Cisco Blogs


Cisco Blog > Video

Bringing Powerful TelePresence to Any Room or Space

January 20, 2012 at 12:16 pm PST

On the heels of the fifth anniversary of Cisco TelePresence, we recently released our latest telepresence solution, which speaks directly to Cisco’s goal to bring the “Power of In-Person” to everyone, everywhere. The Cisco TelePresence SX20 Quick Set is a follow-on product to the popular Quick Set C20.  With the SX20 Quick Set, we’ve taken flexibility and performance up a notch while preserving the affordable price points to ensure customers of all sizes can benefit from the power of telepresence.

Read More »

Tags: , , , , ,

Cisco Common Crypto Hybrid Module (C3M-hybrid) is FIPS certified!

January 20, 2012 at 12:11 pm PST

The Global Certification team is pleased to announce the Cisco Common Crypto Hybrid Module, C3M-hybrid, has been awarded FIPS validation #1668 and is complete!  The C3M-hybrid module leverages AES-NI (C3M, #1643, completed in 2011). This is the first crypto module that leverages AES-NI.

http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1668

The Cisco Common Cryptographic Module (C3M) is a software library that that can be utilized by many Cisco products. The module provides FIPS validated cryptographic algorithms, including advanced (Suite B) cryptography requested by USG, for services such as sRTP, SSH, TLS, 802.1x etc. Once the FIPS validated C3M is integrated into our products, GCT can engage the FIPS lab to write letters of compliance. In the future, leveraging this FIPS validation while performing HW validation will reduce cost, time and effort.

FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated.

Tags: , , , , , , ,

Cisco Live London, 2012: Attend virtually Jan 31 – Feb 1

January 20, 2012 at 10:00 am PST

Join us on January 31 and February 1 in Cisco Virtual for Cisco Live London, 2012. We have a full agenda planned, including a live keynote with Padmasree Warrior and technical sessions on popular topics like UCS System Architecture, SAN Core Edge Design, BGP PIC, and Cisco Telepresence. You can also play games and win prizes.

Registrants receive two full days of live virtual programming in conjunction with Cisco Live London, access to over 1600 sessions, a virtual World of Solutions, and the chance to network with professionals and Cisco experts from more than 195 countries. Or, visit Cisco Live Virtual post-event to download PDFs and view videos from sessions presented at Cisco Live London.

The virtual event features:

  • Live Keynote addresses by CTO and SVP of Engineering, Padmasree Warrior.
  • A Guest keynote with Cisco’s Chief Futurist, Dave Evans and Richard Noble from Bloodhound.
  • Technical sessions on data center, storage area networks, IP Multicast and enterprise video, security and other hot topics
  • A Partner Resource Center with the chance to download valuable materials
  • Answers to your toughest technical questions from virtual Ask-the-Expert Center sessions
  • Networking with your friends, colleagues and new acquaintances with profile tools and social media such as Facebook, Twitter, LinkedIn and blogs
  • A Memory Match game where you can compete to win €100 Cisco Marketplace coupons

Be sure to follow Cisco Live Europe on Twitter https://twitter.com/#!/CiscoLiveEurope

Date: January 31 and February 1, 2012
Register for free: http://www.ciscolivevirtualeu.com
Agenda and Calendar Reminder: http://bit.ly/xP7zjK

Tags: , , , , , , , , , ,

Flipping the Classroom – Is it Really all About Technology?

January 20, 2012 at 9:22 am PST

Los Gatos High School, located in Los Gatos, California, recently switched to block scheduling, effectively decreasing the number of school days by 15 a year.  For science teacher, Steve Hammack, what began as a way to provide students with the lecture content they would necessarily need to pass his courses in the face of a decreased number of school days, has ended up as a new model for students to learn massive amounts of information for his AP Biology and Physics classes.  For a technology fan who spends her days at Cisco Systems focused on educators who are using technology to improve learning outcomes, I was intrigued.

I quickly became aware of Mr. Hammack’s approach when I walked into my teenage son’s bedraggled bedroom and heard a familiar voice emanating from the direction of his PC.  It sounded like someone I’d met at back-to-school night.  My son, Joe, a senior at Los Gatos, was reclined in his chair, feet up on his bed, notebook on his lap, busily listening to the voice and taking copious notes.  As I entered his room, Joe clicked a pause button and asked, “What’s up?”  “What’s up with you?  What are you doing?”  He pointed to his screen and said, “Listening to my biology lecture for Mr. Hammack’s class.  We do this every night, then we have a quiz or test every day when we come into class.” Interested, I said, “Tell me more.  Do you like it?”

Read More »

Tags: , , ,

Mythbusters: All Data Encryption is the Same, Right?

Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security

Although most wireless LAN (WLAN) equipment comes with many settings preconfigured, encryption isn’t one of them. In this latest installment of Mythbusters, we explain why the encryption protocol you choose—Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)—makes a difference.

Read More »

Tags: , , , ,