The overall collaboration market is now $38 billion (USD) worldwide. Video, including You Tube and Flip, is growing 35% year over year.
And there is a more than an $8 billion (USD) market for video end points. (That’s not including the services opportunities that add three to five times to that $8 billion.)
I’m not throwing out these stats just to impress you. (Though I hope they are.)
With more than 80% of Cisco’s business going through the channel and more 95% of Tandberg’s legacy business through the channel, collaboration doesn’t just mean creating products that will help businesses collaborate. Sure, that’s an integral part of it, but the collaboration we mean here is also about ways we collaborate with our partners.
We sat down with Richard McLeod (Senior Director of Collaboration here at Cisco) to find out about the products and programs launching this week at our 2010 Collaboration Launch, why everything from Cisco will be video-enabled, and what it means for Cisco and Tandberg partners.
Our 2010 Collaboration Launch brings to market a slew of new video, desktop virtualization, and collaboration products for businesses of all sizes. Not to mention new programs for partners. The new products and programs include…
Welcome to the shownotes for TechWiseTV 78: Borderless Networks: Optimizing Application Velocity. Have you seen the show yet? It is live starting 10 AM PST November 11. All the talk about ‘cloud’ and ‘virtual this and that…’ from your servers to your desktops…its the renaissance we have all been told about before it seems. What is the most important ‘make or break’ reality ALL of us have to live with? Three Areas: (1) User Experience, (2) Resource Utilization, (3) Application Reliability.
Yesterday I talked about the vital importance of passwords in the quest to avoid victimization, but today I will take a look at how some recent changes and advances in technology can have an impact as well.
Some of the fundamental tenants of Borderless Networks include the fact that the network is evolving. No longer the classical, hard crunchy shell with the soft chewy middle, the network has become more open, more amorphous and more mobile. Because of these factors, the network is far more available and useful to users wherever they are, at home, on the road or even chilling at *bucks. Indeed, to illustrate the ubiquity of Borderless Networks, I even saw a woman emailing on a smartphone in the middle of a Zumba class (comic aside, my participation in Zumba is a lot like an inebriated bear doing ballet, but that is a different story). The network is no longer confined to the safe castle-keep of the Enterprise, but instead now follows us wherever we go. This creates opportunities, such as receiving email from the boss while you sip a latte at a coffee shop, but it also creates vulnerabilities as well, which we will come back to.
It’s a well known fact in the IT industry that there is a spending push at the end of the calendar year as companies look to close out their budget. This year-end spending trend represents a great sales opportunity for both Cisco and our partners.
Helping our partners boost profits and provide value to our mutual customers are two core principles of our partner strategy. With that in mind, we recently launched a global sales initiative called “Year-end Sprint” (YES), which will allow us, together with our partners, to capture coveted year-end IT spending.
YES is a collection of several high-value, global architecture product and service offerings for customers that include additional incentives for partners. These offers span our four key architectures: Borderless Networks, Collaboration, Data Center, and Service Provider, including IP NGN and SP Cloud.
One of the phrases sometimes heard in certain circles I have traveled in was “Don’t be a victim,” or its near cousin “Don’t allow yourself to be victimized.” While these words of wisdom were passed around in some of the rough, hard biker hangouts up in the Santa Cruz mountains, they are relevant to the world of Borderless Networks as well.
In terms of mitigating risk, one of the very best things you can do is actually one of the simplest. When it comes to passwords, pick a good one and use it. Mix in numbers, special characters, uppercase and lowercase and avoid names and dictionary words and you are going to be in a far better place. Oh, and as 4chan illustrated when they hacked a Christian dating site, never assume that your password will not be stolen – you may want to use different passwords. For mobile devices, which are prone to being left in various places, it is critical to have a password protected locking home screen.