Cisco Blogs

Cisco Blog > TechWiseTV


I really do not why I don’t care much for Voice Over IP. It’s certainly technical. Heck man, if you’re stuck on QoS, go ask a voice geek. Resellers are begging for more voice engineers, so it’s a great career path. You can really do some very cool things with it that your end users just will love you for. Heck, if there’s a more visible direct impact to a business other than voice, I’d like to know what it is.

But still; when funding comes thru for a voice show I’m always thinking…”meh”… Which is funny because without a doubt our best and most award winning shows have been on voice! You’d think I’d love it right? Hey ya what? when was younger growing up in the hills of Tennessee (hereby referred to as God’s One True Love from henceforth) my first experience with hacking was on our telephone system with rapid hook switch tapping to become a tandem or punching thru busy signals was a real hoot. Of course the Capt’n introduced us to blue boxing and a splendid time was guaranteed for all…

Next week is a TechWiseTV taping week for us. Right now, this show has two things going against it; first off, it’s a voice show and second (and most important) it’s also an upgrade show. Yep folks, that’s right a push to get you to upgrade your CUCM.

Now look, we all have bills to pay so there always some level of butt kissing and boot licking that has to go on any show. Video is expensive. For me, I never ever ever promote ANYTHING on TechWiseTV that I would not be happy to stand by or even support in the future. I’m grateful TechWiseTV can do that. We turn down shows because we just do not believe it’s the best for the network.  Like my Grandmother taught me all those years ago…”If ya ain’t got nuthin’ nice to say, then shut the friggen crap up goober…” Ah she was quite the wordsmith for sure.

I don’t know about y’all, but I am not a big upgrade person at all. Upgrading sucks worst then a going camping with your mother in law on Indy 500 race weekend and forgetting the beer. From and engineering view point; why fix something that isn’t broke? Upgrading means my hardware is going to be slower (if it’s compatible), my licensing is going to be really messed up, tech support is going to be worthless, major downtime, oh yeah…and this is voice? Namely Cisco voice, wholly friggen shnikasourus rex man! You need a PhD in  CUCM licensing to figure that one out, plus my dial plan, migrating my DB…and you know what…that camping trip is looking better all the time now….

Robb and I designed this show to have the voice team prove us that we need to upgrade. To be honest, they better bring their “A” game. ‘Cause I ain’t buying it yet. TechWiseTV is unscripted and we do not see the content that our guests bring on the show beforehand. We like to keep it real and spontaneous. We just ask that slides have minimal words, no marketing or vision statement crap, any quote from any analysis puts you in Aldrich Ames status and removed from the set and have the slides in 16×9 format. 

I’m bringing all of these doubts onto the set on Tuesday morning to see if they can address them. It’s still early, so if there is something you want to make sure we cover, toss in your comments before 16Jul13 and we’ll cover ‘um…then tune it see…upgrade or not?? In the meantime, anyone got a tent I can borrow?

Jimmy Ray Purser

Trivia File Transfer Protocol

A pound of feathers weighs more than a pound of gold. This is because feathers are measured in avoirdupois weight which is 16 ounces per pound and gold is weighed in troy weight which is 12 ounces per pound.


Tags: , , , , , ,

Cisco Hacks: Notes from the CMX Hackathon

Editor’s Note: This is a guest post by two Wireless Networking Group interns, Nonie Grewal and Nivedita Jagdale, to capture their thoughts on the Connected Mobile Experiences Hackathon that they helped plan and execute.

June 29th marked the start of the Connected Mobile Experiences (CMX) Hackathon in the Cisco San Jose campus. CMX, powered by the Mobility Services Engine, provides a unique way of providing personalized real time location services over Wi-Fi. CMX aims to increase customer-oriented and operational efficiencies through analytics and personalized mobile services. The contestants at the hackathon were invited to help build prototypes that could help complement these goals, focusing on enhancing user connectivity and visibility.


As summer college interns volunteering at the event, we walked into the Deep Space Nine room where the hackathon was held, to find clusters of intense developers at each table. With each passing minute, we felt the name “Deep Space” seemed apt for the cause it was hosting – deep thought and real coding! Read More »

Tags: , , , , , , , , , , , , ,

Relationships, Relationships, Relationships: Cisco at Microsoft Worldwide Partner Conference

When I think of why technology solution providers should attend Microsoft’s WPC, I decided to pay homage to one of Steve Ballmer’s mantras with my blog title.

Last year, at Microsoft’s WPC in Toronto, I was approached by KEMP Technologies (a Microsoft Gold Certified Partner). They gave me an elevator pitch on their products and explained they were interested in partnering with Cisco. Their load balancing solutions sounded interesting and anything that might sell more UCS servers sounded like a win win to me. After all, Cisco didn’t become the #2 blade server vendor worldwide1 by itself. I told them I would try and find the right contact for them.

A few emails on my part and a lot of hard work by the Cisco and KEMP teams, a year later KEMP is now IVT Certified for UCS. While not an exclusive relationship, we can now offer our customers another excellent choice.

Stop by the Cisco booth (#1401) and talk with the datacenter team or KEMP’s booth (#1725). You never know what might come of it.


1. Source:  IDC Worldwide Quarterly Server Tracker, Q1 2013 Revenue Share, May 2013

Tags: , , , , , , , , , , , ,

Three Imperatives for Today’s CISO for Data Center Security : Why you should attend our upcoming Webcast on July 16

AJ25293The data center landscape is undergoing remarkable transformation and security is being forced to evolve as organizations embrace more dynamic services.
For instance, Gartner predicts 17.9% CAGR in cloud services usage through 2016. As such, Chief Information Security Officers (CISOs) will need to consider how to secure non-standardized Business-to-Business interconnects across their organizations. CISOS will play a pivotal role in shaping the next-generation data center if they are able to act more strategically.
I call this my 3 imperatives for CISOs.

I am teaming up with my former mentor from McAfee and now colleague through our Cisco partnership, Rich Noguera, Sr Manager, Security Strategy and Risk Management at Accenture, to discuss this topic on July 16- 8:00 am PST/ 11:00 am EST

1.     Enabling IT security to play a more strategic and advisory role within the organization – today’s CISO needs to think much more in terms of establishing a risk-aware culture as increasingly the economic advantages of moving to the cloud becomes much more compelling.  Strategically speaking, CISOs must consider building or buying a cloud services brokerage that is capable of enforcing corporate security policies across the business’ varied providers.  There is an opportunity to shift IT away from being considered a necessary cost center to a department, which can enable self-provisioning of new services (with the right tools and training). But to do this, it requires a forward thinking organization with a security steering committee with stakeholders from across the enterprise engaged to ensure that security and risk considerations are factored in.

2.     Business-driven security and risk metrics  – It is a well-known phenomenon that when nothing negative in data center security happens (for example, malware disruption, data breach), it may become challenging to demonstrate the ROI on security even though security met its purpose.  Leading organizations are twice as likely to use metrics to monitor progress and their ability to deal with future technologies as well as metrics to justify the purchase and need of new technologies.  As the old adage goes, ‘you cannot manage what you cannot measure.’ Given the range of cloud enabled B2B services, CISOs should concentrate on what matters most – who (i.e. users) and what (i.e. crown jewel data) – to the security of the business.

3.     Balancing key technology focus areas with risk metrics – As data center workloads spiral and so too, correspondingly does the volume of security data, CISOs and security teams will need to find ways to filter data to a meaningful metrics.  That is where expressing security policy in business contextual terms and security intelligence data and filtering becomes critical.

Register here for this webcast on July the 16th to further discuss these key issues and see how datacenter can enable security to be transformative. Additionally, for more news and discussions, head over to @SecDatacenter or Secure Data Center Trends

Tags: , , ,

Creating a Wi-Fi Monetization Virtuous Circle

In the decade or so that Wi-Fi has existed, most technologists and mobile industry executives viewed it as the “poor cousin” to licensed mobile communications.  Now mobile operators around the world are asking how they can effectively use Wi-Fi to help them cope with the huge surge in mobile data traffic and to meet customer needs and expectations.  In addition, they are all eager to understand how they can make money from Wi-Fi and to make the business case to justify investments in deploying Wi-Fi networks.

As many leading SPs are now discovering building a Wi-Fi network creates not only significant business value, but creates a virtuous circle that leads to ever-increasing sources of new Wi-Fi value. As the Wi-Fi Monetization Virtuous Circle outlined below shows, the reinforcing network and scale effects of Wi-Fi investments not only deliver unique business benefits at each of the levels, but also establish a valuable platform to exploit additional monetization opportunities at the next level.


Read More »

Tags: , , , , , , , , , ,