Cisco Blogs


Cisco Blog > Digital and Social

Cisco IT University Program Innovation: Leveraging Social Media to Attract Top Talent

July 23, 2013 at 1:30 pm PST

IT UP Banner

Are you an ambitious tech-savvy college student looking for an internship or full time career? Do you want to work for a company that has been ranked as one of the happiest places for young professionals? Then, Cisco IT is the place for you!

The Cisco IT University Program recruits college students from all over the world into Cisco IT for internship and full time opportunities. With a myriad of employers for college students to choose from, Cisco IT identified the need to innovate and explore new ways to become the employer of choice for the best and brightest of the millennial generation. This generation is leading the social media explosion today and is always connected. According to the Society of New Communications Research, 93% of people active online fully expect companies to be present in social media spaces and be willing to have a conversation with them. Therefore, the IT University Program decided to adapt to the communication preferences of this generation and enter the world of social media with full force delivering the Cisco IT experience right to their smart phones.

For BLOG

What does the millennial generation seek in a potential employer?

  • The ability to work on innovative projects that make an impact
  • A start up environment that is fast paced, fun and exciting
  • The opportunity to change the world

This is exactly what Cisco IT has to offer! However, college students today maintain the outdated brand perception of Cisco being the godfather of routing and switching. They are oblivious to the cutting-edge initiatives going on within Cisco IT that are changing the way we work, live, play and learn more than ever before. The natural expertise of millennials must be leveraged for Cisco IT’s game changing initiatives such as the Internet of Everything, BYOD, user experience, collaboration and mobility.

FOR BLOGD

So, what does the IT University Program want to accomplish through the use of social media?

  • Create increased brand awareness among college students of the endless opportunities available in Cisco IT
  • Generate online buzz and excitement by showcasing the fun company culture

How does the IT University Program’s social media strategy meet and exceed these goals?

According to Ypulse, 62% of Millennials use Facebook and 22% use Twitter to keep up with a brand or company they like. Based on this research, the IT University Program built a robust online presence using their existing Facebook page with Twitter as a secondary communication platform. When the social media strategy was kicked off, the Cisco IT University Program Facebook page had only 200 likes with a sense of hesitance and uncertainty around the possibility of its success. Within a few short months, the Facebook page has over 1000 likes and the IT University Program has created an incredible amount of excitement internally and externally. The IT University Program’s online audience includes the company’s CIO, IT Executives, Managers, New Graduates and Interns, and even the parents of New Graduates and Interns.

Information distributed through the IT University Program’s social media channels is catered towards each one of these audiences. The IT University Program has engaged its audience and met its intended goals in the following ways:

Overall, implementing an extensive social media strategy to reach the millennial generation has been a big win for the IT University Program. Not only did it create buzz and excitement around Cisco IT externally but also earned the support and encouragement of executives within the organization. This is how the IT University Program is striving towards Cisco’s vision of becoming the #1 IT Company by innovating and finding new ways to recruit top talent into Cisco IT.

 

Tags: , , , , , , , , , ,

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cisco Service Discovery Gateway – Enabling Zeroconf in Enterprise Networks

Cisco Service Discovery Gateway – Enabling Zeroconf in Enterprise Networks

I’ll admit it: I’m what others call an Apple fan boy. One of the many reasons for being one is the polished user experience and the ease-of-use of their products. One of the underlying technologies that enables the user to discover devices and services on the network is Zeroconf or, as Apple calls it, Bonjour.

Zeroconf consists of three major components:

  • Address auto configuration,
  • Naming –and–
  • Service discovery.

If your network doesn’t have a DHCP server or you haven’t statically assigned an IP address to your host, most operating systems will use an automatic private IP address. I’m not going into much detail on address auto configuration except that this is typically done using a technique called APIPA (Automatic Private IP Addressing) for IPv4 the host will use the famous 169.254.0.0/16 addresses or, in case of IPv6, by using link-local addresses only (FE80::/10) which has been designed into IPv6 as a basic functionality from day one. Also, naming is not of much of a concern in the context of this discussion. However, it is worth mentioning that Zeroconf names can contain Unicode characters and whitespace, which can make those names a lot more user friendly and meaningful contrary to pure DNS names.

The more interesting part, as it pertains to Zeroconf, is the service discovery. Read More »

Tags: , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,