Avatar

With 31 venues, 364 medal events, 7,000 athletes, 1 million attendees, 650 hours of online coverage, and 23,000 volunteers, the 2015 Pan Am Games in Toronto, Canada were one of the largest international multi-sport competitions ever. And to broadcast the nearly month-long event, organizers needed a massive network capable of reaching every corner of the globe.

To do that, technology-sponsor Cisco tapped local Cisco Networking Academies to build the technology to power the games. Working with Cisco Systems engineers, students were given a unique opportunity to gain hands-on experience, build out their resumes, receive mentoring and training, and gain exposure to potential workplaces. The program was designed to showcase the potential of the students for employers and highlight their unique skills in a professional setting. From behind-the-scenes to the podiums of a world-stage sporting event, the students were given the chance to gain the experience needed to stand out in a competitive job market.

https://www.youtube.com/watch?v=JKyA7yi7DRk&list=PLHLqqC9oWkXx7LhuIjwtmY5T1voPhjU2C&index=19

Continue reading “Connecting the World to the 2015 Pan Am Games in Toronto, Canada”

Authors

Austin Belisle

No Longer with Cisco

Avatar

Your customers are the most important drivers of growth for your business. They’re often the reason new clients seek you out, and they serve as the source for post-sale opportunities and recurring revenue. It’s the simple truth.

But what’s also true is that in today’s digital age and dynamic business environment, where trust and loyalty isn’t what they used to be, maintaining customer health can be challenging to say the least.

So, what’s the “secret sauce” to staying on top of customer expectations and growing the value of your CLV secret sauce (2)installed base?

The answer is all in how you manage your customer data. Clean, actionable data intelligence can help you deliver greater value to the customer, create personalized experiences, accelerate revenue and profits, and serve as the primary catalyst for building customer lifetime value (CLV).

The Ultimate Goal: Expanding Customer Relationships

Growing CLV may mean different things to different people, but I think of it first and foremost as improving the end-to-end customer experience.  It’s the concept of serving customers well beyond that first deal and addressing the full lifecycle across all customer touch points. Along the way, customer satisfaction is improved, and for any sales organization,  there’s no denying that retention is tremendously important. Think about this:

  • Cost: Acquiring a new customer is anywhere from 5 to 25 times more expensive than retaining an existing one. (Source: Harvard Business Review )
  • Profits: Increasing customer retention by 5% can increase profits by a whopping 25 – 90%. (Source: Harvard Business Review/Bain & Company)
  • Value: 82% of companies agree that retention is less costly to execute than new logo acquisition, supporting the idea that ongoing profit from a customer lifetime is higher than any one single transaction. (Source: Forbes)

Your Greatest Limiting Factor: Bad Data

There are many roadblocks to CLV growth, and poor data quality is the top limiting factor today. Disparate data along with outdated, incomplete or inaccurate records can hurt communications, resulting in customer engagement that misses the mark, or sales opportunities that slip through the cracks.

Growing CLV requires that a sales organization effectively manage the data residing in their CRM, ERP, pricing, point of sale, entitlement and other systems. Aggregating and cleansing these disparate data sources to make the information complete and actionable is critical to providing a full 360-degree picture of the customer lifecycle.  Enriched, actionable data can enable your team to know precisely who to reach out to and when, with a message or offer that addresses the customer’s specific needs at that point in time.

Continue reading “Growing Customer Lifetime Value: Here’s the Secret Sauce…”

Authors

Scott Schell

Senior Manager

CX Americas

Avatar

What are the secrets to a successful digital transformation? We’re exploring that in our Going Digital podcast hosted by Peter High, President of Metis Strategy, Author and Keynote Speaker. Peter recently interviewed Gus Shahin, the Chief Information Officer and Senior Vice President of IT at Flex (formerly known as Flextronics) to understand their success. Note – this transcript has been edited due to space limitations.

Flex manages supply chains and manufactures products for companies – from large OEMs like Cisco to startups. They procure, manufacture, distribute, and repair products for their customers with about 100 factories in 40 countries.

https://www.youtube.com/watch?v=tjsYun64gOM

Continue reading “3 Secrets to Going Digital from Flex’s CIO”

Authors

Douglas Bellin

Global Lead, Industries

Manufacturing and Energy

Avatar

[Ed. note: This post was authored by Veronica Valeros, Ross Gibb, Eric Hulse, and Martin Rehak]

Late last autumn, the detector described in one of our previous posts, Cognitive Research: Learning Detectors of Malicious Network Traffic, started to pick up a handful of infected hosts exhibiting a new kind of malware behavior. Initially, the number of infections were quite low, and nothing had drawn particular attention to the findings. Recently, this changed when we observed a significant uptake in the number of infections during the first few weeks of 2016. These infections were linked to a Trojan commonly known as DNSChanger. In our findings, this Trojan was delivered by a modular malware called Mamba. Our root cause analysis strongly suggests that the Trojan is spread by leveraging an established base of adware, unwanted applications, and ad injectors.

Continue reading “DNSChanger Outbreak Linked to Adware Install Base”

Authors

Veronica Valeros

Lead Threat Researcher

Cognitive Threat Analytics

Avatar
#CiscoChat

There is excitement building in the Data Center team for Cisco Live Berlin next week! Our friend Ravi wrote an excellent blog about some of the sessions and demos you should put on your list if you are live in Berlin – but what if you aren’t able to be there?

I will be joining Lauren Friedman (@lauren), Christina Greiner (@ChristinaGren), and Mark Murphy (@mjmsf) to bring you all the best live from the show floor. Engineers Unplugged will be filming on location and Cisco Champions podcasts will be recording. We have a special #CiscoChat with Mark and Intel IoT spokesperson Roger Benson, Director of Intel, EMEA on Tuesday, Feb 16th at 16:00 Berlin time. They will be joined by Director of Cisco IoT Marketing, Jaishree Subramania (@JaishreeMS).  You can catch the live broadcast on Periscope from @CiscoDC and the replay will be available for 24 hours. Be sure to follow @Cisco_IoT for all the Cisco Internet of Things (IoT) related discussions.

In addition, I will be joining Pradeep Parmar (@pradeepsparmar), Cisco marketing manager, to discuss Digital transformation. You can view this #CiscoChat on the @CiscoDigital Periscope channel on Thursday, Feb 18th at 9:00 local time.

You can follow all activity with #CLEUR

“See” you there!

Note to self: Hashtags to remember in Berlin
Note to self: Hashtags to remember in Berlin

.

Authors

Tina Shakour

Social Media Strategy Lead

Avatar

I work with a lot of customers discussing how they can reduce their cyber risk and increase resiliency with an effective security strategy. It’s easy to talk about leading practices for security, but figuring out how to put them into practice can be a whole other story.

As I mentioned in a recent post, the Security and Trust team is headed to CiscoLive Berlin with the goal of sharing real and actionable security practices that are designed to be taken home and put into practice straight away. Continue reading “Built-In Security: Sharing the ‘How’”

Authors

Anthony Grieco

SVP & Chief Security & Trust Officer

Security and Trust Organization

Avatar

To say that global device and connections are growing is a true understatement. And this growth is rapidly shifting.

By 2020, there will be 8.5 billion handheld or personal mobile-ready devices and 3.1 billion machine-to-machine (M2M) connections supported by mobile networks. From smartphones and tablets to PCs and “phablets”, mobile digitization and wearables adoption is creating new demands on wireless infrastructures.

On the heels of last week’s 10th annual VNI Mobile Forecast update, take a visual journey into the major role digitization, personal devices and M2M connections have on mobile data traffic growth.

Mobile VNI Blog 1-01_updated

The Shift from PCs to Smartphones

Each year, new devices in different form factors and with increased capabilities and intelligence are introduced to the global market. For the 2015 VNI Mobile Forecast, phablets were added as a new subcategory within the smartphone segment, which is projected to grow from 38% of all mobile connections in 2015 to 48% of all mobile connections by 2020. Within the same time frame, the overall share of nonsmartphone devices–like PCs–will decline from 50% of all mobile connections in 2015 to 21% by 2020.

Continue reading “Shape Shifting Meets Accessorizing – the Latest Mobile Devices & Connections Trends”

Authors

Shruti Jain

Leader, Project & Program Management

X-Architecture Marketing, Enterprise Networking & Cloud

Avatar

You know the drill. It’s one of the great things about the OpenStack Summit. Unlike most other conferences, where organizers single-handedly set the agenda based on what they think you want to hear, the OpenStack Summit agenda is based on what you actually want to hear.

Curious about containers? Intrigued by NFV? Wondering what’s next on the Neutron roadOpenStack Austinmap? Tell them with your votes. Go to the OpenStack Foundation page and choose the sessions that are most interesting to you.It’s easy, it’s fun, and there is no limit to how many sessions you can vote for.*

But here’s the catch: The Foundation received more than 1,200 talk submissions this time. 1,200!!!

Do you have time to read through them all?

Of course not.

Continue reading “OpenStack Summit – Vote Now Speaking Sessions and Topics”

Authors

Ali Amagasu

Marketing Communications Manager

Avatar

Working with limited resources and being asked to “do more with less” is often par for the course for small and midsize businesses (SMBs). Smaller companies are also credited with being more nimble than their enterprise counterparts, adopting next-generation tools more quickly and experimenting with new business models. However, a new survey of CSOs and SecOps Managers reveals that more SMBs are putting themselves at increased risk for cyber attacks by forgoing critical security capabilities and processes.

Attackers are Developing Sophisticated Tactics for Entering Networks and Remaining Undetected

In the 2016 Cisco Annual Security Report, Cisco researchers detail some of the latest advanced attacks and trends shaping the security industry. Online criminals are continually evolving their attack methods to evade detection and accomplish their goals. They’re building resiliency into their operations; if detected, attackers quickly reconfigure and reconstitute on new systems in minutes. Security professionals need to fill the gaps in their defenses and improve their own resilience to these advanced attacks.

Continue reading “Small to Midsize Business Security Capabilities Falling as Attack Sophistication Rises”

Authors

John Damon

Sr. Manager, Product Marketing - Security

Network Security