Success can come in many forms. Three very different success stories. Listen to the replay for details.
This week, Partner Velocity (Cisco’s program to help partners’ marketing efforts) held a one-hour webcast to help you get started with social media.
It’s a topic near and dear to my heart, so I led the webcast and provided some guidance for beginners and more advanced practitioners, tips, and tricks to help launch a social media presence.
If you couldn’t make it, don’t worry as there’s a replay available. Be sure to listen to this replay and attend the next two webinars in the series: you’ll be entered to win a US$2500 marketing consultation.
Head to the Partner Velocity site for details, and to register for the next two sessions (Social Media for Events and Creating an Integrated Campaign).
Here’s a quick recap of the topics covered in this week’s session “Building a Successful Social Media Program”:
How to develop a listening strategy
How to define and segment your audience (and create content for each persona)
Tips and tricks for engaging with your audience
Ways to design a measurement/metrics plan
And finally, some key takeaways and next steps
Keep reading for my seven questions to ask before launching your own social media program.
One area in Microsoft’s new Windows Server 2012 operating system and cloud platform that has seen a lot of innovation is in networking.
Here, Cisco has been collaborating closely with Microsoft at the R&D level for some time on technical and product integration. We’ve got an upcoming webinar on Sept. 26 focusing on Windows Server 2012 and Virtual Networking. Cisco Nexus 1000V Product Manager Appaji Malla and Microsoft Networking MVP John Savill will be co-presenting.
If you are interested in Windows Server 2012 and virtual networking scenarios, then feel free to register here.
The workplace is changing fast. Workers are becoming increasingly mobile. The introduction of employee-owned consumer devices like tablets, is becoming the norm; in fact, the average number of devices used by knowledge workers is between 3 and 4 and rising. While IT organizations acknowledge the productivity, business agility and cost benefits these developments can bring, they are also concerned by the associated challenges. Not surprisingly, numerous industry research papers point to device, application and data security, and regulatory compliance as the biggest challenges for mobility and BYOD projects.
To address these security concerns many IT organizations are applying desktop virtualization or virtual desktop infrastructure (VDI) technologies to ensure management and protection of the applications, data and content centrally in the data center, regardless of which device is used. But how can IT ensure that VDI deployments themselves are secure?
Today, Cisco announced new data center security enhancements that further protect VDI deployments. These new innovations enable more scalable, secure access to hosted virtual desktops and more robust protection of data center resources. These innovations also ensure that business critical applications and virtual desktops hosted within the data center can be better protected from other virtual desktops that have become compromised or infected. (Read also today’s blog from John N. Stewart , Cisco Sr.VP, Chief Security Officer “Does Virtualization Improve Security ? “)
Deploying a data center infrastructure that has the built-in security capabilities to address these challenges needs to be an integral part of any VDI design. The Cisco VXI Smart Solution is a comprehensive, secure desktop virtualization solution that addresses these security concerns in both Citrix XenDesktop and VMWare View deployments; you can find more information on the designs here.
In recognizing the need for new models for urban development, the World Economic Forum—which brings the world to Davos every January—has mobilized a multi-stakeholder team to find alternatives. Nic Villa, global director in the Cisco® Internet Business Solutions Group Public Sector practice, was recently named to this year’s Global Agenda Council for Infrastructure & Urban Development (GAC), a team of 15 experts and industry leaders drawn from around the world. This group is dedicated to exploring and identifying transformational models for infrastructure and urban development (I participated as a member in last year’s GAC).
By offering the case study of Shenzhen, Cisco IBSG contributed an outstanding example to the new “Urban Anthologies: Learning from our Cities” a user-friendly toolkit developed by the GAC to empower mayors, urban leaders, and private sector decision makers who are seeking to transform cities and communities. The tool highlights not only the physical outcomes of the projects but, most important, the catalytic and enabling factors that make these transformations possible (see chart below).
We all know that the virtualization and cloud megatrend is a game changer for data centers, leading to profound shifts in everything from IT services and business models to architectures. Business benefits include reduced capital investments, new revenue growth opportunities, and the greater efficiency, agility and scalability demanded by globalization.
Enterprises have held back from making the transition to virtual and cloud environments primarily because of the inherent security risks and concerns.
Targeted attacks and security breaches are getting more sophisticated. The Verizon Security Threat Report for 2011 showed that 3.8 million records were stolen in 2010, and 94% of this data came from servers (an increase of 18%).
As security concerns are the primary barrier to making this transition from virtualized data center to cloud, we must rethink how security fits in to these new architectures and develop new security tools to ensure the secure transfer of information.
For enterprises to confidently seize the business benefits offered by data center virtualization and the cloud, security must be seen as the art of the possible, not as a hindrance.
Watch below as I explore the challenges and leading practices for securing virtualized environments today, and into the future.
Please join me also for a special webcast ”Defending the Data Center “ today at 10:00 am PDT /1:00 pm EDT /17:00 GMT -- To watch register here