Applications For Cisco’s Fall 2014 Entrepreneurs In Residence Program Now Open

Applications For Cisco’s Fall 2014 Entrepreneurs In Residence Program Now Open

Applications For Cisco’s Fall 2014 Entrepreneurs In Residence Program Now OpenCisco_logo

SAN FRANCISCO, CA–(Marketwired – Jun 23, 2014) – Following Cisco’s inaugural Entrepreneurs in Residence Cohort in March 2014, Cisco (NASDAQ: CSCO) is announcing that applications for the fall 2014 class are now open. As an innovation program Cisco® Entrepreneurs in Residence (EIR) supports early-stage entrepreneurs working on the next big ideas for the Internet of Everything, cloud computing, Big Data, analytics and other strategic areas for Cisco. Cisco Entrepreneurs in Residence is one of the innovation catalyst programs within Cisco that focuses on breakthrough innovation to help grow early-stage companies.

Who: Cisco is looking for 5 to 10 early-stage startups at their seed or Series A funding stage working on the next big ideas for the Internet of Everything, cloud computing, Big Data, analytics and other transformational technologies.

When:

Accepted companies are expected to enroll by October 2014.

Where:

Cisco headquarters in San Jose, California.

Each cohort spends six months in residence with Cisco, and startups are selected through a rigorous multi-phase selection process that evaluates the viability of their business plans, the strength of their teams and their alignment with Cisco’s strategic focus. The Entrepreneurs in Residence program offers financial support, access to a co-working space, basic software tools, and a potential opportunity to collaborate with Cisco product or engineering teams. The Entrepreneurs in Residence program works closely with Cisco Investments (Cisco’s venture capital arm) to explore equity investments when appropriate for the selected cohort companies.
Cisco Entrepreneurs in Residence launched its first cohort of entrepreneurs in March 2014.

Five startups are currently in residence and collaborating with Cisco. They are: Crowdx, Inc. , DGLogik, Inc., Pawaa, Inc., PetaSecure, Inc. and SecureWaters, Inc.. More information about the startups can be found at https://eir.cisco.com/entrepreneurs.html.

For more information, visit https://eir.cisco.com and the EIR blog post. For questions, email us at eir-program@cisco.com.

About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Source: Cisco

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…