networking
Speaking proposal submissions for OpenStack Summit – Voting is Open!
Cisco celebrated OpenStack’s 3rd birthday recently by releasing the Cisco OpenStack Installer for Grizzly. This blog post has more details. The OpenStack foundation organizes a four-day OpenStack Summit every six months for contributors, enterprise users, service providers, application developers an…
Cisco OpenStack Installer for Grizzly
The OpenStack community recently reached a major milestone and celebrated its third birthday! The flagship open-source compute, storage and networking cloud platform has come a long way since the initial draft. Cisco is proud to be part of this community including participating as Vice Chair of the…
Solving the Network Location Problem with LISP
Your Location Has Changed, Carry On! Solving the Network Location Problem with LISP (Locator/Identifier Separation Protocol) The first thing that comes to mind when someone mentions location is our GPS location. Our ability to roam around the earth with our mobile devices is something many of us tak…
[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Pe …
Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing? In his latest blog, K-12 B…
Connection, Collaboration, and Innovation at the Cisco Networking Academy Conference
The annual Cisco Networking Academy Conference opened with a fitting tribute to celebrate its rich 15-year history. Cisco Executive Chairman Emeritus John Morgridge took the stage just days before his 80th birthday and told the audience the story of how Networking Academy was founded. Hundreds of ac…
Three Simple Ways to Boost Mobile Device Security
The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security. Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From ope…
[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Pe …
So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional. Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (I…
Cisco Hacks: Notes from the CMX Hackathon
Editor’s Note: This is a guest post by two Wireless Networking Group interns, Nonie Grewal and Nivedita Jagdale, to capture their thoughts on the Connected Mobile Experiences Hackathon that they helped plan and execute. June 29th marked the start of the Connected Mobile Experiences (CMX) Hacka…
The Use and Impact of Social Media: A Blog Post
In recent years, social media has become the staple of communication. I remember when I was only about 11 years old and I first discovered the wonder of Myspace. This tool (the first of its kind) led the way to Twitter, Facebook, LinkedIn, Pinterest, etc. Social media opened up a whole new world of…