Terms and Conditions Document for the Jewel Concert at NAB on April 13, 2011, 2pm PST.
http://www.cisco.com/web/learning/le21/le34/nab/2011/index.html#~jewel
Win an iPad 2!
All you need to do is:
1. Follow @CiscoSP360 on Twitter
2. Tweet about Mobile World Congress with the hashtag #csoMWC
3. Have someone retweet your tweet
Enter the Back To Business Sweepstakes daily from NewEgg Business for your chance to win one of three awesome prizes. Grand prize winner receives a new CyberPower laptop with other prizes including a 50" Flat screen, wireless-N access point and PaypalHere card reader.
http://www.infinitesweeps.com/44833
Win an iPad 2!
All you need to do is:
1. Follow @CiscoSP360 on Twitter
2. Tweet about Mobile World Congress with the hashtag #csoMWC
3. Have someone retweet your tweet
Enter the Back To Business Sweepstakes daily from NewEgg Business for your chance to win one of three awesome prizes. Grand prize winner receives a new CyberPower laptop with other prizes including a 50" Flat screen, wireless-N access point and PaypalHere card reader.
http://www.infinitesweeps.com/44833
Cisco will be at OFC, the world’s premier optical event again showcasing our industry leading Packet Optical Convergence innovations and solutions. We encourage you to be part of the experience by visiting our Exposition booth (#3109) where you can interact with Cisco demonstrations, technical experts and Cisco Service Provider executives.
[Infographic] Cisco Visual Networking Index (VNI): Mobile-Connected Devices p...Cisco Service Provider
This Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast infographic provides some of the global and regional highlights from the updated study that covers forecast for 2014 to 2019.
For more information, please tweet us @CiscoVNI and follow our hashtag #VNI, and visit: http://cs.co/vnilpss.
[Infographic] Cisco Visual Networking Index (VNI): Mobile Users GrowthCisco Service Provider
This Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast infographic provides some of the global and regional highlights from the updated study that covers forecast for 2014 to 2019.
For more information, please tweet us @CiscoVNI and follow our hashtag #VNI, and visit: http://cs.co/vnilpss.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
Service creation is simpler and delivery is faster, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/entering-new-markets/index.html?KeyCode=000947734
What if the orchestrator could also automate the deployment and configuration of an accompanying service assurance solution, tailored to the specific services being delivered? This is now becoming a reality using a concept called Orchestrated Assurance.
Operator Drives Bandwidth Efficiency and Optimizes Satellite Link PerformanceCisco Service Provider
Providing network connectivity and services, such as data, voice, live TV, high- definition (HD) on-demand video, and mobile services, EMC caters to customers with operations in some of the most remote corners of the planet. Managing satellite bandwidth requires sophisticated monitoring tools to ensure consistent performance of voice, video and data during events, such as rain, that can affect the quality. This telecommunications leader prides itself on delivering carrier-class services through its global mobility platform, using its hybrid satellite and terrestrial broadband network.
The EMC network features fully meshed, Multiprotocol Label Switching (MPLS) enabled and interconnected teleports in the United States, Europe, South America, Africa, and Asia. With EMC’s proprietary tools, it can manage and optimize every megabyte delivered. Its customer-facing tools further maximize every bit delivered over each customer’s WAN and LAN.
Application Engineered Routing Segment Routing and the Cisco WAN Automation ...Cisco Service Provider
The Cisco® Application Engineered Routing solution provides end-to-end control over how the network infrastructure transports applications. In the past, dedicated clusters of servers would deliver specific applications, but the number and diversity of applications continue to increase as the infrastructure becomes more converged.
Traffic patterns are dynamically changing and new applications come with specific transport requirements. Combining Segment Routing (SR) with the Cisco WAN Automation Engine (WAE) provides the necessary intelligence to optimize network resources and make informed decisions dynamically, helping to ensure a consistent, high-quality customer experience.
This white paper describes SR and the Cisco WAE and highlights how they work together to deliver an intelligent, dynamic, highly optimized network.
Research Highlight: Independent Validation of Cisco Service Provider Virtuali...Cisco Service Provider
Service providers want to know how they can build and run programmable, intelligent, responsive, efficient, flexible, and highly secure yet open networks with a high degree of automation. They want to be able to configure and activate new services quickly, utilize emerging cloud capabilities, and meet customer needs. Nimble, smart innovators in the global communications and networking industry are working on the answers and coming up with solutions every day. But providers need to know if these next-generation technologies can already meet their requirements today
In the world of service providers and networks, the demand for new and better services continue to grow, while the networks must expand and quickly adapt to these demands. One way that operators are evolving their network is to adopt some of the latest technologies like NFV (network functions virtualization). Infonetics recently found that 35 percent of the worldwide telecom carriers they surveyed are planning to deploy NFV in 2015. They are doing this because they believe that NFV and its SDN (software-defined networking) architecture will deliver benefits in service agility and new revenue, operational efficiencies and capex savings. Finding new ways to build revenue paths out of the network is critical for operators today as they innovate to find new sources of revenues.
Operators have been looking to Policy to help them find new ways to find value in their network. Specifically, they need a policy platform which can help them quickly adapt to build new services and even new networks for other operators or enterprises. We are now announcing the availability of Cisco Policy Suite version 7.5 for download. With it, operators will benefit from NFV-based policy enforcement and new access selection technologies. These new capabilities are enabling service providers to not only use policy software to open new services and markets, but they are also providing policy to the handset to ensure the best access method for the end user.
Deploy New Technologies Quickly with Cisco Managed Services for Service Provi...Cisco Service Provider
Service providers’ businesses and operations are undergoing major changes. New initiatives, like IP convergence, cloud, software-defined networks and network virtualization, are driving new business models. These initiatives are also creating opportunities for new revenue streams and greater efficiencies. Speed, agility and flexibility are required for fast access to IT and new applications. Now is the time to invest effort and resources in figuring out how to make this opportunity work for you. You have a chance to disrupt rather than being disrupted.
Segment routing is a network technology focused on addressing the pain points of existing IP and Multiprotocol Label Switching (MPLS) networks in terms of simplicity, scale, and ease of operation. It’s a foundation for application engineered routing because it prepares the networks for new business models where applications can direct network behavior.
Segment routing seeks the right balance between distributed intelligence and centralized optimization and programming. It was built for the software-defined networking (SDN) era.
Segment routing enables enhanced packet forwarding behavior. It enables a network to transport unicast packets through a specific forwarding path, other than the normal shortest path that a packet usually takes. This capability benefits many use cases, and you can build those specific paths based on application requirements.
Segment routing uses the source routing paradigm. A node, usually a router but it can also be a switch, a trusted server, or a virtual forwarder running on a hypervisor, steers a packet through an ordered list of instructions, called segments. A segment can represent any instruction, topological or service-based. A segment can have a local semantic to a segment-routing node or global within a segment-routing network. Segment routing allows you to enforce a flow through any topological path and service chain while maintaining per-flow state only at the ingress node to the segment-routing network. To be aligned with modern IP networks, segment routing supports equal-cost multipath (ECMP) by design, and the forwarding within a segment-routing network uses all possible paths, when desired.
Cisco Virtual Managed Services: Transform Your Business with Cloud-based Inn...Cisco Service Provider
Service providers face big challenges along with tremendous opportunities. Maturing technologies such as software-defined networking (SDN), network function virtualization (NFV), cloud, and open-source software are enabling exciting business innovations and market disruptions. To keep up with the pace of change today, you need to rethink how to engage with your customers to meet their business needs. At Cisco, we have the right approach to harness the transformative power of the cloud, SDN, and NFV. The Cisco® Virtual Managed Services Solution portfolio provides a rich set of secure cloud-based network services with prepackaged software capabilities over any access technology. The Cisco Virtual Managed Services solution makes it easy for you to deploy, manage, and sell new premium cloud managed services while reducing current operating expenditures (OpEx) and accelerating time to revenue.
Imagine if you could deploy highly secure new services at web speed on demand to customers and partners - complete with personalized capabilities. With this environment you’re creating innovative new services in minutes, not months, accelerating your time-to-revenue while reducing operational costs on an open platform. You have pre-packaged software service solutions that help you transform your business and the businesses of your customers. And you’re letting your customers use their existing customer premises equipment (CPE), to connect to virtual services from the cloud, reducing capital costs and business risk associated with rolling out new services.
It’s all possible with the Cisco Virtual Managed Services Solution based on the combination of the complementary Cisco Evolved Programmable Network (EPN) and the Cisco Evolved Services Platform (ESP). This open infrastructure and software combined with industry leading service orchestration, software-defined networking (SDN), and network functions virtualization (NFV) technologies automate the delivery of business services tailored to your customers from the cloud.
Cisco cBR-8 Evolved CCAP: Deliver Scalable Network and Service Growth at a Lo...Cisco Service Provider
An explosion of new over-the-top (OTT) video services and consumer devices is placing huge demand on cable access networks. To compete for new customers and retain the loyalty of existing ones, multiple system operators (MSOs) will need to expand capacity substantially, rolling out new services and gigabit tiers.
As they strive to meet insatiable market demand and stay competitive, MSOs are looking at significant access network capital expenditures (CapEx) increases over the next 5 years - and steadily rising operating expenses (OpEx) due to higher power costs and a larger network footprint. But current integrated Cisco® Converged Cable Access Platform (CCAP) solutions are limited to supporting only 24 to 32 channels per service group, and they are not designed to support DOCSIS® 3.1 at scale. Using these platforms, MSOs would need to significantly increase CapEx spend in order to compete with gigabit billboard rates and keep pace with growth.
Alternatively, MSOs can use the Cisco cBR-8 Converged Broadband Router, a full-spectrum CCAP-compliant platform that is designed to support DOCSIS 3.1. The Cisco cBR-8 enables cable operators to offer multigigabit broadband and Internet of Everything (IoE) services, and provide a path to virtualization. It empowers MSOs to scale economically to deliver more capacity and best-in-class services with much lower total cost of ownership (TCO).
This white paper examines the consumer trends affecting cable access networks and the projections for how the network and services will evolve in the coming years. It provides a long-term economic analysis of an evolved access network using the Cisco cBR-8, compared with competitive Advanced Telecommunications Computing Architecture (ATCA) platforms. And it demonstrates how MSOs will be able to meet capacity and service demands over the next several years at a 40-percent savings in hardware, space, and power costs.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
Jewel Concert Sweepstakes Terms & Condition
1. Service Provider Jewel Concert Sweepstakes
Complete Official Rules
NO PURCHASE NECESSARY TO ENTER OR WIN. A Purchase will not increase your chances of winning.
Void where prohibited or restricted by law.
This Promotion (the "Promotion") opens on April 5, 2011 at 8:00AM Pacific Time and ends on April 13, 2011 at
2:00PM Pacific Time, or if earlier, until there are no more available prizes (the "Promotion Period"). Entry into this
Promotion is acceptance of these Official Rules. This Promotion is sponsored by Cisco Systems, Inc., 170 West
Tasman Drive, San Jose, CA 95134 USA ("Sponsor" or "Cisco").
1. ELIGIBILITY.
This Promotion is open to participants who are age 18 years or older at the time of entry, and who meet all of the
following eligibility criteria:
• Participant must retweet Jewel Concert-related tweets from @CiscoSPVideo account
This Promotion is not open to: (1) employees or internally contracted vendors of Sponsor or its parent/subsidiaries,
agents and affiliates; (2) the immediate family members or members of the same household of any such employee or
vendor; (3) anyone professionally involved in the development or administration of this Promotion; (4) employees
or internally contracted vendors of governments and government-affiliated companies or organizations; or (5) any
employee whose employer's guidelines or regulations do not allow entry in the Promotion or acceptance of the
prize(s). This Promotion is not open to individuals in the province of Quebec in Canada. In addition, residents of
Cuba, Iran, Syria, North Korea, Myanmar (formerly Burma) and Sudan are not eligible to participate. This
Promotion is void in these countries and where otherwise prohibited or restricted by law. Sponsor reserves the right
to limit, or restrict upon notice, participation in the Promotion to any person at any time for any reason in its sole
discretion.
2. HOW TO ENTER.
Retweet Jewel Concert-related tweets from the @CiscoSPVideo account to be entered into a random drawing. Only
one retweet per day during the Promotion Period will be qualified as an entry. Drawing restarts everyday.
Participants can win multiple prizes during the Promotion Period, but not multiple prizes on the same day.
Entries must be received during the Promotion Period. In the event of a dispute as to the identity of a winner, the
winner will be deemed to be the person Sponsor is not responsible for late, lost, delayed, damaged, misdirected,
incomplete, void, corrupted, garbled, illegible, and/or unintelligible entries, or for any problems, bugs or
malfunctions Participants may encounter when submitting their entry. Only complete valid entries will be accepted.
Sponsor will not verify receipt of entries. Participants must provide all information requested to be eligible to win.
Sponsor reserves the right to disqualify false entries or entries suspected of being false. Incomplete, unreadable, or
unintelligible entries, in the sole discretion of Sponsor, will be disqualified. All entries submitted become the sole
property of Sponsor and will not be acknowledged or returned.
3. PRIZES. Subject to the terms of these Official Rules, once confirmed by Sponsor, the winner will receive the
following:
Two Prize Winners per day during the Promotion Period will receive $25 iTunes gift cards.
Potential winners are not entitled to any surplus between actual retail value (ARV) of prize and stated ARV and any
difference between stated ARV and actual value of the prize will not be awarded. No substitution, assignment,
transfer, or cash redemption of prize, provided however that Sponsor reserves the right to substitute a prize with
another prize of equal or greater value should the advertised prize become unavailable for any reason. Prize may be
awarded in the form of voucher(s), coupon(s) and/or gift card(s) in Sponsor’s sole discretion. If a potential winner is
2. unable to participate in or accept the prize or any portion of the prize for any reason, Sponsor shall have no further
obligation to the Participant. Neither Sponsor nor any of its prize suppliers will replace any lost or stolen prizes,
cards or certificates. In no event will Sponsor be responsible for awarding more than the stated number of prizes.
4. SELECTION AND NOTIFICATION OF WINNER(S).
Each eligible participant will be entered into a drawing where the winner will be randomly selected by computer.
The drawing for two $25 iTunes gift cards will be held at the end of each day.
Winners will be announced on the @CiscoSPVideo Twitter account. Winners will also be notified by email and
Twitter within approximately seven (7) days of the applicable drawing. If the winners cannot be contacted or does
not reply to repeated Twitter messages and/or emails (up to 3), another winner will be selected from the eligible list.
The Sponsor’s decision will be final, and no binding correspondence will be entered into. Odds of winning will
depend on total number of eligible entries received by Sponsor.
Each potential winner may also be sent a declaration of eligibility / liability / publicity release ("Release"). Unless
restricted by law, potential winners receiving such a Release will be required to complete and return it within the
time period specified therein. The prize may be forfeited and, in such case, an alternate potential winner may be
randomly selected from among the remaining eligible entries if a potential winner: (i) cannot be reached; (ii) fails to
obtain all signatures on the Release and to return the documents in a timely manner as required pursuant to these
Official Rules; or (iii) cannot accept or receive the prize for any reason.
5. CONDITIONS. This Promotion is void where prohibited or restricted by law, and is subject to applicable
federal, state and local laws. This Promotion is subject to these Official Rules.
By participating, Participants agree: (i) to be bound by these Official Rules and the decisions of Sponsor, which
shall be final and binding; and (ii) to waive any right to claim ambiguity in the Promotion or these Official Rules,
except where prohibited by law. Taxes, if any, are the sole responsibility of the potential winner; and the potential
winner may be issued an IRS Form 1099 or other tax documentation for the ARV of any awarded prize. By
participating, all Participants agree to release and hold harmless Cisco and its Cisco’s directors, employees, officers,
licensees, licensors and agents, and respective advertising and promotion entities and any person or entity associated
with the production, judging, or administration of the Promotion (collectively, the "Released Parties"), from and
against any and all rights, claims and causes of action whatsoever that they may have, or which may arise, against
any of them for any liability for any matter, cause or thing whatsoever, including but not limited to any injury, loss,
damage, whether direct, compensatory, incidental or consequential, to person, including death and damage to
property, arising in whole or in part, directly or indirectly, from their acceptance, possession, use or misuse of a
prize in the Promotion, or their participation in the Promotion, or their participation in any Promotion or prize
related activity. Each potential winner acknowledges that the Released Parties have neither made, nor are in any
manner responsible or liable for, any warranty, representation or guarantee, expressed or implied, in fact or in law,
relative to any prize or the Promotion. Apart from manufacturer warranties (which may not be available in all
geographies), all warranties are hereby disclaimed; and each potential winner will accept the Prize "AS IS." No
support services are provided with any Prize.
None of the Released Parties are responsible for: (a) lost, late, misdirected, undeliverable, incomplete or
indecipherable entries due to system errors or failures, or faulty transmissions or other telecommunications
malfunctions and/or entries; (b) technical failures of any kinds; (c) failures of any of the equipment or programming
associated with or utilized in the Promotion; (d) unauthorized human and/or mechanical intervention in any part of
the submission process or the Promotion; or (e) technical or human error which may occur in the administration of
the Promotion or the processing of entries.
Sponsor reserves the right to disqualify any Participant it finds to be tampering with the entry process or the
operation of the Promotion or violating these Official Rules, and reserves the right to cancel the Promotion should it
suspect fraud or for reasons out of the control of Sponsor. Disputes regarding these Official Rules and/or this
Promotion will be governed by the internal laws of California. CAUTION: ANY ATTEMPT TO
DELIBERATELY DAMAGE OR UNDERMINE THE LEGITIMATE OPERATION OF THE PROMOTION
3. MAY BE IN VIOLATION OF CRIMINAL AND CIVIL LAWS AND WILL RESULT IN DISQUALIFICATION
FROM PARTICIPATION IN THE PROMOTION. SHOULD SUCH AN ATTEMPT BE MADE, SPONSOR
RESERVES THE RIGHT TO SEEK REMEDIES AND DAMAGES (INCLUDING ATTORNEY FEES) TO THE
FULLEST EXTENT OF THE LAW, INCLUDING CRIMINAL PROSECUTION.
All Participants are solely responsible for compliance with any applicable laws, rules and regulations, contractual
limitations and/or office or company policies, if any, regarding Participant's participation in trade promotions or
acceptance of promotional prizes; and by entering this Promotion, Participant confirms that he or she is not in
violation of any of the foregoing and has obtained the consent of his or her employer to participate, if applicable. If
a Participant is not permitted to accept any received prize, then the Participant may return such prize to Cisco; and
Cisco will refund the cost of shipment, as appropriate.
Subject to applicable law, Sponsor reserves the right in its sole discretion, to cancel, terminate, modify or suspend
this Promotion and these Official Rules, for any reason, at any time and without any liability.
6. PUBLICITY. Participant acknowledges and agrees that Sponsor may use the Promotion for publicity,
advertising or other marketing purposes in any media, and may use the name, likeness, and hometown name and/or
prize information of potential winners as part of that publicity, without additional compensation to the potential
winners.
7. PRIVACY. All personal information collected by Sponsor will be used for the administration of the Promotion
and in accordance with Sponsor's privacy policy. Any questions regarding privacy matters should be directed to the
address set out below. Please refer to Sponsor's privacy policy located at
http://cisco.com/web/siteassets/legal/privacy.html for important information regarding the collection, use and
disclosure of personal information by Sponsor.
8. OFFICIAL RULES AND WINNERS' LIST. For a copy of these Official Rules or the names of winners,
please send an email to csco_sp@external.cisco.com for receipt by October 13, 2011.
* * *