Cisco Blogs


Cisco Blog > Financial Services

Banking in the InterCloud: Delivering Additional Computing and Storage

July 28, 2014 at 1:02 pm PST

Financial Services firms are being challenged and forced to change the way that their applications, information, content, compute, storage, and network resources are deployed and consumed. It is a multi-dimensional issue that is forcing financial services firms to change of how IT is delivered. They are beginning to look for ways to stretch their data centers, as they often need more compute and storage capacity than their own facilities provide, especially during those peak high-demand times. The move is toward the service delivery of IT through cloud computing, a dynamic and service-oriented delivery paradigm that organizes and allocates IT-enabled services to meet business demand as needed.

Challenges With Financial Services IT Delivery

Data centers are costly to build and operate, but there are times when you need more resources. Cisco’s InterCloud solution lets banks create a hybrid cloud to extend their data center and cloud capacity when needed. Through InterCloud, banks can store more data and have more computing power, operating just as if it were in an on-premises data center. InterCloud could also be used to augment current big data and risk/analytics environments that banks have deployed in recent years. In many cases, additional compute capacity is needed only for a short time in order to run certain risk models or to provide additional reporting for regulatory requirements. Read More »

Tags: , , , , ,

IT Transformation: Avoiding Pitfalls

In the last two blogs, I talked about the reasons for IT Transformation, understanding Enterprise Environment and how to effectively set management goals. As more and more companies begin to move towards IT Transformation, there are mistakes that businesses should be weary of. Today I will discuss the pitfalls that can slump the IT transformation process, as well as, the services Cisco has been developing to help Enterprise on the journey to IT transformation. Read More »

Tags: , , , , , , , ,

Cisco Partner Weekly Rewind – July 25, 2014

July 25, 2014 at 7:30 am PST

Partner-Weekly-Rewind-v2Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:

Off the Top

I posted a new Voice of the Partner Blog earlier this week. It focused on Cisco Solution Partner, Tegile, and their work with the Minnesota Wild of the NHL. I love working on the Voice of the Partner series, as it gives me the opportunity to see what partners are doing with customers in order to provide real life, effective business solutions.

See how Minnesota Wild achieved a cost reduction, reduced power usage, and increases data center agility with the help of Tegile. There is an included, full case study and we welcome your feedback.

Microsoft Worldwide Partner Conference

Gary Serda wrapped up his coverage of Microsoft’s Worldwide Partner Conference (WPC) by giving us one last recap on the Channels Blog. Be sure to check out Gary’s final blog on WPC.

The Future of Cloud

Learn what leading providers have to say about the Future of Cloud. In parts three and four of this ongoing series, OneNeck and Sungard share their perspectives on “Transparency in the High Performance Cloud” and “Building a Resilient Cloud for the Future.”

Good Reads

Keep An Eye Out

Tags: , , ,

Children Learn Coding and Collaboration at Cisco

July 24, 2014 at 5:29 pm PST

“If you want to use the music from Frozen in your game, do you know how to download a gif to match?” Not the average question I have heard in a conference room at Cisco headquarters in San Jose, California, especially when asked to 7-year-old girls! The girls were part of a group of 14 children participating in a coding camp held at Cisco and put on by Embark Labs. The goal of the event is to teach 7 to 10 year olds to have fun while learning how to program.

Teacher Brian VanDyck and Embark Labs Founder Jessie Arora watch as the students work on their coding projects

Teacher Brian VanDyck and Embark Labs Founder Jessie Arora watch as the students work on their coding projects

Read More »

Tags: , , , , , , , ,

Securing Mobile Data: What’s Your Plan?

July 24, 2014 at 7:00 am PST

As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.

This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group

The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:

  • By 2018, over half of all devices connected to the mobile network will be “smart” devices
  • Tablets will exceed 15 percent of global mobile data traffic by 2016
  • By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita

With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.

What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.

Read More »

Tags: , , , , , , ,