Cisco Blogs


Cisco Blog > Perspectives

#CiscoChampion Radio S2|Ep 7. Creating videos & podcasts as IT professionals

CiscoChampion2015200PX#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking about creating videos and podcasts as IT professionals

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco Champion SMEs
John Welsh, (@samplefive), Unified Communications Engineer
Ryan Adzima, @radzima, Wireless Network Engineer
Josh Kittle, @ciscovoicedude, Unified Communications Engineer
Nick Howell, @that1guynick, Virtualization Solutions Architect

Moderator
Rachel Bakker, @RBakker Read More »

Tags: ,

The We’re Listening Blog Series: It’s Easier than Ever to Select SW Images on Cisco.com

We’ve heard you say that choosing the right software releases on Cisco.com is too complex. It’s too difficult to narrow down your options and know whether you’re really getting the software that meets your needs.

Now imagine that you have a “configuration cheat sheet” for all Cisco software updates that tells you exactly which release will best suit your memory, reliability and system resource needs. Would that simplify your experience?

This is exactly how the SW Research Tool on Cisco.com works. Using the tool, you enter your requirements for hardware and software features, and access and download the right Cisco software that meets your needs immediately, all in one place, with a few simple clicks.

SW_research_tool

The tool has been live on Cisco.com since September 2013. Today, you can access release suggestions for 47 product groups (including high-end routers and switches and our newer products) via the SW Research Tool. The same suggestions are also available from the SW Download site, so you can continue to use the download venue of your choice. The current statistics show that 65 percent of all downloads via Cisco.com are for Cisco “Suggested” software versions. Our back-end metrics show both an increasing adoption rate and an improved quality experience for those versions.

SW_download_site

Here’s what people are saying about their recent experiences…

“I often get software version recommendation questions from customers. This tool cut down the time this task took tremendously. The feedback has been very positive.” – Cisco Systems Engineering Manager, Americas

“Early adopter reviews help us a lot before we push out new code.” – Cisco Partner

“After reviewing the Software Research application I’m very impressed with the features offered.  No doubt that when the product list grows more complete we’ll be using the tool regularly.” - Cisco Customer

Watch a brief video on the SW Research Tool for more information, or read our quick tips guide.

Have you used the SW Research Tool? Tell us what you think, and help us fine-tune the process for an even better experience doing business with Cisco.

Tags: , , , ,

Software Defined Contact Center

If you are a technology professional, then chances are that you are aware (maybe to the point of annoyance) that everything is getting defined in software these days. We have Software-Defined Networking (SDN), Software-Defined Data Center (SDDC), Software-Defined Storage (SDS), and the list goes on and on. Software defining anything has become such a powerful trend that we now have a generally accepted name and acronym for just that: “Software-Defined Anything” or SDx for short.

Despite the widespread nature of the trend, Software-Defined Contact Center (SDCC) is nowhere to be found amongst the Software-Defined goodness that floods our social media feeds on a daily basis. Software-Defined Contact Center is so absent from the online world that if you search Google for the term you get only articles that reference Software-Defined Data Center, seemly because 3 out of the 4 words are common to both. If you search for the #SDCC hash tag on Twitter you will find yourself at the official account of the San Diego Comic Con. This raises the question, why isn’t SDCC “a thing?” This question is particularly relevant since Cisco’s Intelligent Contact Management (ICM) has been allowing us to build Software-Defined Contact Centers since the late 1990s. Let’s take a look at how ICM delivers on the Software-Defined paradigm for Contact Centers. Read More »

Tags: , , , , , ,

#CiscoChampion Radio S2|Ep 6. Cisco Annual Security Report (ASR)

CiscoChampion2015200PX#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking with Cisco Principal Engineer Jason Brvenik about the Cisco Annual Security Report (ASR). Our Cisco Champion guest host is Korey Rebello and our moderator is Cisco’s Brian Remmel.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco SME
Jason Brvenik, @vrybdpkt, Cisco Principal Engineer

Cisco Champion Guest Host
Korey Rebello, @koreyrebello, Principal Network Engineer

Moderator
Brian Remmel, @Bremmel Read More »

Tags: , ,

IoT, The Oppressed Project

IoT, The Oppressed Project

We are now in the era of IoT “Internet of Things”. It’s a concept that not only has the potential to impact how we live but also how we work. And as things become more connected, people become more concerned about their security and privacy. I have gone through a lot of technical conversation about IoT and realized how paranoid people are about their connected devices and appliances.

Why paranoid?

The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart objects or networks such as Wireless Sensor Networks (WSNs). By 2020 there will be over 26 Billion connected devices and some estimate this number to be more than 100 Billion connected devices. This includes mobile phones, Smart TVs, washing machines, wearable devices, Microwave, Fridges, headphones, door locks, garage door openers, scales, home alarms, hubs for multiple devices, remote power outlets and almost anything else you can think of like your car and airplane jet engines.

Ways of securing the traditional Internet networks have been established and tested. The IoT is a hybrid network of the Internet and resource-constrained networks, and it is, therefore, reasonable to explore the options of using security mechanisms standardized for the Internet in the IoT.

What will we do about managing the usernames and passwords of every single connected device? What about our privacy? What if some hacker was able to control our video cameras? More and more questions are being asked and more security concerns are being escalated. Do we really have to be paranoid about IoT? Read More »

Tags: , , , ,