Cisco Blogs


Cisco Blog > Digital and Social

What is ‘digital’?

November 21, 2013 at 1:06 pm PST

How would you define ‘digital’?  As a communication channel or method?  A convenience enabler?  1s & 0s?  The inverse of analog? Bits versus atoms? Something we can no longer live without?

I am often asked ‘what is digital’? … ‘is it just our website, or broader than that?’ … ‘what exactly do you mean?’

So, I asked around to find out the word-on-the-street around ‘digital’.  I was impressed with how many different, nuanced, and insightful answers I was given on the definition — I had to put it all together into a video in order to capture the rich and diverse viewpoints.  In the video, you can learn what others think ‘digital’ is, as well as how we define it.

Watch the video to see how our colleagues and members of the public describe it; listen to hear if your definition is included; and let me know whether you’d add a different perspective.

Tags: , , , , , ,

Christmas Packets: Web Browsing and the Festive Period

The web browsing behaviour of users changes as the end of the year approaches. The holiday season can provide a large distraction from work duties that may need to be managed. Equally, even during periods when the office is closed, there will be some individuals who cannot resist accessing work systems. Managing these changes in behaviour is difficult for network administrators unless they know what to expect.
Read More »

Tags: , , ,

Crumbling to the Cookiebomb

Recently we have seen a spate of government websites hosting malicious Cookiebomb JavaScript. We have observed URLs with the top level domains such as ‘.gov.uk’, ‘.gov.tr’, ‘.gov.pl’ and the website of a middle eastern embassy in the US become compromised and expose visitors to malware infection. For malicious actors, highly reputable websites are a valuable target to compromise. Politically motivated attackers, such as the Syrian Electronic Army, can use these websites to highlight their cause, to cause embarrassment to an adversary, or to spread malware, possibly as part of a watering hole attack. Profit motivated distributors of malware can use these websites to infect the steady stream of visitors who trust the website and who are unlikely to suspect that it has been compromised.
Read More »

Tags: , , , ,

Retailers Must ‘Catch and Keep’ Today’s Demanding Digital Shoppers

Retailers are entering a new era of consumer shopping behavior fueled by the digital world in which we live. The explosion of digital content has major implications for retailers across all of the channels through which they offer products and services.

In fact, a new study just released by the Cisco Internet Business Solutions Group (IBSG) reveals that web-based digital content is now the most powerful influence on buying decisions for shoppers across all retail channels. The study surveyed 5,000 shoppers across five countries: the United States, United Kingdom, Brazil, Mexico, and China.

The study’s results highlight the need for retailers to “catch and keep” today’s consumers, who now effortlessly “mash-up” digital and physical shopping. At this week’s National Retail Federation (NRF) Convention & Expo, Cisco will explain how retailers can take advantage of this evolution in consumer shopping behavior.

Read More »

Tags: , , , , , , , , , , , , , , , ,

Expanding Universe of Mobile Video Opens a World of Opportunities

Mobile video is exploding at a rate unimagined only a few short years ago. Whereas the quick YouTube clip had been a satisfying enough diversion, consumers armed with next-generation devices now demand the latest bandwidth-busting, 2-gigabyte Hollywood opus. The end user wants it on his iPad, and he wants it now.

For the industry at large, this creates no shortage of challenges. According to the Cisco Visual Networking Index, by 2016, 71 percent of global mobile data traffic will be video, placing a heavy burden on the network. But along this next frontier of mobile video there are also unprecedented and exciting opportunities.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,