Avatar

Screen Shot 2015-07-15 at 1.00.43 PMCo-Written with Usha Andra, Senior Analyst, SP Thought Leadership

For many of us, precious memories are digitally preserved in the form of pictures and videos. How we store and access our favorite photos, clips, songs and other digital content has evolved from hard disks to USB drives and now on to the cloud. And for those of us who have unfortunately dealt with a hard disk crash on our work or personal computers, we are painfully aware of the importance of data backups. Secure data replication and fast retrieval are essential for business productivity and positive consumer experiences.

Mobile Device

New challenges (and opportunities) are on the horizon for data transmission, replication and backup based on the global growth and adoption of IoE applications. As the IoE phenomenon connects things that were previously unconnected, it also leads to Continue reading “The Internet of Everything (IoE) will require Digital Data Storage and Recovery Innovations”

Authors

Taru Khurana

Marketing Manager, Product/Systems

Avatar

Gamification – Does it really motivate your audience to engage, achieve goals and become a more active contributor within your community?

Based on our most recent implementation of gamification at Cisco Live San Diego 2015 last month, the answer to this question is an astounding YES.

Let’s take a quick step back. What exactly is gamification? Gamification can be defined in a number of ways but I like to define it as the application of online game mechanics in a non-game setting to motivate users to engage, achieve goals and build loyalty through the use of intrinsic (and extrinsic) rewards and recognition.

One of our most recent applications of gamification at Cisco was applied to our largest yearly customer event – Cisco Live (San Diego) and this time we targeted the DevNet Zone, also known as our Developer program.

Badges_consolidated with mission

Continue reading “Gamification: DevNet Zone at Cisco Live San Diego 2015 Review”

Authors

Deanna Belle

No Longer with Cisco

Avatar

Screen Shot 2015-07-15 at 10.49.10 AMBy Todd McCrum, Director of Product Management, Cisco Cable Access BU

Back in the earliest days of television – before satellites began spraying an instant and national video footprint over the Earth – operators wondered whether it made sense to expand spectral capacity any further. At the time (early 1950s), most markets topped out at three channels. The big question was this: why would we ever need room for more than 12 channels of television?

House

These days, there’s a similar refrain, with a slight shift in tune. It goes like this: why would we ever need a Gigabit-per-second of bandwidth? Continue reading “The Top Five Things That Will Drive Gigabit Consumption”

Authors

David Yates

as Director of Service Provider Video Marketing at Cisco

SP360

Avatar

We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say “I’m not sure if you know this, but I’m kind of a big deal.” Email is consistently one of the top two threat vectors for malware because so many people out there still open an attachment that looks harmless from someone they don’t know. We all want to think we won a cruise, but that’s not how it works. It’s how malware establishes a foothold on your system. AMP Threat Grid is there to make sure this doesn’t happen.

Cisco acquired Threat Grid to not only bolster its suite of advanced threat solutions, but to also integrate the technology into its advanced malware protection (AMP) products. AMP Threat Grid goes far beyond traditional sandboxing, providing a host of analytical engines to evaluate potential malware. From static and dynamic analysis to various post-processing techniques, AMP Threat Grid evaluates malware to provide the most comprehensive report for even the most junior security analysts. This video provides a more comprehensive overview. Those familiar with Cisco’s Email Security know we already had a sandbox built in and may ask ‘Why change?’ and that’s exactly the question you want to ask. There are really three key reasons: Continue reading “AMP Threat Grid Integrated with Email Security”

Authors

Joe Malenfant

Director, IoT Marketing

Internet of Things (IoT)

Avatar

In my role in Cisco Services, I’m more interested in the challenges of technology adoption and deployment than I am in speeds and feeds, statistics and technology fads.  I actively seek out case studies where technology goes wrong – admittedly most of these examples turn out to be issues around introducing and managing the technology, rather than the technology itself.  So I have to admit, I was fascinated by a recent  eWeek article (full details below) which discussed the huge proportion – the report uncovers evidence of up to 30%!! – of (physical) servers in enterprise data centers that are typically running doing nothing!!  Yes – up to 30% – even in these days of virtualization!

 

How Many Idle and Comatose Servers Do You Have?!
How Many Idle and Comatose Servers Do You Have?!

Yes, even in your data center, it’s probably a safe bet to say that you have some servers that are not doing that much information processing today!  In this part 1 of my blog, I’ll discuss the costs – obvious and hidden – of the idle server challenge.  And next week I’ll discuss why this happens and what you could and indeed should do about it!

Continue reading “How Many Servers Do You Have …. Comatose and Sitting Idle?! (Part 1)”

Authors

Stephen Speirs

No Longer at Cisco

Avatar

Banks are experiencing market disruptors attacking from many angles. They’re facing competition not only within the financial services industry, but also from non-traditional banking institutions that are delivering new mortgage lending models and innovative digital services that provide the convenience and personalization consumers want. Unless banks adopt these new models as well, they risk losing customers and revenue to competitors and emerging market disruptors. In this blog, I’ll focus on how banks can implement a digital branch strategy for mortgage lending that enables them to deliver greater value to their customers, improve productivity among their advisors and even increase profitability.

In mortgage lending today, there are common “gaps” where consumers are most likely to abandon the process or go to a competitor. From the consumer’s perspective, acquiring a mortgage is likely the biggest purchase they will ever make. They spend time researching it, getting their finances in order and gathering the necessary documentation. If the consumer visits a bank branch wanting to apply for a mortgage, only to be told that the mortgage specialist is not available right now or to make an appointment for next week, they are likely to walk across the street to a competitor and not come back. Banks are seeing “leakage” in the mortgage lending process as high as 70% in these scenarios. Once a customer has left, only 30% are likely to return. Continue reading “How Banks Can Capture New Customers by Adopting a Digital Strategy for Mortgage Lending”

Authors

Leni Selvaggio

Global Senior Manager

Financial Services Industry

Avatar

Today, July 15, Cisco will join the United Nations in observing the first annual World Youth Skills Day — a global conversation about youth unemployment and the importance of giving young men and women around the world the skills to thrive in any workplace.

Through social media and the power of the Internet, we can bring awareness to this critical problem, which left more than 74.5 million young people without jobs in 2013. After analyzing the data, the United Nations General Assembly established World Youth Skills Day on November 11, 2014, and today, you can be part of the conversation by using the #wsyd hashtag.

Cisco Networking Academy students in Cambodia have access to online courses and interactive activities.
Cisco Networking Academy students in Cambodia have access to online courses and interactive activities.

Although this issue won’t be solved in a day, Cisco is committed year-round to helping young people develop valuable IT skills and launch their careers in this increasingly connected world.

Every day, our programs and partners are creating social change around the world and helping to close this growing skills gap:

Continue reading “5 Ways Cisco Celebrates Youth World Skills Day All Year”

Authors

Austin Belisle

No Longer with Cisco

Avatar

Today marks another important milestone in our cloud journey together with Microsoft.

Back in March, Cisco and Microsoft announced a jointly engineered solution for service providers designed to dramatically improve the time to market with hybrid cloud services.  The power of the solution is the combination of Windows Azure Pack with Cisco’s Application Centric Infrastructure.  The result is a set of pre-packaged applications libraries that allow service providers to rapidly deploy services, reducing up-front costs and enabling faster time-to-revenue. In addition, the combined solution features automated provisioning, which enables service providers to set up a new tenant in two hours versus 12 when creating a new customer environment – a huge competitive advantage.

Continue reading “The Road to Hybrid Cloud: Microsoft Azure Certified with Cisco Cloud Architecture”

Authors

Kit Beall

Vice President

Cloud and Business Services

Avatar

Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release sees a total of 14 bulletins being released which address 57 CVEs. Four of the bulletins are listed as Critical and address vulnerabilities in Windows Server Hyper-V, VBScript Scripting Engine, Remote Desktop Protocol (RDP) and Internet Explorer. The remaining ten bulletins are marked as Important and address vulnerabilities in SQL Server, Windows DCOM RPC, NETLOGON, Windows Graphic Component, Windows Kernel Mode Driver, Microsoft Office, Windows Installer, Windows, and OLE.

Continue reading “Microsoft Patch Tuesday – July 2015”

Authors

Talos Group

Talos Security Intelligence & Research Group