In today’s economic climate, a value-conscious shopper may look to wholesalers such as Costco to stock up on household goods. I frequently find myself at Costco versus specialty stores, because I know I can get the same high-quality olive oil at a fraction of the price.
And when you switch out the olive oil for network solutions, the concept remains the same.
Earlier this week, I shared a blog post about Nexus IS’ experience with wholesaler Neutral Tandem’sCisco Hosted Collaboration Solution (HCS) proof-of-concept trial. We got to hear the VAR’s side of the story, but I knew you’d want to know more. So I checked in with Ian Neale, Neutral Tandem’s VP of Product Marketing, and asked him to give me an insider’s look at his company’s wholesale model.
What I really wanted to find out was what our partners could expect when working with them, and, more important, how they can help partners increase their revenue opportunities. Want to know what I learned? Read More »
Yes Geek Dads are Connected and Cool! We conducted a survey and found a lot of interesting things about this generation of Geek Dads. Kids say their geek dad is cooler than other dads and they have a lot fun learning about technology from their dad. Check out the confessions of a Geek Dad: Read More »
Reduce the risk of compromised company data by securing users’ smartphones
Once upon a time, a mobile phone was just a phone—you made and received calls on it, and that’s all. It posed zero risk to the security of your network or your business. Now, a mobile phone is so much more than just a phone. It’s a personal assistant, a portable game player, a digital camera, and most importantly, a full-fledged computer—and these smartphones definitely pose a security risk. Just like a laptop, smartphones, tablets, and other mobile devices can connect to your network, which means they could compromise your company’s data or leave your network vulnerable to attack from a hacker. You wouldn’t leave employees’ laptops unsecured, so why would you take chances with their mobile devices?
For the most part, the same security measures you ascribe to the computers on your network in the office should also be applied to mobile devices that have access to your LAN. Just like desktop PCs and laptops, all mobile devices need software protection to guard against malware and other attacks. Smartphones and tablets should have a firewall as well as antispam and antivirus software installed, such as the Cisco AnyConnect Secure Mobility Solution and Norton Smartphone Security offering.
So in the demo we see a Wind turbine going out of specification. The demo shows live dynamic telemetry data. Steve Matthews resets the data to cause a malfunction and cause an alert. You see the data change – the top right bar goes from green to yellow, basically a temperature alert. An SMS message is transmitted and, in this case, a telephone rings alerting the Control Room staff. Read More »
Today I had the pleasure of talking with Steve Matthews about Cisco’s Industrial Workforce Enablement demo. Steve is a Cisco consulting engineer with expertise in Borderless Networks; he is based in Manchester, UK.
In this video Steve is telling me about the demo that features real time data analysis and Cisco UC and networking technologies that enable real-time events to be captured and/or acted upon. We are using the application software to capture real time data from, in this case, a wind farm, and that data is both analyzed and stored and alerts are sent.
The demonstration shows the integration between OSISoft (one of Cisco’s Partners in the industrial telemetry and asset management field) integrated with Cisco cross-architectures: so we have Borderless networks, Data Center and Collaboration technologies. We also have an application called CEBT – which is a workforce enablement application. Read More »