Enterprise IT organizations and IT processes have gone through major waves of changes in the past few years. From a focus on deploying products, technologies and solutions that solved specific technical needs, IT organizations are looking increase the efficiency and effectiveness of their systems and processes by turning their focus towards “Services”
At Cisco IT, we are living this journey towards “everything as a service” and the integration of architectures within the Infrastructure has become a strategic priority to meet that goal. Our focus in the Infrastructure rests on the following architectural plays – Data Center/Virtualization, Borderless Networks, Collaboration and Video.
At your last visit to the endodontist for that rootcanal (ouch!), you were pleasantly surprised that she had all your case history in her office—on a sleek tablet, no less. While you recovered from the procedure, did you notice how the front desk sent your prescription off to the nearest drug-store, filed your insurance claim, and also updated your family dentist with your procedure outcome? All digitally. Impressive, eh? And this was in the hills of Santa Cruz, where your son had trouble accessing his apps on the mobile phone.
You noticed the endodontist throw the tablet on the seat next to hers, when she drove off after your appointment. Nice.
The overall collaboration market is now $38 billion (USD) worldwide. Video, including You Tube and Flip, is growing 35% year over year.
And there is a more than an $8 billion (USD) market for video end points. (That’s not including the services opportunities that add three to five times to that $8 billion.)
I’m not throwing out these stats just to impress you. (Though I hope they are.)
With more than 80% of Cisco’s business going through the channel and more 95% of Tandberg’s legacy business through the channel, collaboration doesn’t just mean creating products that will help businesses collaborate. Sure, that’s an integral part of it, but the collaboration we mean here is also about ways we collaborate with our partners.
We sat down with Richard McLeod (Senior Director of Collaboration here at Cisco) to find out about the products and programs launching this week at our 2010 Collaboration Launch, why everything from Cisco will be video-enabled, and what it means for Cisco and Tandberg partners.
Our 2010 Collaboration Launch brings to market a slew of new video, desktop virtualization, and collaboration products for businesses of all sizes. Not to mention new programs for partners. The new products and programs include…
Welcome to the shownotes for TechWiseTV 78: Borderless Networks: Optimizing Application Velocity. Have you seen the show yet? It is live starting 10 AM PST November 11. All the talk about ‘cloud’ and ‘virtual this and that…’ from your servers to your desktops…its the renaissance we have all been told about before it seems. What is the most important ‘make or break’ reality ALL of us have to live with? Three Areas: (1) User Experience, (2) Resource Utilization, (3) Application Reliability.
Yesterday I talked about the vital importance of passwords in the quest to avoid victimization, but today I will take a look at how some recent changes and advances in technology can have an impact as well.
Some of the fundamental tenants of Borderless Networks include the fact that the network is evolving. No longer the classical, hard crunchy shell with the soft chewy middle, the network has become more open, more amorphous and more mobile. Because of these factors, the network is far more available and useful to users wherever they are, at home, on the road or even chilling at *bucks. Indeed, to illustrate the ubiquity of Borderless Networks, I even saw a woman emailing on a smartphone in the middle of a Zumba class (comic aside, my participation in Zumba is a lot like an inebriated bear doing ballet, but that is a different story). The network is no longer confined to the safe castle-keep of the Enterprise, but instead now follows us wherever we go. This creates opportunities, such as receiving email from the boss while you sip a latte at a coffee shop, but it also creates vulnerabilities as well, which we will come back to.