Cisco Blogs


Cisco Blog > Manufacturing

Cisco Partner Event: Industrial Intelligence for Manufacturers

As part of the Manufacturing Impact Series, here’s a reminder not to miss the Industrial Intelligence for Manufacturers Webinar set for Thursday 16th June, 2011. It’s essential viewing and listening if you’re a Cisco resale or systems integration partner, or a partner looking to build a Manufacturing Practice and provide solutions to Manufacturing Industry Customer Careabouts.

Industrial Intelligence is a multi-billion dollar opportunity growing at approximately 20% per year over the next five years. Much of the growth is driven by the proliferation of smart devices globally, and Cisco partners have a unique opportunity to provide the technology to connect an estimated trillion devices by 2020. In this “how to” workshop, the speakers will  introduce the Cisco Industrial Intelligence for Manufacturers market opportunity, target customers, solution portfolio, case studies, and sales tools to help partners succeed.

Click here to register for the Cisco Industrial Intelligence for Manufacturers Webinar

Date: Thursday 16th June, 2011; Time: 11.00 am -- 12.00 pm Eastern Time; (8:00 am Pacific) Place: Online.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Make Sure Your Emails Reach Their Destination

We offer a few tips and staying legit to ensure your messages don’t set off spam alerts.

Information is the lifeblood of business. To protect your small business, you’ve put safeguards in place to protect your critical information, such as a firewall, antivirus and antispam software, and maybe even a web threat or intrusion prevention system.

The methods for sending spam continue to evolve and considering that malicious webmail represented 7 percent of all web-delivered malware in March 2011—an increase of 391 percent from January 2011, according to Cisco 1Q11 Global Threat Report, it’s not surprising, then, that you and your customers have spam filters and extra precautions, cranked up to block any potentially dangerous email. So how do you ensure your important communications actually reach those you do business with?

Read More »

Tags: , , ,

Cisco Partner Invite Reminder – Mobile Video Webinar Recording

June 8, 2011 at 6:38 pm PST

STOP PRESS:  Here’s the recording of this Webinar for those folks who couldn’t attend! Very worthwhile for Cisco Partners! Click the link: 

Cisco Manufacturing Mobile Video Collaboration Solution

The Just a quick reminder for Cisco Partners to attend the Cisco and Librestream Partner Webinar tomorrow (9th June 2011) at 8.00am Pacific. Find out about the exciting new solution that’s being adopted worldwide by customers like Boeing, GE and FIAT.

Remember how I told you I was really excited by this new Cisco and Librestream MMVC solution. Lots of information out on the web, and lots of questions so I thought I’d put a brief video together to give you an introduction and to see if we can get a discussion going and also to see if we can answer some of the questions for you. It addresses what really matters to many customers. What are the pain-points that manufacturers and industry have today? How do they get hold of the right people to fix things if something goes wrong, and how can they say ‘I see what you mean now’ — and really mean it? My original blog gave lots of information.

If you are a Cisco Partner and interested in building a manufacturing industry practice, this webinar is for you!

Register here: Cisco Manufacturing Mobile Video Collaboration Solution. Remember, it’s just one hour starting at 8.00 am Pacific, 12.00pm Eastern -- lots of opportunity to ask questions!  Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

The Great Ike Borderless Networks Challenge Returns: The Security and Video Edition

With our last Borderless Challenge, more than 3,000 people jumped into the ring to participate; 30 individuals got all the answers right. And one lucky guy—Kevin B, a network engineer from Portland—earned a trip to Hawaii. Congratulations, Kevin!

In our newest challenge, we focus on Security and Video. Running from June 7 to June 28, the top prize winner will earn a trip to Cisco LIVE/Networkers in his/her choice of Acapulco, Mexico; Lima, Peru; or London. Other prizes include a Flip video camera or a Linksys Wireless Router.

To help us out, Jimmy Ray Purser and Robb Boyd will be dishing up a snack-sized edition of Techwise TV. They’ll provide an overview of three of our latest borderless innovations: ISE, a new centralized policy engine; Cisco Prime, which provides unified wired and wireless management; and Medianet, which automates the network for enhanced video and voice.

Watch this video to learn more about how you can participate.

Here’s what you need to know:

  • Go to the contest site and register
  • Next, you’ll watch a mini TechWise TV episode focused on security and video
  • After that, you’ll watch another quick video. That one will feature our hero, Ike, applying his knowledge of borderless solutions to save the day.
  • And finally, you’ll take the challenge. That means responding to questions that test your knowledge of what you’ve learned through watching the two videos.

To learn more, go to http://gocis.co/il30Hr. And don’t forget to join the conversation at our Facebook page at http://www.facebook.com/#!/CiscoBorderlessNetworks.

Tags: , , ,

The Cisco Security Thought Leaders Top of Mind Blog Series

As you think about the security of your company, employees, information and assets, what are the topics that are “top of mind” for you? What keeps you up at night?

Starting next month on the Cisco Security Blog, we will be sharing a series of “Top of Mind” blog posts from our security leaders. These experts from Cisco’s diverse security community offer a wealth of knowledge and experience on all aspects of security. They will share their top of mind concerns, considerations, approaches, and solutions as they focus on securing the Cisco enterprise. We believe the information they share will be important thought leadership, direction and guidance for you to consider applying in your own environments.

We welcome your input to keep this security dialogue interactive and relevant to you. In fact, we’d like to challenge you to use this forum to challenge us, by sharing your thoughts and concerns, and asking the hard questions that will lead us all to be more secure. If there is a specific topic you would like to hear about, let us know. We look forward to the discussion, so that together we can improve our collective security.

Tags: ,