One of the hardest things for a company to do is to embrace new technology and manage it in line with company policy. At most organizations, users are generally told not to access certain company data on certain devices, but they go around security controls because efficiency and convenience outweigh the risk. Rather than preventing new technology from emerging in the environment, embrace it and understand it, but do so prudently. Read More »
Government, Trust, & Technology Services, Cisco SourceFire, and Contextual Network Awareness: A Proactive Approach to Security
Dear Contact Center Marketing Director,
I’ve been thinking a long time about this and I wanted to write and mention a few annoying things about your contact center. I also have some great suggestions for you on how you can improve your customer service. I’m not saying I have all the answers but as a valued customer I thought you might like to hear from me. I believe these opinions are not just mine, but probably span a large part of your loyal client base. Read More »
My team is moving hundreds of applications to our new Application Centric Infrastructure (ACI) platform, and network dependency mapping is the first step in this migration. Most of Cisco IT’s applications are three tiered with web and middle tier residing on the same Java Virtual Machine (JVM) connecting to a database.
A typical application may have one or more JVMs that connect to one or more databases. Sometimes the databases internally connect to other databases. Over the last five years, we have heavily invested in Services Oriented Architecture (SOA) and thus have JVMs running web services. These web services are consumed by one or more user interfaces (UI). Some of these applications have jobs that run on our Cisco Tidal Enterprise Scheduler (TES). Read More »
Our customers’ expectations and buying behaviors are changing, and more brands compete for their attention. We either need to reinvent our approach to marketing or risk losing business to our competitors.
The big change in buying behavior is that most of us now research a product online before we ever meet with a salesperson. This is true whether we’re looking to buy a washing machine or IT infrastructure.
Read More »
Whatever new technology comes out, it seems that the number of emails we get every day only continues to rise. Well, not everywhere. On my last birthday, I received wishes from 65 sources: 58 from friends through Facebook and the remaining 7 from the financial institutions that I deal with (all automated system notifications). Like me, I am sure that many of you have a personal email inbox with mostly subscriptions and like messages and very few emails from friends. As one Millennial said, “Only my grandma sends emails to me.” Why not the same case at work? On average, I get 200 emails per day in my inbox plus the ones that go to specific folders. I’m not even including the voluntary recreational subscriptions that go to separate folders.
Read More »