For the 10,000 users on our ACE service introduction network, the new WebEx-enabled TelePresence Meeting capabilities mean everyone gets to enjoy seamless two-way video, audio, and data sharing between Cisco TelePresence and Cisco WebEx Conferencing. Users no longer have to ask, “Do I have my meetings via TelePresence or WebEx?”
The host easily schedules the WebEx-enabled TelePresence meeting using the WebEx Productivity Tool in Outlook or the Smart Scheduler Web Portal. The TelePresence video bridge information will be populated automatically, eliminating the need to manage separate invitations for WebEx and TelePresence users – it is all one click away.
Cisco employees are moving towards a mobile collaborative office environment – within the workplace. We sit where we like and log into the nearest phone, using extension mobility. But when we traveled to different Cisco offices around the world, we couldn’t log in to the Cisco IP phone: extension mobility only worked at certain limited locations within our home region.
Now, employee phones can essentially follow them to any Cisco office worldwide because Cisco IT deployed the Extension Mobility Cross Cluster (EMCC) feature on Cisco Unified Communications Manager (Cisco UCM).
Saturday morning wasn’t complete for me as a kid if it didn’t include a bowl of pre-sweetened cereal and time watching cartoons. Challenge of the Super Friends was my favorite, thanks to its unforgettable opening sequence and the chance to see Superman, Batman and other heroes overcome the latest scheme by the Legion of Doom to take over the world.
One of the Legion’s intriguing villains was Bizarro – the imperfect duplicate of Superman with the blocky white face and backwards S on his chest. Although the writers didn’t give poor Bizarro much personality beyond bad grammar – “Me have plan destroy Super Friends!” – my friends and I enjoyed debating how his backwards, bad-means-good perspective would express itself in everyday activities. Read More »
John Stewart, Cisco Senior Vice President and Chief Security Officer, explains how Cyber Security is at the forefront of today’s “hacktivism” campaign and becoming a popular topic not only to security professionals, but CEO’s as well. John highlights the importance of “in-memory” threats and how data is no longer on software or disk while being extremely difficult to track. The evolution of Cisco IT’s BYOD strategy is of major importance when placing security throughout a multiplicity of different devices. This new initiative is something to be optimistic about while being able to get on top of the threats in today’s “Internet of Everything.”
Despite how thoroughly it has been embraced, though, it’s not without flaws. In my opinion, they mostly stem from the fact that PUE is more complicated than it looks. Although calculating the metric is a relatively straightforward exercise, the resulting score doesn’t tell you anything about the factors that influenced it. Hence why it’s a bad idea to compare PUE among Data Centers.