Cisco Blogs


Cisco Blog > Partner

It’s Your Lucky Day, We’ve Got Your Top Cisco News Headlines

Many believe that number 13 equals bad luck. And on Friday the 13th some may take extra precautions to ensure nothing bad happens. There are literally hundreds of myths out there around things that could bring bad luck: a black cat crossing your path, walking under ladders, and breaking mirrors, to name a few.

One thing that’s guaranteed to bring good luck to all, however, is watching the latest Partner Update newscast. What could be more lucky than getting all of the latest Cisco partner news in less than five minutes?

It’s been a busy week! In this newscast, we share ways that Cisco is simplifying and making easier to do business with us, we cover the top networking myths, new IT cloud and print solutions, give you a recap of our B2B lead generation and marketing webcast with tips on turning leads into customers, a way to turn your customers’ old networking equipment into money for you, showcase B2B blogging tips, and highlight our Tweet of the Week.

Keep reading for highlights and links to everything we covered in this week’s Partner Update along with timestamps so you can easily jump to each item. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Social Media for Social Good – And What the Business World Needs to Remember

I went to the #social4good event last night at Stanford which featured guest speakers actor, Kevin Bacon and author of the book “The Dragonfly Effect”, Jennifer Aaker. I am always curious to learn about how other people and industries use social media so I was looking forward to hearing interesting tidbits on what else….social media for social good. Kevin Bacon took the stage (no pun intended!) to share his thoughts on the concept of six degrees of separation and how it triggered the birth of www.sixdegrees.org. Did you know he first thought the notion of six degrees Read More »

Tags: , , , , , ,

How Mobile Devices Impact the Network

dog facebookAre you among the one third of smartphone owners who use social media applications from bed?

I’ll admit I was surprised to hear so many people check their phones even before having a morning cup of coffee, mostly because I didn’t realize other people did that, too!

This phenomena probably won’t be as surprising in a few years when there will be one mobile device for every person on Earth, according to the Connected World Report, 2010.

While these stats may sound like drivel, they actually underscore the importance that a reliable network plays (and will play) for an increasingly mobile workforce — not just for those people checking Facebook under the covers.

Let’s face it: a network built on “good enough” equipment isn’t going to deliver the same experience as one using next-generation equipment designed for the loads of today’s demanding applications—including voice, video, and data.

Curious about the importance of the network as it relates to mobile? Head over to Silicon Angle where Mike Rau (Vice President, CTO for the Borderless Network Architecture at Cisco) blogged on myth number one –The Single-Purpose Network Myth.

In the post, Mike explains that a good enough network is not designed to handle the needs of an increasingly mobile population, but is built to serve the single purpose of connecting users to resources in silos of connectivity. As mobility demands on the enterprise increase, he indicates that it becomes critical that an end user is consistently managed as they access the network, whether over a wired, wireless, or VPN connection.

Read More »

Tags: , , , , , , , , , , ,

Social Media Brings a New Wave of Threats, Part 2

The next wave of spam is now making its way into social networks. One example of this type of threat is the Koobface malware, distributed through social networks such as Facebook. Koobface tricked users into downloading the malware, which then spread via the network of trusted friends. (For more details please read Unsociable: Social Media Brings a New Wave of Threats)

Facebook recognized this malware was a major problem. The trick to solving it, though, was determining how to distinguish the behavior of a bot acting like a human from the behavior of a real human. The initial answer seemed clear: selectively use a “captcha.” A captcha is the squiggly letters or numbers with interspersed lines that websites use to verify the user is a real person, not a bot. It’s very difficult for a machine to read the captcha and enter the right characters. (IMHO it is difficult for a person to enter the right characters, too—so no wonder a bot can’t do it.)

Read More »

Tags: , ,

Social Media Summit: Final Day Wrap-up #ragancisco

After two days of action packed and informative sessions, today was the final day of the Ragan Social Media summit at Cisco. We had a great lineup of speakers, including a special closing keynote from Brian Solis. Before I share a quick recap of this exciting day, let’s take a look at some of the trending topics during today’s sessions from our @CiscoSocial twitter handle.

We had a total of five presentations today divided into two tracks — Internal and External Communications. Stephanie Marx (@steffymarx), and Marie Gassee kicked off the morning session with an engaging presentation on social media monitoring and engagement. The Engagement Flow Model shared during this presentation provided a succinct and organized way to respond to your social media audience.

Read More »

Tags: , , , , ,