As discussed in one of my previous blogs, more and more companies are deploying premium quality video endpoints in hot desking areas or quiet rooms. Hot desking means I can be at any desk within any location of my organization and make and receive calls using my own personal number and identity. By adding this capability to our video endpoints, Cisco is further supporting the concept that video is becoming the new voice and our customers can now enjoy feature parity between our video endpoints and Cisco Unified Communications IP telephones.
This signature feature is available in the latest software release for EX, MX, SX and C-series Cisco TelePresence Endpoints with TelePresenence Touch. Now you can sign in with your user name and pin to make a Cisco Telepresence endpoint “yours” for the desired period of time.
I strongly believe that user satisfaction and productivity increases by Read More »
We all know we need it, but no one wants to talk about. Today, we break through that taboo. Secure the Infrastructure! This bold declaration brought to you courtesy of Matthew Brender (@mjbrender) and Mike Foley (@mikefoley) as they talk about how to use a hardening guide, and how to execute security in the real world. This is a great discussion about people, policy, and how not to be “the person who puts ‘no’ in innovation.”
Roll the video:
And it wouldn’t be Engineers Unplugged without a unicorn, in this case a security unicorn. Please do not try this at home.
Matthew Brender and Mike Foley with a secure unicorn, complete with ninja star and high kicks. We all feel more secure now.
What are you seeing in the industry? Agree or disagree, post a comment, send a tweet, follow along using one of the methods below!
Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
Episodes will publish weekly (or as close to it as we can manage)
In today’s world of the Internet of Everything (IoE), we are changing the expectations of customer experiences. Through wearable technology, wireless location-based services and even video analytics, companies can customize every interaction with the information provided to the customer.
We aren’t just talking about tangible products. Think about a concert venue where thousands of people come together for their favorite music artist. Read More »
The HIPAA Omnibus Final Rule is now in effect and audits will continue in 2014. The Department of Health and Human Services’ Office for Civil Rights has stated several times that both Covered Entities and Business Associates will be audited. And the scope of Business Associates has greatly expanded. I wrote another blog directed towards these new Business Associates. This final blog of this series focuses on covered entities that work with business associates.
The HIPAA Omnibus Final Rule changed the Business Associate definition, and also makes Business Associates obligated to comply with HIPAA. You most likely will have more business associates than previously, and those business associates that have access to your network and/or your PHI data are obligated to be HIPAA compliant. The Ponemon Institute’s Third Annual Benchmark Study on Patient Privacy and Data Security (December 2012), reveals that 42% of the breaches involved a third party “snafu”.
Last week, we looked at the question “How close to the phones does the CUCM cluster have to be?” There was no easy or set answer to this question, but we acknowledged right at the start that minimizing the number of clusters is probably a good idea. So why, then, does Cisco IT have so many clusters?