Cisco Blogs

Cisco Blog > Government

VXI: Increased Productivity with Telework

Working from anywhere has its benefits —and increased productivity is one of them! I speak from personal experience as well as from Cisco’s evaluation of the productivity of 20,000 full-time teleworkers, which found that 60% of the time employees saved by not commuting went back to the company. With those kind of numbers, it’s no wonder more companies are increasingly adopting telecommuting policies. The private sector is already reaping the benefits and now it’s time for federal agencies to experience the same rewards.

In the video below, Cisco Federal CTO Dan Kent discusses how adopting flexible telecommuting policies and boosting employee productivity go hand in hand.

Tags: , , , , , ,

Cisco Recognized in Leadership Position in the Gartner Magic Quadrant for Corporate Telephony

Gartner recently released their 2012 Magic Quadrant for Corporate Telephony, and I am incredibly pleased to share that Cisco was placed in the leader’s quadrant.  These results come just after Cisco was recognized as a leader in Gartner’s 2012 Magic Quadrant for Unified Communications.  We believe that, together, these reports signal the momentum that Cisco is experiencing as a leader in Collaboration.

And yes, the momentum has been strong! This past April, Cisco achieved a new milestone by shipping more than 50 million IP phones. We’ve also gained significant traction with Cisco Jabber, which enables instant messaging, conferencing, voice and telepresence video on multiple devices, increasing 55% in license volume year over year.

Our history of success has been validated many times before, not only by sales growth and market share gains, but also acknowledged by technology analysts as an industry leading vendor in this space for more than ten years. Most of you have followed this validation and we believe this year’s Magic Quadrant is just another example.

At Cisco, we understand that our customers don’t make decisions on data, voice or video alone. Instead, they are looking for integrated solutions that deliver the rich media capabilities their users demand, and at the same time, provide the agility, resiliency and high quality experiences the business demands.

According to Gartner analysts Jay Lassman, Geoff Johnson, and Steve Blood in their Corporate Telephony report, “We evaluated vendors for their understanding of how customer needs are changing (both for users and the IT group responsible for managing telephony). It was especially important to see how vendors proposed to complement, or compete with, UC collaboration solutions.” Read More »

Tags: , , , , , , , , ,

Investing Means Gaining

Return on investment has been around for ages, but the meaning of ROI is taking a spin in today’s business world. Companies are no longer purchasing solutions for technology improvement; they are investing in better industry processes as a whole. In return, they can achieve positive cash flows.

Concentra, a national healthcare company, provides a perfect example. With an outdated data center, the company had exhausted their power and cooling resources and was in need of reconstruction.

Concentra did some research and discovered that, by significantly investing in revamping their IT infrastructure, not only could they dramatically improve efficiencies and performance, but they could also create a positive cash flow for the company.

Furthermore, implementation doesn’t have to be risky. Concentra’s Senior Vice President and CIO, Suzanne Kosub, says, “With the right planning and financial analysis, we were able to show exactly how much the project would cost, how long it would take to pay for itself, and what the company would gain moving forward.”

Read the full story


Tags: , , , , , , , ,

Join Cisco on October 11, 2012 to learn how to address BYOD and virtualized workspace in retail

The consumerization of information technology has been a boon to innovations in the workspace.  With mobile phones and tablets, today’s employees and consumers carry a significant amount of technologies on them.  Retailers can leverage these technologies to enable employee productivity and improve customer experience if it can be managed effectively an securely.

Please join us on Thursday October 11th, 2012 for our live webcast titled “Retail Your Way: Supporting Multiple Devices with BYOD and Virtualization”


In this live webcast you will learn how to:

Read More »

Tags: , , , , ,

The Age of Hypervisors

The science behind Virtual Machine Monitors, or VMM, aka Hypervisors, was demystified almost half a century ago, in a famous ACM publication, “Formal Requirements for Virtualizable Third Generation Architectures”.

In my life, I had the honor of working on some of the most bleeding edge virtualization technologies of their day.  My first was IBM’s VM, VSAM and a host of other v-words.  My last was at XenSource (now Citrix) and Cisco, on what I still think is the most complete hypervisor of our age, true to its theoretical foundation in the Math paper I just mentioned.

Though Xen is arguably the most widely used hypervisor in the Cloud or sum of all servers in the world today, I actually think its most interesting accomplishment lies in what its founders just announced this week.  Therefore, I want to extend my congratulations to my good friends Simon Crosby and Ian Pratt for the admirable work at Bromium with vSentry.

I think it is remarkable for two reasons.  It addresses the missing part of what hypervisors are useful, which is security; for those of you that actually read Popek & Goldberg’s paper, you would note that VMM’s are very good at intercepting not just privileged but also sensitive instructions, and very few people out there, until now have focused on the latter, the security piece.  But there is one more reason, in fact the key point of this paper, the necessary and sufficient conditions for a system to be able to have a VMM or hypervisor, and I am hoping the Xen guys who have done so well articulating that for real (not fictional or hyped) hypervisors, can also help sort our the hype from fiction in what is ambiguously called nowadays a “network hypervisor”.

Could this approach be what is actually missing, to sort out truth from hype in what we call SDN today?  Is this the new age of hypervisors?  Or is this just another useful application of an un-hyped hypervisor?

Tags: , , , , , , , , ,