Avatar

Last week, I was prepping for the 11th OpenStack Summit in Vancouver, when I suddenly had a question pop up. How on earth would I, much less over a hundred of us, from Cisco communicate at an international destination in an easy and organized way?

Some group ideas were:

  • Temporary international data plans for $30
  • For the thrifty, call forwarding via Wi-Fi to messaging clients such as Cisco Jabber
  • Email

Maybe.

Even just organizing using one of these methods would be fragmented and painful. Ironically, an OpenStack based solution called Cisco Spark  comes into play here much more nicely. It allows to more easily organize and communicate with each other at events like the OpenStack Summit.

Cisco Spark: Built and Hosted on OpenStack

Did you know that WebEx is the 3rd largest cloud SaaS solution in the world? Or that it has been operating on OpenStack for over three years? Additionally, the new Cisco Spark solution for team collaboration was developed on and is hosted on an OpenStack cloud to our customers.  As someone who hates the inefficiency of email bombardment, this sleek new collaboration solution is ideal for teams to organize around projects.

Continue reading “What’s the 411 on OpenStack based Summit Collaboration in Vancouver?”

Authors

Jamie Alfieri

Product Marketing: Cisco Intercloud Services

Avatar

Despite the seeming media saturation of the Internet of Things (IoT) and the importance of industrial adoption, it was eye-opening to hear that 47% of manufacturers are still unclear on the value of IoT and how to proceed with adoption.   Cisco recently partnered with LNS Research on a research study to further understand the dynamics behind this.

Take a look at this Slide share below to see a summary of the study’s findings:

http://www.slideshare.net/CiscoBusinessInsights/lns-research-capturing-the-business-value-of-the-industrial-iot

To get more details directly from the analysts who authored this study including Matt Littlefield, listen to this on-demand webcast, “Smart Connected Operations: Capturing the Value of the Industrial IoT”,  This webcast will also cover emerging best practices on how to transform the value chain and manufacturing system architectures toward Smart Connected operations, as well as how to build a business case for your specific production environment.

In addition, listeners to the webcast will receive an e-Book covering the following:

  • The top objectives and challenges manufacturers are facing today, and how Smart Connected Operations are being employed to accelerate success
  • A guide to building a business case for investment in Industrial IoT technology

The challenge for most manufacturers today is not falling behind and losing their competitive edge in their particular markets. In addition, further education is clearly a need so this study fills an obvious need. Let me know any thoughts or comments. Thanks for reading.

Authors

Kevin Davenport

Cisco’s Global Solutions Manager

Industrial Intelligence

Avatar

So we were back in London this week to attend the annual Global Telecoms Business Summit and Innovations Awards, and what a great industry event it was. Lots of customer interactions, industry networking, exchange of best practices, and of course the Innovation Awards.

Global Telecom Business

The Global Telecom Business Summit and Innovation Awards is an annual event that celebrates innovative solutions created by Continue reading “Cisco – Aspider-NGI, Cisco and Telindus Win 2015 Coveted Global Telecom Business Innovations Award”

Authors

Jim O'Leary

Sr. Manager Mobile Solutions Marketing

Avatar

Hybrid cloud is about flexibility. It’s about having access to the extra capacity you need, when you need it. It’s about paying only for what you use. And it’s about being able to quickly extend your IT capabilities so you can address new opportunities as they arise.

Hybrid cloud is also about saving money. And to lock in the best rates, you’ll need to sign a commitment with a cloud provider. The question is, how do you know how much capacity to sign up for?

In “Right-sizing Your Hybrid Cloud”, managed cloud provider Netelligent describes a three-stage approach to getting the most for your money: 1) needs assessment, 2) building out a cloud plan, and 3) verifying your plan and right-sizing it.

Deciding how you want to use the cloud can be challenging. You have many service choices and deployment models to choose from from. Many cloud providers can customize your service as well.

Reality is, you are not just buying a service from a cloud provider. You are establishing an ongoing relationship with them. For many organizations, your provider will become a trusted advisor. This means you will count on your provider to help you make decisions, be proactive and keep your company’s best interests in mind.

Providers like Netelligent understand that the key aspect of this relationship is trust. There are three levels of trust to look for in a cloud provider:

1) Understanding your needs: Trust takes work. It is only after your provider understands your business needs that it can determine the best course to meet them. To achieve this, many providers have developed professional services teams to work with you to assess your needs and develop a cloud plan designed to meet your business’ unique requirements. For providers who don’t have such a team, Cisco has a professional services program and can work directly with you and your provider to create a custom plan.

2) Transparency: Promises are nice. Promises backed by verification that these promises have been met are even better. After all, it is much easier to trust a provider who can prove they have delivered as they said they would. It is also easier to trust a provider who can show you that the plan it helped you develop is actually meeting your needs.

3) Accountability: Sometimes estimates are off. And sometimes the plan your provider helped you create has you committed to more resources than you truly need. The true test of trust is how your provider stands behind its work. Does your provider penalize you for adopting the plan it suggested? Or does your provider guarantee your satisfaction by working with you to adjust your plan and make it right.

The world is moving to cloud. As a result, more and more businesses are relying on cloud providers to help them transform their business. Trust is essential to this relationship. It is the key to transforming a provider into your partner.

Authors

Xander Uyleman

Senior Manager

Global Partner Marketing

Avatar

I was excited to attend the Open Networking User Group Conference last week at Columbia University in New York. The Open Networking User Group is a community of IT business leaders who exchange ideas and best practices for implementing Open Networking and Software-Defined Networking (SDN) designs. One of the ONUG working groups is the SD-WAN Working Group which was my main interest for attending this event. The SD-WAN working group has determined a set of 10 business requirements (based on user-developed use cases) that Enterprises should consider when evaluating SD-WAN solutions:

Continue reading “Cisco Intelligent WAN Delivers on SD-WAN Business Requirements”

Authors

Kiran Ghodgaonkar

Senior Manager, Enterprise Marketing

Intent-based Networking Group

Avatar

Imagine if you will, a company hosting its first-ever global sales meeting – online. Virtually connecting 140 salespeople in 12 countries and as many time zones. It could have been a nightmare, but the meeting went off without a hitch. How?

Well, let’s start with Cisco Unified Communications Manager (Unified CM). Yes, the Cisco IP telephony system has grown up. It’s now the very core of Cisco’s collaboration infrastructure, helping you bring people together—anytime, anywhere, on any device–with a single architecture for all your voice, video, and data.

Back to the meeting. The salespeople connected from offices, conference rooms, on work laptops, at home on tablets, and some even used smartphones between sales calls in the field. Everyone could hear and see each other each other clearly, as if they were all together in one place.

How would you like to extend this experience to your partners or customers? Imagine how much more personal and effective your meetings can be when you connect instantly.

With the Cisco collaboration infrastructure, everybody gets the same high-quality experience on any device. Instant access fosters collaboration with partners, customers, and remote experts. It’s all just as easy as making a phone call on Unified Communications Manager. Continue reading “The Collaboration Zone (or Communication Manager Grows Up)”

Authors

Mark Royle

No Longer with Cisco

Avatar

If you missed the April 28th Cisco Knowledge Network (CKN) webinar, you missed a very special event (but, don’t worry we provide the link below to the replay for all those who did register). Cisco Knowledge Network is an ongoing series of webinars for our customers and other interested people. Typically we cover technology and solutions. On the April 28th CKN 233 people watched and which is a new encapsulation protocol that enables dynamic service creation and modification without touching the network topology.

Charles Darwin

What made this CKN even more special was that Cisco teamed up with our NSH partner Intel to deliver this webinar. Uri Elzur (Intel) and Paul Quinn (Cisco), the amongst the authors of the NSH protocol IETF draft, joined Humberto La Roche (Cisco CTO office) to present and answer questions. Continue reading “Cisco and Intel team up to make SDN easy for Service Creation”

Authors

Dan Kurschner

Marketing Manager, Product/Systems

Avatar

This post was authored by Cisco CSIRT’s Robert Semans, Brandon Enright, James Sheppard, and Matt Healy.

In late 2013­­­–early 2014, a compromised FTP client dubbed “StealZilla,” based off the open source FileZilla FTP client was discovered. The attackers modified a few lines of code, recompiled the program, and disbursed the trojanized version on compromised web servers. This new attack appears to involve the same actors who reused the same techniques to alter the source code of the widely used open source Telnet/SSH client, PuTTY, and used their network of compromised web servers to serve up similar fake Putty download pages. This new campaign is like the StealZilla campaign in almost every way. Continue reading “Trojanized PuTTY Software”

Authors

Chris Fry

InfoSec Investigations Manager Public Division: Cisco CSIRT