One of the hardest things for a company to do is to embrace new technology and manage it in line with company policy. At most organizations, users are generally told not to access certain company data on certain devices, but they go around security controls because efficiency and convenience outweigh the risk. Rather than preventing new technology from emerging in the environment, embrace it and understand it, but do so prudently. Read More »
Government, Trust, & Technology Services, Cisco SourceFire, and Contextual Network Awareness: A Proactive Approach to Security
Dear Contact Center Marketing Director,
I’ve been thinking a long time about this and I wanted to write and mention a few annoying things about your contact center. I also have some great suggestions for you on how you can improve your customer service. I’m not saying I have all the answers but as a valued customer I thought you might like to hear from me. I believe these opinions are not just mine, but probably span a large part of your loyal client base. Read More »
What’s the klutziest thing you’ve ever done in a Data Center?
Over the years I’ve seen people drop tools, tangle patch cords and step into notched floor tiles. Once when I was giving a Data Center tour a fellow was so intent to see how outside air was drawn into the HVAC system that he whacked his head on a viewing window.
I’ve encountered outages caused by clumsiness, too. In one case a co-worker was lifting a floor tile and tilted the panel too steeply, causing it to separate from the suction-cup tile puller he was using and crash into the plenum below, slicing a fiber cable. Read More »
My team is moving hundreds of applications to our new Application Centric Infrastructure (ACI) platform, and network dependency mapping is the first step in this migration. Most of Cisco IT’s applications are three tiered with web and middle tier residing on the same Java Virtual Machine (JVM) connecting to a database.
A typical application may have one or more JVMs that connect to one or more databases. Sometimes the databases internally connect to other databases. Over the last five years, we have heavily invested in Services Oriented Architecture (SOA) and thus have JVMs running web services. These web services are consumed by one or more user interfaces (UI). Some of these applications have jobs that run on our Cisco Tidal Enterprise Scheduler (TES). Read More »
Our customers’ expectations and buying behaviors are changing, and more brands compete for their attention. We either need to reinvent our approach to marketing or risk losing business to our competitors.
The big change in buying behavior is that most of us now research a product online before we ever meet with a salesperson. This is true whether we’re looking to buy a washing machine or IT infrastructure.
Read More »