We thank all of those serving or who have served in the U.S. military.
We live freely today because of your sacrifice.
The holiday season has always been a time for family and gratitude. And it is fitting that we thank and honor our Veterans at the beginning of this season. We are humbled by your loyalty and the sacrifices you have made for our liberties, and privileged to work alongside you. The legacy you leave in the wake of your service inspires us all.
Our veterans have helped shape this country’s past and they are the heroes who safeguard our future. And while expressions of gratitude are admirable and appreciated, we must all do more to support their transition back into civilian life.
Here are a few great ways you can support our veterans:
- Green Beret Foundation – The Green Beret Foundation provides immediate financial assistance to Green Berets who are injured in the line of duty, to their families, and to the families of our fallen brothers.
- Operation Homefront – Operation Homefront offers financial and food assistance, repairs, and help to the families of our service members and wounded warriors.
- Wounded Warrior – The Wounded Warrior Project helps raise awareness and enlists public aid for the needs of injured service members. It also helps injured service members assist each other, and provides unique, direct programs and services to meet the needs of injured service members.
We hope that you will take the time to research these organizations and find ways to become more involved. This season has only just begun; and in the midst of all our holidays and celebrations, let us think of those who have served this country. Here at Cisco, we encourage all our employees to pledge their support and donate to a mission—we hope you do the same.
To all the veterans, we remain forever indebted to your sacrifice and we honor your service. We will never forget your unwavering commitment and heroism.
Happy Veterans Day.
Tags: Cisco, govtech, honor, salute, veterans, veterans day
In my previous blog, I explained how COBIT 5 provided a robust framework to understand your users’ expectation for IT services. With this knowledge in mind, we can now depict the value that your IT department should provide going forward and how success will be measured – in other words, we can now build your IT Value Map, which is the second phase of Cisco’s Strategic IT Roadmap methodology.
The IT Value Map is vital for any IT organisation that is transitioning to a new operational model (typically, cloud-driven), and that needs to clearly explain its IT Vision & Strategy to all stakeholders involved: employees, users/customers, partners, etc. The IT Value Map is also the first step towards creating an interactive, real-time CIO dashboard — but this is a topic for another blog post.
Here below, I describe the process of building a typical IT Value Map through the lens of three Operational Directorates, supported by six Governance Pillars.
Read More »
Tags: cloud, govcloud, IT value map, sitr
In my previous post, I introduced Cisco’s Strategic IT Roadmap (SITR) methodology, and explained how it can guide Shared IT Services departments on their journey to the hybrid cloud. I’ll now provide some more details on the first phase (out of three) of a SITR engagement, which consists of a series of detailed interviews and/or workshops held with the business stakeholders and end users. Leveraging the COBIT 5 framework, we’ll provide a balanced business view of how IT is perceived from the outside — and ascertain how technology creates value for your clients and what needs evolving.
In this post and in the context of cloud transformation, we look at eight of the most relevant drivers that COBIT 5 identifies in its 17-point list. This delivers a balanced scorecard that covers
4 key dimensions: financial, internal, customer-oriented and future-oriented. We’ll examine both where your organisation is now and how you would need to evolve.
Read More »
Tags: cloud, cobit, sitr
“Community policing is central to the success of the police mission as we provide quality services to, and build relationships with, our diverse communities.”
IACP President Yost Zakhary
I had the privilege of attending the 2014 International Association of Chiefs of Police (IACP) Community Policing awards last Sunday, and I can say firsthand that it was nothing short of awe-inspiring to meet the amazing men and women from the agencies being honored. Their commitment and determination to drive initiatives that make everyone safer is incredible.
Each year since 1998, the IACP Community Policing Committee awards the best community policing practices of agencies around the world. Since the inception of the awards, over 73 agency winners and 132 finalists globally have been recognized for their commitment to community policing and innovation.
Entries are awarded in five population categories and judged on innovative ideas that utilize the power of community policing in order to ultimately make our communities safer. The process involves extremely high standards as well. If none of the submissions in a category meet the established standards set by the Community Policing Committee, no award is given in that category.
The 2014 winners and finalists highlight innovative initiatives that address issues involving such things youth crime and school issues, gun violence, and homicide. It’s an amazing representation of the power of community policing in order to make a difference and to make our communities better.
This year’s IACP Community Policing Award winners and finalists are:
Read More »
Tags: #IACP2014, chief of police, Community Policing, IACP, law enforcement, police, Public Safety
From checking bank statements to booking flights, mobile phones have become integral to our everyday lives. In the near future, the number of mobile devices will exceed the world’s population, and by 2017, we expect more than 10 billion mobile devices to be used across the globe.
With this proliferation, public sector organizations are facing increasing pressure to accommodate the growing numbers of users expecting to be constantly connected regardless of who owns the device. The network must dynamically adjust in real-time to an exponentially growing and disparate number of devices and applications that demand immediate and secure connectivity.
In government organizations, comprehensive policies supporting BYOD initiatives are lacking. Many IT leaders still need to shift their strategies to include secure mobility within their security agenda. Read More »
Tags: cybersecurity awareness, NCSAM, secure mobility