Avatar

There’s a nice article by Web analysts SiteIQ this month about Cisco.com search, with the flattering headline “Cisco aces search again…” The post points out how we do little things like how we:

1. Link to Google for more search, in case you didn’t find what you were looking for, or if you want a second opinion…

Site Search 5-15-2014 6-00-45 AM

2. Collect the highest-value links at the top of a page…

Site Search 5-15-2014 6-00-20 AM

3. Offer search directly from our megamenus….

Site Search 5-15-2014 5-58-07 AM

 It’s an interesting short article worth a read. Enjoy!



Authors

Martin Hardee

Director, Cisco.com

Cisco.com

Avatar

Cisco recently announced the availability of Managed Threat Defense (MTD), an innovative managed security solution that applies real-time, predictive analytics to detect attacks and protect against advanced malware across extended networks. MTD helps our customers address the ever-changing nature of threats that threaten their most important asset—data. MTD is delivered through a cost-effective business model that allows our customers to leverage Cisco’s investment in security technology, global threat intelligence knowledge base, talent, and global reach.

To learn more about MTD, watch the video datasheet below:

While developing this solution, the MTD development team talked to dozens of customers around the world. As a result of these discussions, two dominant themes emerged:

Continue reading “Threat Detection: A Big Data Approach to Security”



Authors

Pablo Salazar

No Longer at Cisco

Avatar

Recently the World Economic Forum launched its annual Global Information Technology Report (GITR), which highlights how countries in Latin America compare globally across the 54 different indicators of the Networked Readiness Index (NRI). The regional verdict: while some countries have begun to expand broadband infrastructure, improving connectivity across the region remains one of biggest barriers to development in the region.

There are successes at the country level, however, such as Chile, which ranks among the top quartile globally, due to the government’s consistent focus on expanding information and communication technology (ICT) infrastructure and spurring ICT usage. Panama is quickly moving up in the global ranks and is only eight ranks behind (at 43rd in the world), driven by the government’s recognition of ICT as a critical driver of economic growth. And Costa Rica, Uruguay and Colombia all merit kudos for focusing effort on increasing ICT adoption (of the Internet, mobile phones and broadband) as well as increasing affordability of technologies.

Continue reading “Global IT Report 2014: Region Making Progress on Connectivity But More Action Needed”



Authors

Jordi Botifoll

No Longer with Cisco

Avatar

I’m excited to announce that we have deepened our relationship with General Motors.  This quarter, as John talked about on our Q3 FY14 earnings call, we closed a first-of-its-kind, multi-year deal to license Cisco’s software portfolio to GM.

This innovative licensing agreement involving all of our software – and hardware, where needed – will give GM greater speed and flexibility to drive business value.  So, for example, when GM needs to increase their collaboration solutions across the company they have access to our full suite of products to do that. Going forward, Cisco and GM will continue to partner to deliver on GM’s business goals up to and including the Internet of Everything.

Cisco is proud to work with GM and other large enterprises to help them achieve their goals and overcome their biggest challenges.  We realize that every company must now be a technology company and we are thrilled and excited that GM is taking a huge, innovative step with Cisco as a partner to better serve their customers, partners and employees around the world.

 



Authors

Chuck Robbins

Chairman and Chief Executive Officer

Cisco Systems, Inc.

Avatar

There has been a lot of recent online discussion about automation of the datacenter network, how we all may (or may not) need to learn programming, the value of a CCIE, and similar topics. This blog tries to look beyond all that. Assume network configuration has been automated. How does that affect network design?

Read my full article to find out more..



Authors

Peter J Welcher

Networking Consultant

NetCraftsmen

Avatar

Nick Thexton 2012Written by Nick Thexton, Vice President and CTO, Service Provider Video Software and Solutions, Cisco

With almost a quarter of our waking time spent watching TV, video consumption is on a definite rise. Rather than competing, different devices and platforms are proving to complement each other, collectively contributing to that growth. But our digital lives are becoming more complex as we consume content in diverse ways across a growing number of screens. The chance of missing a programme, for example, is arguably greater than ever, but at the same time easier to overcome.

It’s a truth that’s prompting media organisations and service providers to recognise the value of improving and simplifying the user experience – providing viewers with the content that’s relevant to them, at the right time and place. Those primed for success are investing in technologies that deliver their content to more devices at the lowest incremental cost, cutting the time and complexity associated with enhancing multiscreen services.

But the companies winning in the TV arena are those who also recognise that consumers don’t always know exactly what they want beyond the short-term. Take tablets, for example – few could have foreseen the impact the iPad would have on TV viewing habits and the way we engage with content. Likewise, operators don’t have the luxury of being able to foresee which of their new services will resonate with subscribers. Paramount to success, therefore, is having Continue reading “Standing out from the cloud: why agility is key in tomorrow’s TV”



Authors

David Yates

as Director of Service Provider Video Marketing at Cisco

SP360

Avatar

This week has been the semi-annual OpenStack Summit in Atlanta, GA. In a rare occurrence I’ve been able to be here as an attendee, which has given me wide insight into a world of Open Source development I rarely get to see outside of some interpersonal conversations with DevOps people. (If you’re not sure what OpenStack is, or what the difference is between it and OpenFlow, OpenDaylight, etc., you may want to read an earlier blog I wrote that explains it in plain English).

On the first day of the conference there was an “Ask the Experts” session based upon storage. Since i’ve been trying to work my way into this world of Programmability via my experience with storage and storage networking, I figured it would be an excellent place to start. Also, it was the first session of the conference.

During the course of the Q&A, John Griffith, the Program Technical Lead (PTL) of the Cinder project (Cinder is the name of the core project within OpenStack that deals with block storage) happened to mention that he believed that Cinder represented software-defined storage as a practical application of the concept.

I’m afraid I have to respectfully disagree. At least, I would hesitate to give it that kind of association yet. Continue reading “Thoughts on #OpenStack and Software-Defined Storage”



Authors

J Metz

Sr. Product Manager

Data Center Group

Avatar

Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest challenges highlight one thing inherent to any application—whether on premise or in the cloud—it is not if but when the next flaw or bug will present exposure risks to your business. The key is to be prepared with a solid response strategy.

In two short years, 50% of Global 1000 companies will have customer data in the cloud according to Gartner. With more and more critical information moving to the cloud, IT needs to understand how cloud providers are responding to protect their data and users when these security challenges present themselves. For cloud services that IT is aware of, businesses can establish service level agreements and other safeguards to protect the integrity of their information.

Continue reading “Protect Yourself Against the Next Security Flaw in the Cloud—Understand Shadow IT”



Authors

Robert Dimicco

Senior Director

Advanced Services