Cisco Blogs


Cisco Blog > Cisco Interaction Network

VOIP….meh….

I really do not why I don’t care much for Voice Over IP. It’s certainly technical. Heck man, if you’re stuck on QoS, go ask a voice geek. Resellers are begging for more voice engineers, so it’s a great career path. You can really do some very cool things with it that your end users just will love you for. Heck, if there’s a more visible direct impact to a business other than voice, I’d like to know what it is.

But still; when funding comes thru for a voice show I’m always thinking…”meh”… Which is funny because without a doubt our best and most award winning shows have been on voice! You’d think I’d love it right? Hey ya what? when was younger growing up in the hills of Tennessee (hereby referred to as God’s One True Love from henceforth) my first experience with hacking was on our telephone system with rapid hook switch tapping to become a tandem or punching thru busy signals was a real hoot. Of course the Capt’n introduced us to blue boxing and a splendid time was guaranteed for all…

Next week is a TechWiseTV taping week for us. Right now, this show has two things going against it; first off, it’s a voice show and second (and most important) it’s also an upgrade show. Yep folks, that’s right a push to get you to upgrade your CUCM.

Now look, we all have bills to pay so there always some level of butt kissing and boot licking that has to go on any show. Video is expensive. For me, I never ever ever promote ANYTHING on TechWiseTV that I would not be happy to stand by or even support in the future. I’m grateful TechWiseTV can do that. We turn down shows because we just do not believe it’s the best for the network.  Like my Grandmother taught me all those years ago…”If ya ain’t got nuthin’ nice to say, then shut the friggen crap up goober…” Ah she was quite the wordsmith for sure.

I don’t know about y’all, but I am not a big upgrade person at all. Upgrading sucks worst then a going camping with your mother in law on Indy 500 race weekend and forgetting the beer. From and engineering view point; why fix something that isn’t broke? Upgrading means my hardware is going to be slower (if it’s compatible), my licensing is going to be really messed up, tech support is going to be worthless, major downtime, oh yeah…and this is voice? Namely Cisco voice, wholly friggen shnikasourus rex man! You need a PhD in  CUCM licensing to figure that one out, plus my dial plan, migrating my DB…and you know what…that camping trip is looking better all the time now….

Robb and I designed this show to have the voice team prove us that we need to upgrade. To be honest, they better bring their “A” game. ‘Cause I ain’t buying it yet. TechWiseTV is unscripted and we do not see the content that our guests bring on the show beforehand. We like to keep it real and spontaneous. We just ask that slides have minimal words, no marketing or vision statement crap, any quote from any analysis puts you in Aldrich Ames status and removed from the set and have the slides in 16x9 format. 

I’m bringing all of these doubts onto the set on Tuesday morning to see if they can address them. It’s still early, so if there is something you want to make sure we cover, toss in your comments before 16Jul13 and we’ll cover ‘um…then tune it see…upgrade or not?? In the meantime, anyone got a tent I can borrow?

Jimmy Ray Purser

Trivia File Transfer Protocol

A pound of feathers weighs more than a pound of gold. This is because feathers are measured in avoirdupois weight which is 16 ounces per pound and gold is weighed in troy weight which is 12 ounces per pound.

  

Tags: , , , , , ,

Cisco Hacks: Notes from the CMX Hackathon

Editor’s Note: This is a guest post by two Wireless Networking Group interns, Nonie Grewal and Nivedita Jagdale, to capture their thoughts on the Connected Mobile Experiences Hackathon that they helped plan and execute.

June 29th marked the start of the Connected Mobile Experiences (CMX) Hackathon in the Cisco San Jose campus. CMX, powered by the Mobility Services Engine, provides a unique way of providing personalized real time location services over Wi-Fi. CMX aims to increase customer-oriented and operational efficiencies through analytics and personalized mobile services. The contestants at the hackathon were invited to help build prototypes that could help complement these goals, focusing on enhancing user connectivity and visibility.

cmxhack1

As summer college interns volunteering at the event, we walked into the Deep Space Nine room where the hackathon was held, to find clusters of intense developers at each table. With each passing minute, we felt the name “Deep Space” seemed apt for the cause it was hosting -- deep thought and real coding! Read More »

Tags: , , , , , , , , , , , , ,

Behind the Scenes at the Ciscolive! Network Operations Center

July 10, 2013 at 4:45 am PST

I have been privileged to be part of a very dedicated team of networking subject matter experts for the past 5 years in prepping and running the Ciscolive! event  network.  Before 2008 the network was installed and monitored by a commercial events networking company.  However, it became clear with the number of Technical Marketing Engineers, Services Engineers and product developers on-site for Ciscolive! that we were well equipped to take on the responsibility in addition to our speaking responsibilities.

Planning

The preparation for Ciscolive! starts many months before the event with weekly, collaborative Webex sessions to discuss design criteria, venue particulars and product/feature configurations.  Generally the teams align into core Route/Switch, Data Center, Security, Wireless, and Network Management/Operations, however we work collaboratively to design and implement the best show network possible.  We have individuals that are part of our Cisco Remote Management Services (RMS) team, Video Surveillance and partner support from our CenturyLink Internet Service Provider and NetApp storage vendor.

A small part of the NOC staff will travel to the venue to survey the wireless, power and Internet service capabilities several months beforehand.

Read More »

Tags: , , ,

Relationships, Relationships, Relationships: Cisco at Microsoft Worldwide Partner Conference

July 9, 2013 at 6:09 pm PST

When I think of why technology solution providers should attend Microsoft’s WPC, I decided to pay homage to one of Steve Ballmer’s mantras with my blog title.

Last year, at Microsoft’s WPC in Toronto, I was approached by KEMP Technologies (a Microsoft Gold Certified Partner). They gave me an elevator pitch on their products and explained they were interested in partnering with Cisco. Their load balancing solutions sounded interesting and anything that might sell more UCS servers sounded like a win win to me. After all, Cisco didn’t become the #2 blade server vendor worldwide1 by itself. I told them I would try and find the right contact for them.

A few emails on my part and a lot of hard work by the Cisco and KEMP teams, a year later KEMP is now IVT Certified for UCS. While not an exclusive relationship, we can now offer our customers another excellent choice.

Stop by the Cisco booth (#1401) and talk with the datacenter team or KEMP’s booth (#1725). You never know what might come of it.

Kemp_Banner

1. Source:  IDC Worldwide Quarterly Server Tracker, Q1 2013 Revenue Share, May 2013

Tags: , , , , , , , , , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

July 9, 2013 at 4:16 pm PST

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,