In 2012, the Global Social Media Team worked closely with Gerry McGovern from Customer Carewords to run a top tasks study to understand what tasks visitors want to accomplish on social channels. This methodology le...
Cisco has won the prestigious 2013 Uptime Institute 2013 Green Enterprise IT AwardTM(GEIT) in the Green Digital Infrastructure Strategy category. Uptime Institute grants GEIT Awards each year to companies that significantly improv...
By Steve Simlo, IPv6 Product Manager, Cisco Network Operating Systems Technology Group We've been actively promoting the adoption of IPv6 at various venues -back in January at Cisco Live London, and a few weeks ago at the V6 Worl...
"A security advisory was just published!Should I hurry and upgrade all my Cisco devices now?" This is a question that I am being asked by customers on a regular basis. In fact, I am also asked why there are so many security vulner...
On March 19th, 2013 Cisco announced thebest 2-socket virtualized SAP SalesandDistribution (SD) Benchmark resultina Linux environment with the Cisco Unified Computing System? (Cisco UCS?)deliveringhigh scalabilityandlow latencyinvi...
When I stepped outside this morning, new clouds were forming by the second. By the time I reached my car, they had transformed a static blue sky into a pulsing network of dynamic gray structures. It was so fast it seemed like a ma...
Why the Network Will Drive the Next Wave of Mobility Forty years ago, the first phone call was placed on a handheld mobile phone. The call was placed by Martin Cooper at Motorola's Communications Systems Division, who phoned a com...
Welcome to the Cisco Sizzle!Each month, we're rounding up the best of the best from across our social media channels for your reading pleasure. From the most read blog posts to the top engaging content on Facebook or LinkedIn, cat...
For those of you familiar with the movie "This is Spinal Tap" the volume on SDN has been turned up to 11 for some time. However, too much of the sound is around the technology and not on the benefits to network operators. In fact,...
Dan Goodin, editor at Ars Technica, has been tracking and compiling info on an elusive series of website compromises that could be impacting tens of thousands of otherwise perfectly legitimate sites. While various resear...
Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with cur...
We estimate there are approximately 1.4M potential mid-size and large customers globally. Reaching them with the right message and the right offerings at the right time is not trivial, nor is it something that just luckily happens...