting Impact Through Collaboration

This blog was originally posted on the Huffington Post.

Many of the problems we face today are so large and widespread, no one organization or agency can solve them alone. Yet, individuals and local organizations work toward solutions every day. At Cisco, we believe that social entrepreneurs with common goals can work better when they work together.

We took our research into what makes collaboration work in a global enterprise and applied it to cross-organizational collaboration between corporations and academic and non-governmental organizations, working for a social benefit. Getting busy people connected and engaged takes a holistic look at culture and business process as well as an effective collaborative technology platform.

A Collaborative Effort by Hospitals Worldwide to Go Green

About a year ago, we began working with Health Care Without Harm, a global network of hospitals and health systems committed to reducing their environmental footprint and promoting environmental health worldwide. We wanted to explore how our technology platform could connect people and create meaningful collaboration around a global challenge with local impact.

Read More »

Tags: , , , ,

Mobilizing for Impact with the Clinton Global Initiative

September 23, 2013 at 11:15 am PST

Seventy-five million youth around the world are unemployed, yet in Brazil, Germany, India, the United Kingdom, and the United States, more than half of all employers are unable to find enough skilled entry-level workers.  How do we help youth around the world get the opportunities to build a bright future for themselves and become forces for positive change? This is the topic that Cisco Chairman and CEO John Chambers will be discussing at the 2013 Clinton Global Initiative (CGI) Annual Meeting this week in New York. He is speaking Wednesday morning, September 25, in a breakout session entitled CGI Conversations hosted by CNN’s Piers Morgan, along with Chelsea Clinton; Muhtar Kent, the Chairman and CEO of the Coca-Cola Company; and Peggy Mativo, Founder and Executive Director of PACEmaker International. The panel discussion will be recorded for broadcast on CNN.

CGI_JC

Read More »

Tags: , , , , , , , ,

Help Customers Unlock their Collaboration Potential

September 23, 2013 at 10:53 am PST

Often times, one of your best bets to expand business is to look at your own existing customers and their current investments. Taking the time to analyze how many of your customers are actively using Cisco Collaboration products is the first step. Are your customers fully trained? Are all of the applications activated and being used on a regular basis across multiple devices? Going beyond your IT relationships and talking to line-of-business executives about how to use collaboration tools in their daily work lives will expand their use cases, drive greater adoption and unlock their collaboration potential. What it means for you is greater long-term sales, deeper customer relationships and increased business relevance.

Get Your Customers Current
By moving your customers to the latest version of Cisco Unified Communications Manager, you can help them take advantage of more powerful collaboration capabilities such as native connectivity TelePresence and mobile video on any device (including the new Jabber for Android), and also achieve a lower cost of management. The Cisco Drive to 9 initiative makes upgrading your customers much easier for you. We’ve created a simpler, streamlined licensing and ordering process for upgrades -- that leads to cost and time savings for you. We also have a new tablet-based tool – CUCM Upgrade Central – that lets you analyze your customer’s readiness, determine a recommended path, and estimate the potential savings.

Accelerate Activation for Faster Time to Value Read More »

Tags: , , , , , ,

Who’s deploying Multi-Hop FCoE? – Part I

While FCoE technology has been standardized for quite some time now, most FCoE deployments have been upto the access layer of the network.  Multi-hop FCoE deployments are gaining traction increasingly. Many a times, I get asked to share the production deployment designs and the real-world benefits of Multi-Hop FCoE infrastructure. So, in this series of blogs, I plan to share the same. In this blog, the spotlight is on a division of the world’s largest aerospace company, Boeing Defense, Space, and Security (BDS).

Boeing-LogoBDS provides end-to-end services for large-scale systems and supports a diverse range of customers, including the U.S. Army, the Securities and Exchange Commission (SEC), and U.S. Department of Defense (DoD). When the global recession hit the aerospace industry in 2010, BDS came under extreme pressure to cut costs. Dual network topologies, both FC and IP, were adding complexity to the network. BDS needed to reduce the TCO and at the same time increase the network agility, improve scalability and maintain highest availability possible.

As a result, the company decided to adopt FCoE to consolidate its IP and SAN data traffic on a single network. Since 2010, BDS has extended its use of FCoE and is now 100 percent Multi-hop FCoE. BDS deployed End-to-End FCoE architecture with Nexus 5000 at the access layer, the Director-class Nexus 7000 at the Core, connected to the FCoE Storage Arrays.

Boeing-Deployment

For BDS, the shift to the new Cisco Unified Fabric infrastructure and leveraging FCoE has delivered unparalleled value to the organization.  Read More »

Tags: , , , , ,

Introducing Kvasir

Cisco’s Advanced Services has been performing penetration tests for our customers since the acquisition of the Wheel Group in 1998. We call them Security Posture Assessments, or SPA for short, and I’ve been pen testing for just about as long. I’ll let you in on a little secret about penetration testing: it gets messy!

During our typical assessments we may analyze anywhere between 2,000 and 10,000 hosts for vulnerabilities, perform various exploitation methods such as account enumeration and password attempts, buffer/stack overflows, administrative bypasses, and others. We then have to collect and document our results within the one or two weeks we are on site and prepare a report.

How can anyone keep track of all this data, let alone work together as a team? Are you sure you really found the holy grail of customer data and adequately documented it? What if you’re writing the report but you weren’t the one who did the exploit? Read More »

Tags: , , , ,