Cisco Blogs


Cisco Blog > Perspectives

Importing contacts from WebEx Connect to IM & Presence

Currently, WebEx Connect has no method of exporting contacts into Jabber or IM & Presence. I came up with this solution to help a couple of my users migrate their large contact lists, and thought I would share the solution with you. Let me know what you think.

This method relies on the use of a perl script and having the user log into pidgin XMPP client to WebEx Connect to populate the pidgin blist.xml file with the WebEx Connect contacts. Read More »

Tags: , , ,

New Webcast: Citrix XenDesktop 7.1 with FlexPod Data Center – Cisco Validated Design

If you weren’t already aware, FlexPod is a huge success with desktop virtualization implementers.  This integrated infrastructure solution offers the scalability, performance and convenient infrastructure modularization that many look for when deploying virtual desktops.

Citrix XenDesktop with FlexPod Datacenter InfographicIt should be no surprise therefore that we’re doing a lot of design optimization, testing and validation work based on FlexPod, especially in support of XenDesktop environments.  Case in point: our latest FlexPod Cisco Validated Design (CVD) focused on 2,000 seat mixed workload.

This configuration speaks closely to very typical environments our customers are implementing, involving a mixed delivery model approach leveraging both traditional VDI (Hosted Virtual Desktops / HVD) along with Hosted Shared Desktops based on XenApp.

What’s exciting is the notable density and performance gains we’ve seen as this solution has evolved:

  • We’re now realizing a 25% increase in per blade desktop density (compared with previous generation processors)
  • An overall greatly compacted footprint resulting in 2,000 users served out of 32RU
  • The system is completely virtualized within ESXi 5.1: This includes Active Directory, Provisioning Servers, SQL Servers, XenDesktop Delivery Controllers,
    and XenDesktop RDS (XenApp) servers, all hosted as virtual machines

And maybe the biggest headline coming out of this effort: the boot-up and login performance:

  • The 2000-user mixed hosted virtual desktop and hosted shared desktop environment booted and registered with the XenDesktop 7.1 Delivery Controllers in under 15 minutes

I highly encourage you to check out Frank Anderson’s blog hereHe does an excellent job walking through the solution architecture, CVD methodology and key findings. You can also check out some great perspective from NetApp’s Rob McDonald, and Citrix’s Malathi Malla on the new CVD.

Want to hear first-hand how we put this solution together, and gain more insight into how it’s raised the performance bar?  Don’t miss our webcast with featured presenters from Citrix, Cisco and NetApp. Our panel of experts including Mike Brennan (Cisco), Marcelo Brosig (Citrix) andPanel of experts Cedric Courteix (NetApp) will guide you through our latest CVD, and you’ll have a great opportunity to engage them with questions pertaining to your VDI project.

Join us for our Webcast: Cisco Validated Design: Citrix XenDesktop with FlexPod Data Center

For more info, including the CVD, featured case study, and solution brief, see below:

Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present; however, it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Since mobility solutions offer users the ability to use devices on a range of networks and in a wide array of places, threats may come in unsuspected ways, or be inadvertently introduced into your enterprises network. For example, one recent study reveals that 80 percent of corporate security professionals and IT leaders recognize that “end user carelessness” constitutes the biggest security threat to an organization.

In addition, information from the Cisco 2014 Annual Security Report sheds light on the persistent security attacks that enterprises face. From hackers to malicious malware, it’s clear that security threats arise from unsuspecting places.

Given this knowledge, business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward. In this post I’ll discuss the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Read More »

Tags: , , , , , , , , , , , , ,

Tech Trends That Will Change How People Conduct Business in 2014

March 13, 2014 at 12:58 pm PST

As technology evolves, people who conduct business continue trying to keep up, implementing it in all facets of their industry to improve and increase efficiency. Whether these technologies have been around for some time and developed, or they were recently introduced and applied, there’s no doubt they’re revolutionizing commerce.

With that said, here are six tech trends that’ll change how people conduct business in 2014.  Read More »

Tags: ,

From the Mine Shaft to the Store Shelf — an IoE Revolution in Manufacturing

Since Henry Ford, the alchemy of turning raw materials into mass-produced products has been complicated and challenging. At best, it has been a delicate and precarious balancing act; at worst, something akin to herding cats.

The trick has always been to align ever-shifting patterns of customer demand with far-flung ecosystems of miners, designers, suppliers, engineers, factory workers, truck drivers, sellers, and so forth. Yet the process of orchestrating such intricate value chains has often been based on art (hunches) more than science (data).

Today, however, the Internet of Everything (IoE) — the ongoing explosion in networked connectivity among people, process, data, and things — is transforming manufacturing in startling ways, just as it is changing so many other industries.

IoE delivers seamless, intelligent connections to every corner of the manufacturing value chain, optimizing the flow of products, information, and payments in real time.

The Cisco IoE Value Index study found that in 2013, manufacturing had the largest potential share of IoE Value at Stake, at $224 billion. Yet, it was poised to realize only 46 percent of that potential bottom-line value.  The key to closing that gap lies in much-improved machine-to-machine and machine-to-people connections, resulting in smart factories, smart grids, and connected supply chains, among many other IoE-related innovations.

Read More »

Tags: , , , , , , , , , , , ,