Cisco Blogs


Cisco Blog > Video

A Rising Tide Lifts All Boats

Competition is the sign of a healthy market; and the recent increased cadence of venture investment focusing on startups in the video market underscores what Cisco knows well: video plays a key role in business today, and will play an even bigger role tomorrow.  As the old idiom goes, a rising tide lifts all boats.  As video becomes more pervasive in the enterprise, the opportunity for an industry to rally around the movement might create more competition. But in the end, it is about driving more innovation and better economics so that we all win – customers, partners and vendors.

The opportunity to change and influence the way that people collaborate, engage with one another, and communicate is exactly why I decided to join Cisco and lead the Collaboration marketing team.  One of the things that has struck me recently, however, is that the perception in the market is that Cisco is only delivering solutions geared at the absolute high end of the market.  The fact is that Cisco was a high-end pioneer in the video market with innovations around immersive telepresence; absolutely true.  No one will refute that. The little known fact is that Read More »

Tags: , , , , , ,

Top 5 Learnings for Any Digital and Social Media Professional

It’s hard to believe that over eight years have passed since I started working with Cisco. Along the way, I learned so much from peers, the industry, and about myself. As I get ready to pursue a new adventure outside of Cisco, I wanted to share some key learnings I think may be helpful to other digital and social media professionals and give a shout out to a few people!

Top 5 Learnings for Digital and Social Media Professionals

Top 5 Learnings for Digital and Social Media Professionals

Top 5 Learnings for Any Digital and Social Media Professional

  • Carve out an individual online persona that is true to yourself and is relatable to the audience.
    • We all have expertise to offer in our roles and throughout the socialsphere. Share this knowledge and make an impact in a collaborative way. It may take time, so patience is a must. Look for ways to share and interact with others, where ever its most comfortable for you. (I personally find LinkedIn, Twitter, blogging, and Pinterest to help me create and develop these relationships.) Read More »

Tags: , , , , , , , , , , , , , , ,

Food Bank Employee Describes the Many Faces of Hunger

December 3, 2013 at 7:00 am PST

Emily_KraftThis post is from guest blogger Emily Kraft, Food & Nutrition Services Outreach Coordinator for the Food Bank of Central & Eastern North Carolina, one of the hunger relief organizations Cisco employees support through the annual Global Hunger Relief Campaign. 

I’m at the library on my lunch break, searching for a good book to read in my downtime.  My concentration is broken when I hear whispers coming from a nearby table. “Is that the Food Stamp Lady?  I think it is. She’s great – helped me out a lot. You should talk with her.”

Many local shelter residents congregate at the library during the daytime, and it is here among them that I have achieved pseudo celebrity status. The beloved moniker of “Food Stamp Lady” has been bestowed upon me during the past two years after I became a Food & Nutrition Services (FNS) Outreach Coordinator for the Food Bank of Central & Eastern North Carolina in November 2011.

Read More »

Tags: , , ,

Securing Critical Internet Infrastructure: an RPKI case study in Ecuador

Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. A lot of attention has been given in recent years to securing the Domain Name System through a technology called DNSSEC. However, in the last couple of years, the attention has shifted to the security of the Internet routing system and the best practices adopted by network operators around the globe in this area. The main questions these efforts are trying to answer are: is your network authorised to use resources such as IP addresses? Do my packets travel through the advertised path or are diverted on their way? These problem statements may sound too technical for the audience but in reality they can quickly be converted in real business impact. Unauthorised claiming of network resources are proven to cause downtime not only for one web server but to complete networks. Particularly, imagine a phishing attack where the IP address, the domain name and the TLS certificate are legitimate but you just interacting with the wrong network. The hijack of IP addresses is normally due to bad operational practices (basically miss-configurations that leak to the global Internet) but it is also suspicious of playing a role in SPAM and other sensitive areas in security.

The global inter-domain routing infrastructure depends on Read More »

Tags: , , ,

Cisco: Your Strategic Cloud Partner

Cisco’s cloud software is a hot topic.  First Cisco UCS Director was voted the SVC award winner for best virtualization management software.  Then Forrester released a new Private Cloud Wave and both Cisco Intelligent Automation for Cloud (IAC) and UCS Director combined garnered Cisco the highest ranking for cloud vision and strategy as well as a top three ranking for currently shipping product. Customer input was behind this success.
Read More »

Tags: , , , , , , , , , , , ,