Cisco SVP of HQ Sales – Japan, Yasufumi Hirai, and I had the privilege to meet Sheryl Sandberg earlier this month at a private luncheon reception sponsored by Nikkei Weekly News. We were so inspired by her. She gave me a hug when I mentioned I was from Cisco. She says “John Chambers has been so supportive with Lean In and Cisco is doing amazing things.” Prior to the luncheon, she met with Japan Prime Minister Abe.
Sheryl mentioned she is not an expert in Japan but understands that the challenges for Japanese women are much harder. She clearly did her homework on Japan provided useful data on Japan’s diversity demographics. Her advice to Japan:
1. Address stereotypes and bias that hold women back. For example, women are viewed as caregivers and nurturers. Men are viewed as providers.
2. Change corporate policies like the gender pay gap, long work hours and re-invite women back after maternity leave. Make men feel more comfortable working with women.
3. Achieve more balance in the home.
Enjoy the photo! The Ustream of the Japan Evening Session is below. Sheryl presents at 1 min. 30 sec. I truly felt her positive energy.
Global Women’s Leadership Summit
Video streaming by Ustream
Tags: event, Japan, Sheryl Sandberg
By Howard Baldwin, Contributing Columnist
As I wander through the world of broadband, I frequently worry that for every step forward, we take one step back. As I’ve written about previously, we seem to be at an inflection point where we see the potential value of broadband, but putting it into reality seems to be more ephemeral.
Especially here in the U.S., we seem to be “talking the talk” more than we’re “walking the walk.” The confluence of certain events recently has underscored my ongoing concern even more recently.
Read More »
Tags: broadband, culture, Europe, intelligent community, internet, Japan, public policy, research
The internet of everything (IoE) is about connecting the previously unconnected. When most people think about creating these connections, they think about doing so by adding sensory technology to inanimate objects, thereby making objects “smarter.”
What if we have this paradigm all wrong? What if the approach shouldn’t be about adding sensory technology to inanimate objects, but rather adding a sensory system into our entire world – one that provides recall memory, recording and feedback capabilities – effectively making our real world into one giant virtual world?
A couple of weeks ago I wrote a well received guest post on this blog that discussed the balance between technology and humanity, and the balance that is achieved by implementing submissive design.
This morning I watched the spine-tingling TED Talks video below which takes submissive design to a much deeper and exponentially more exciting level, and I just had to share it with you!
Read More »
Tags: #ciscochampion, hc, healthcare, IoE, Jinha Lee, sensory technology, submissive design, TEDTalks, UI
Flying cars. Robots. Biometric devices. These are just some of the things I get to think about and research in my role as Cisco’s Chief Futurist. As the Internet of Everything continues to connect more people, process, data, and things it is exciting to think about the possibilities.
Looking at life 50 years ago can give us perspective about just how far we have come. In 1963, push-button telephones were first introduced and the world’s population was 3.2 billion, less than half of what it is today. The next 50 years will be just as revolutionary and life changing, perhaps even more so.
Read More »
Tags: Cisco, forecast, innovation, Internet of Everything, internet of things, IoE, IoT, mobility, network, Tomorrow Starts Here
This month has been particularly prevalent for the loss of personal information. At the beginning of the month it was reported that Club Nintendo had been breached with the personal data of up to 4 million stolen by attackers . Subsequently, the forums of Ubuntu were hacked with the loss of 1.82 million usernames, passwords and email addresses . Additionally, Apple have announced that their developer website has had an unknown amount of personal data stolen .
Read More »
Tags: Breach, network security, password, passwords, privacy, security, TRAC