Congratulations to Boeing on shipping it’s first 787 Dreamliner to ANA (All Nippon Airways). The world has been waiting and US Manufacturing has delivered. But it’s not just US Manufacturing -- suppliers as far away as Australia, Italy, Japan and Russia, to name but a few countries have been working with Boeing Engineers to bring the airplane to market -- and using Cisco or Cisco Partner technologies to do so!
The video, courtesy Associated Press’ YouTube Channel, shows the first Boeing 787 Dreamliner Airplane being handed over by Jim Albaugh, President and CEO, Boeing Commercial Airplanes, to ANA’s President and CEO - with a large key!
At the rate in which data is growing, technology is advancing, and devices are proliferating; you don’t want to trust your business to a network that’s just “good enough.” Taking a strategic approach to your network makes good business sense.
The right network is one that’s configured to fit your company’s needs, supports your business goals, and has the potential to transform the way you do business. The right network not only empowers the applications and services you’re using today but also those you’re likely to implement in the future—from reliable, secure connectivity for an expanding mobile workforce, to adopting cloud services.
Other benefits of having the right network for your business include:
Learn the truth behind these common misconceptions to rethink your security
Many small businesses have a false sense of security. They’ve been lulled into believing that their companies’ data is more secure than it actually is, because they believe some of the common misconceptions about security. Consequently, these businesses have left themselves open to both data and financial loss.
Don’t put your business at risk. Learning the truth behind these five security myths will help you strengthen your company’s network defenses and protect your critical information.
I just arrived home from a couple of days visiting customers in Asia and I was a little surprised by all the attention around Cisco’s increased competitive posture. It seems some people are surprised Cisco is calling out its smaller networking competitor by name, although I’ve heard few mentions of their Wall Street Journal cartoon advertisements ridiculing Cisco a while back. I guess that didn’t count.
What matters most to customers is whether their networking partner is ready right now to help them adapt to, and benefit from, the massive network-centric changes that are transforming their businesses and their customers’ businesses.
My recent trip to Asia provided some great examples of exactly what I’m talking about:
First, Mobility is red hot. Tablet growth is exploding as the shift from the PC to new consumer based devices accelerates. With our service provider customers, the new Mobile Packet Core is THE number one conversation. The Cisco ASR 5000, combined with our CRS-1 and CRS-3, is the most innovative technology available to handle this explosion of mobile data and develop new services to help service providers monetize mobile content.
Twenty of the world’s top twenty five mobile operators are already deploying the Cisco ASR 5000 and this number is only going to increase. We also hear growing interest in Asia for SP Wi-Fi as an alternate method to address the escalating requirements for mobile bandwidth and data services. For sure, there’s a lot of competition for the mobile packet core and SP Wi-Fi, but our smaller competitor from Sunnyvale just doesn’t seem to be relevant in these conversations.
Moving your network from IPv4 to IPv6 can be risky if you don’t close security holes
In February 2011, the last blocks of IPv4 Internet addresses were allocated, highlighting the need for organizations everywhere to plan their transition to IPv6, the next generation Internet protocol. Because the move to IPv6 is happening gradually, applications will support both Internet protocols for some time—and so must your network. During the transition from IPv4 to IPv6 your network could become vulnerable to new security risks, so it’s critical that you phase in the new protocol as securely as possible.