Avatar

Cisco Connected Mobile Experiences is a new solution that helps enable retail organizations to use Wi-Fi location services to deliver engaging store experiences and generate valuable shopper insights. Our industry-specific webinars so far break down use cases for Connected Mobile Experiences for airports/transportation and retail..with  more coming soon.

Our latest CMX webinar on demand is specific for retailers: “Boost Revenue, Build Loyalty.”

View this 45-minute on-demand video webcast to learn how to captivate your shoppers with new mobile apps supported by Cisco Connected Mobile Experiences. Discover how real-time location intelligence from your wireless network can enhance customer loyalty, improve store operations, and help you:



Avatar

Recreation_of_Martin_Luther_King's_Cell

 “…when you suddenly find your tongue twisted and your speech stammering as you seek to explain to your six-year-old daughter why she can’t go to the public amusement park that has just been advertised on television, and see tears welling up in her eyes when she is told that Funtown is closed to colored children, and see ominous clouds of inferiority beginning to form in her little mental sky, and see her beginning to distort her personality by developing an unconscious bitterness toward white people;

…when you go forever fighting a degenerating sense of “nobodiness”–then you will understand why we find it difficult to wait. There comes a time when the cup of endurance runs over, and men are no longer willing to be plunged into the abyss of despair. I hope, sirs, you can understand our legitimate and unavoidable impatience.”

This month marks the 50th anniversary of Martin Luther King Jr.’s “Letter from Birmingham Jail.” Martin Luther King Jr was a civil rights leader who transformed the conversation on race in the United States. He wrote this letter after being arrested while leading marches and sit-ins to protest racism and racial segregation in Birmingham, Alabama. Eight fellow clergymen of Alabama wrote an open letter asking him to cease his leadership of the demonstrations and to pursue justice through the courts. I was drawn to re-read the full text of the letter after reading Dr. Eric L. Motley’s essay, “On the 50th Anniversary, the Living Legacy of “Letter from Birmingham Jail.” Motley writes:

its ideas transcend the turbulent times in which it was written. Civil rights historian Diane McWhorter notes that the original conflict “was between not good and evil, but good and normal.” The brute racism that strikes us today as mass social insanity Continue reading “Thermometer or Thermostat? MLK Jr’s Letter from Birmingham Jail”



Authors

Olivia Shen Green

No Longer at Cisco

Avatar

The Common Criteria Users Forum is inviting representatives from Canadian government agencies to participate in a free round-table discussion about how the information assurance requirements of Canadian government agencies can be incorporated in international standards for IT security and the evaluation of IT products.

Specifically, we are hoping to engage individuals who have a working-level understanding of government IT security standards, procurement policies, or certification and accreditation, in a discussion about how Canadian government agencies can provide input into the development of Common Criteria Protection Profiles for IT products.

Note that we will not be discussing specific requirements, it is not a commercial or sales event, and there is no fee or obligation for attending.  While this event is intended for Canada, the CCUF is looking to expand to other geographies.

Common Criteria Users Forum

 

Date, time, and location:
The meeting is being held on Friday, 17 May 2013 from 10:30 AM to noon, at Oracle, 45
O’Connor St Ottawa, ON K1P 1A4.
Agenda:
10:30 to 10:45 — Welcome and introductions
10:45 to 11:00 — A brief introduction to the Common Criteria and the CCUF
11:00 to noon — Round-table discussion

Continue reading “Invitation to attend a discussion about IT product security and information assurance requirements for the Canadian gove …”



Authors

Kathleen Wilson

Sr. Manager, Marketing and Communications

Security and Trust Organizations

Avatar

We’re entering the age of the Internet of Everything (IoE), which is about connecting the Internet to the physical world (people, process, data, and things). We’re early in the process, with approximately 10 billion devices already connected. By 2020, Cisco projects that this number will reach 50 billion “things.” One of the key areas of impact identified in the Cisco Internet of Everything Economy report, “Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion,” is customer experience. The report estimates that IoE-driven customer experience advances — based on increasing customer lifetime value and growing market share by adding more customers — will drive $3.7 trillion of the estimated $14.4 trillion of IoE Value at Stake globally over the next decade.
Web
IoE is enabling organizations to engage with their customers in whole new ways and to create new business models. IoE is all about making new connections possible: interactions among people, and between people and devices. It’s also about the ability of devices to communicate with each other, with applications, and with digital services, and then empowering those technologies to take action based on these communications.

When more of the world is connected, expect the delivery of your customer experience to shift beyond the boundaries of your current web and mobile sites, and past the walls of your offices and stores. New technologies connected to the Internet — including things like Google Glasses, IP-enabled lightbulbs, new gesture technologies, and sensors — will form the foundation of IoE. However, it is the data stream produced by all of these new connections that will have the greatest impact on your relationship with your customers.

With IoE, you will be better able to build customer loyalty and delight — creating emotional brand connections, personalizing the experience, and targeting offerings based on the data generated by IoE. Just think about what the IoE-powered future might look like across your customer journey.

  • Transform the process of building awareness and encouraging purchases,by bringing together data from various sources, including sensors that pick up signals to help anticipate customer needs. Target these customers in real time based on history, location, and activity.
    • Apps move from performing cross-brand product comparisons to enabling customers to determine where to find items based on criteria they set, including best price, product ratings, and the most convenient retail location to shop (automatically taking traffic and wait times into consideration).
    • Connected vending machines, digital signage, and other surfaces will recognize customers and deliver customized content at the point of need.
    • Items will be ordered on — and delivered to — a customer’s mobile phone, wherever it is located.
  • Post-sale, connect with the personal side of customers’ lives to help them achieve their goals. This will enable you to add post-sale value to create new revenue streams and drive new insights for innovation. Look for ways to be proactive, anticipate and prevent issues before they happen, or make suggestions that will improve a customer’s life.
    • Mobile devices or sensors react to the environment and are set to receive personalized messages placed by you or your customers’ social circles.
    • Sensors on clothing monitor customers’ health, enabling them to analyze and collect information about themselves, optimize their personal behaviors, and alert caregivers when there is an issue.
    • Connected cars move beyond monitoring an automobile’s performance to collecting data about customers’ driving habits, providing instant insurance quotes, and communicating with things along a route

These capabilities can be offered as services, and the great thing is they can be updated and improved over time. Companies like Nike are already way ahead with products like Nike Fuel. Nike has secured a role in my life around my fitness goals, and given all the history it has collected about me, I am not likely to switch to a competitor anytime soon.

If you want to be in a position to tap in to the potential of IoE, it’s time to get thinking about the role your brand will play in this new world. One of the first steps in designing your customer experience is good information about the needs and trends of your customers. Cisco is helping through primary research such as the Connected Customer Experience Report for Health Care, with more industries to come.  Please also follow us on the new Cisco Customer Experience Facebook page and Twitter for updated information.

In Part 2 of this blog series, I’ll provide specific details on how to get started in realizing the benefits of IoE for improving customer experience. In the meantime, I’d love your thoughts on how IoE will redefine customer experience as we know it.



Authors

Rachael McBrearty

Chief Creative and Group Leader

Cisco Consulting Services

Avatar

In this installment of the “We’re Listening” blog series, Sheila Jordan discusses how our technical investments make a difference in your cisco.com experience.  Sheila is Cisco’s Senior Vice President of IT Communication and Collaboration.

Sheila Jordan By Guest Contributor Sheila Jordan
 
“That was faster than I expected.” How often has this popped into your mind during an online session? Probably not often enough, and the bad experiences tend to stick.

We heard your message: Make sure online applications are “always on” and run faster. To do that, we’ve invested in the technological muscle to respond, notably the Cisco Metro Virtual Data Center (MVDC). Here’s a quick look under the hood. Continue reading “The We’re Listening Blog Series: Investing in Reliability and Speed”



Authors

Curt Hill

Senior Vice President

Customer Assurance

Avatar

4-19 Figure 1I’m excited to mention that next week I’m hosting a webinar on BrightTalk, with my guest Ashok Rajagopalan, from Cisco’s UCS Product Management Team.  You guessed it, we’ll be talking VDI, but more specifically, we’ll be exploring a new portfolio of architectures that are expanding the breadth of use cases and IT environments into which we can deliver cost-effective, easy-to-manage, high-performance virtualized desktops and apps.

I’ll be asking Ashok about some of the trends we’ve been seeing over the last year including the proliferation of flash memory based storage solutions and more importantly how Cisco is eliminating performance bottlenecks and delivering tier-0 (on-server) storage solutions for VDI, ideal for floating / stateless desktop environments. 4-19 Figure 2

Many customers we’ve met with are resonating with the ability to leverage server-installed storage footprint that offers expansive IOPS capacity, coupled with the simpler manageability through UCS Manager and Service Profile Templates.

4-19 Figure 3Additionally we’ll discuss how Cisco is delivering a full spectrum or portfolio approach to offering reference architectures that map more closely to the specific VDI use cases.  This expanded flexibility and choice is breaking down the CAPEX and operations hurdles many IT organizations face when implementing VDI.  We’ll also discuss the best-of-breed technologies we’ve integrated from our solution ecosystem, and how you can take advantage of new reference architectures that help eliminate the guesswork from VDI.

Join us on Thursday April 25th, to learn more, and ask us your questions about how these new reference architectures and help you deliver desktop virtualization with reduced cost, increased flexibility and greater simplicity.  Click here to register!



Avatar

In Part 1 of this blog series, we looked at Gartner’s definition of Fabric based infrastructure (FBI). In part 2, we explored the benefits of service profiles and automation of server management. In this last installment, we will look into the benefits of fabric extension to virtual machines.

According to an IDC report (New Economic Model for the Data Center), the rate of growth of virtual machines is much higher than physical machines.  The life cycle of virtual machines is more dynamic than physical servers. Virtual machines may need to be moved from one network to another for data access.  Additionally, typical deployments of virtual machines have an extra layer of switching in the hypervisor.  The software switches in the hypervisor emulate hardware at the expense of application performance. Cisco UCS solves these problems with the Cisco Virtual Interface cards (VICs) acting as adapter fabric extenders (fig 1) and bringing the network to virtual machines (VMs).

FEX

Another problem is that network administrators have no control on the soft switches in the hypervisor, which makes monitoring of network traffic to individual VMs very cumbersome. Cisco VICs use the VN-Tag standard in IEEE 802.1 BR standard to manage each link from the VM as if it were a Continue reading “Cisco UCS – Quintessential Fabric-based computing – Part 3”



Avatar

With the advent of BYOD and the proliferation of mobile applications – it’s become ever important to have visibility into your wireless network using deep packet inspection. By classifying the data flows that go through the wireless LAN, administrators now have visibility into the top users and top applications which are consuming bandwidth on their network. After analyzing this data and armed with visibility into these applications, Cisco AVC allows the administrator to then take action such as prioritize, deprioritize or block on the applications in their network.

Since Cisco has released Application Visibility and Control (AVC) for wireless – our customers and partners have been highly interested in the technology and how it can be put to work for them.  Visibility into the applications is made possible on the controller web interface which is useful for diagnosing real-time issues or analyzing short-term application trends. The wireless LAN controller GUI is shown below depicting a network using a variety of applications as identified by AVC.

avc1 Continue reading “Cisco Application Visibility with 3rd Party Tools”



Authors

Jameson Blandford

Sr. Technical Marketing Engineer

Intent-based Networking Group

Avatar

UPDATE: Webcast information is also now available at the Cisco Live 365 site

Many network security administrators are struggling to keep their network “up-to-date” with the constant release of new vulnerabilities and software fixes. At the same time, they’re under pressure to provide near 100% availability of key business services and systems. Every time a vendor discloses a security vulnerability, network security administrators must identify affected devices and (in numerous cases) upgrade such devices. These activities can take hours, days, or even weeks depending on the size of the organization. For instance large enterprises and organizations may have thousands of routers and switches that need to be assessed for the impact of any given vulnerability. Cisco is helping customers by adopting cutting-edge security automation standards such as the  Open Vulnerability and Assessment Language (OVAL) and the Common Vulnerability Reporting Framework (CVRF).

In the following blog posts, I’ve provided details about how security automation is helping customers:

Additionally, my colleague Mike Schiffman has posted several posts explaining CVRF.

Webcast took place on Tuesday, April 23rd at 10:00 a.m. EST (14:00 GMT). Over 150 customers from 29 countries learned about security automation; Cisco’s machine readable content strategy; and vulnerability assessment using OVAL. We discussed how customers can use OVAL to quickly assess the effects of security vulnerabilities in Cisco IOS Software devices. The recording is now available:

https://youtu.be/Yf9o8TvWH4I

 

 



Authors

Omar Santos

Distinguished Engineer

Cisco Product Security Incident Response Team (PSIRT) Security Research and Operations