Cisco Blogs


Cisco Blog > Inside Cisco IT

Network Dependency Mapping Helps Clean Up Our Application Portfolio

My team is moving hundreds of applications to our new Application Centric Infrastructure (ACI) platform, and network dependency mapping is the first step in this migration. Most of Cisco IT’s applications are three tiered with web and middle tier residing on the same Java Virtual Machine (JVM) connecting to a database.

A typical application may have one or more JVMs that connect to one or more databases. Sometimes the databases internally connect to other databases. Over the last five years, we have heavily invested in Services Oriented Architecture (SOA) and thus have JVMs running web services. These web services are consumed by one or more user interfaces (UI). Some of these applications have jobs that run on our Cisco Tidal Enterprise Scheduler (TES). Read More »

Tags: , , , , ,

Why Are We Reinventing Our Marketing Function?

reenatiwari

  Reena Tiwari

 

Our customers’ expectations and buying behaviors are changing, and more brands compete for their attention. We either need to reinvent our approach to marketing or risk losing business to our competitors.

The big change in buying behavior is that most of us now research a product online before we ever meet with a salesperson. This is true whether we’re looking to buy a washing machine or IT infrastructure.
Read More »

Tags: , , , , ,

Bye-Bye Email. Hello Cisco Spark!

Whatever new technology comes out, it seems that the number of emails we get every day only continues to rise. Well, not everywhere. On my last birthday, I received wishes from 65 sources: 58 from friends through Facebook and the remaining 7 from the financial institutions that I deal with (all automated system notifications). Like me, I am sure that many of you have a personal email inbox with mostly subscriptions and like messages and very few emails from friends. As one Millennial said, “Only my grandma sends emails to me.” Why not the same case at work? On average, I get 200 emails per day in my inbox plus the ones that go to specific folders. I’m not even including the voluntary recreational subscriptions that go to separate folders.
Read More »

Tags: , , , , , ,

Inside Cisco IT: Finding Secure Cloud Services

cspmoCisco uses a variety of external cloud services, in concert with our internal IT service offerings. These cloud services could be storing or working with internal confidential material, so before we select which services to use, the cloud service providers (CSPs) which furnish these capabilities must go through a risk assessment process. This is to ensure their environments comply with our internal Information Security (Infosec) requirements, align to our system architecture and meet overall business objectives.
Read More »

Tags: , , , , ,

Cisco IT’s User Experience Playbook: Deliver a Consistent, Unified Experience

In my last blog, I introduced Cisco IT’s Playbook for Ensuring a Pervasive User Experience. We consider user experience (UX) a strategic priority that requires cultural change. The playbook is our guide for ensuring that this priority becomes part of our DNA. Each chapter of the playbook lays out ways that we can improve UX, and make it a pervasive, positive experience for users across the company.
Read More »

Tags: , , , ,