Cisco Blogs


Cisco Blog > Mobility

Top 10 Reasons to Upgrade to the 7.4 MD Software Release

As the famous saying goes, “Good things come to those who wait”. Delayed gratification -- person’s ability to forgo a smaller reward now for a larger reward in the future -- has been linked to better life outcomes as demonstrated by the often cited Stanford Marshmallow experiment and others. In most cases though, it requires a degree of self-control not easily achievable in today’s fast paced, ever-changing world with new mobile devices, protocols and technologies.

If you are one of the Cisco Wireless customers currently deploying Release 7.0 MD and waiting for the next Cisco Wireless Software Maintenance Deployment Release, the wait is over!

Release 7.4.121.0 has achieved Maintenance Deployment (MD) status.

Release 7.4.121.0 is the recommended MD release for all non-802.11ac deployments. For 802.11ac deployments, Release 7.6.110.0 (Release 7.6 Maintenance release 1) is the recommended release.

For additional details on Software Release Recommendations and Guidelines, see Guidelines for Cisco Wireless Software Release Migration

Below are top 10 reasons (in no particular order) to upgrade from the current 7.0 MD release to the latest 7.4MD Release.

10. FlexConnect (improved and rebranded H-REAP) with efficient AP upgrade across WAN, BYOD policies support, Flex ACLs and split tunneling. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

UC on UCS – The Invisible Servers

Cisco IT completely changed our voice and video infrastructure in the data center – and nobody noticed!

We changed the systems that Cisco IT uses to run ALL our voice and video supporting:

  • 200,000 voice endpoints in 540 buildings around the world,
  • 87,000 voicemail boxes
  • 1600 TelePresence units
  • 8.6 Million Webex meetings per year
  • Our customer contact centers handling 22M calls / year

It was a big job, migrating all these services off of 574 Cisco MCS servers, and onto new Virtual Machines running on 191 Cisco UCS servers in 12 different data centers.  It took a while, but it was truly worth it, despite the fact that nobody noticed.

We reduced the amount of data center resources significantly – less space, less power, fewer cables. Even better, we now have all our voice and video running on virtual machines, making operations jobs and updates and growth a good deal easier, and faster. Best of all, though, we moved all our voice and video to a completely new server platform  — and nobody noticed!

Read More »

Tags: , , , , , , , , , , , , , ,

Social Media’s Impact on On- and Offline Events

How do you turn social media on its head and make it unique for your initiatives? I’m always fascinated to see new approaches to using social media and get inspired by different organizations’ creativity. From specific initiatives to drive more traffic and awareness (like American Express’ Passion Project) to getting executives involved (like HubSpot’s CEO Manager Twitter for a Day) to countless other examples in sports, entertainment, B2B, and B2C, creativity is a key factor in the success of our efforts.

Let's Chat! #Ciscosmt Series

Let’s Chat! #Ciscosmt Series

Social media is especially intriguing when it comes to the way it can be used for on- and offline events. (E.g., webcasts, virtual environments, onsite conferences and meetings, Twitter chats, etc.) Based on the nature of these types of activities, social media is a strong communication channel to pilot new ideas, convert more traditional approaches to 2-way engagements, and create real-time impact.

Specifically social media can be used to:

  • Drive registration traffic
  • Create a much more engaging environment
  • Tie on- and offline participants together
  • Generate more information sharing, innovations, and crowdsourcing
  • Provide more direct access to speakers, executives, peers, and others
  • Offer ongoing engagement opportunities long after an “event” has taken place
  • Troubleshoot and resolve issues quickly

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,

The Three Pillars to Cisco’s Secure Data Center Strategy: Part 3 Visibility

In this last part of this series I will discuss the top customer priority of visibility.  Cisco offers customers the ability to gain insight into what’s happening in their network and, at the same time, maintain compliance and business operations.

But before we dive into that let’s do a recap of part two of our series on Cisco’s Secure Data Center Strategy on threat defense. In summary, Cisco understands that to prevent threats both internally and externally it’s not a permit or deny of data, but rather that data needs deeper inspection. Cisco offers two leading platforms that work with the ASA 5585-X Series Adaptive Security Appliance to protect the data center and they are the new IPS 4500 Series Sensor platform for high data rate environments and the ASA CX Context Aware Security for application control.  To learn more go to part 2 here.

As customers move from the physical to virtual to cloud data centers, a challenge heard over is over is that they desire to maintain their compliance, security, and policies across these varying instantiations of their data center. In other words, they want to same controls in the physical world present in the virtual – one policy, one set of security capabilities.  This will maintain compliance, overall security and ease business operations.

By offering better visibility into users, their devices, applications and access controls this not only helps with maintaining compliance but also deal with the threat defense requirements in our overall data center.  Cisco’s visibility tools gives our customers the insight they need to make decisions about who gets access to what kinds of information, where segmentation is needed, what are the boundaries in your data center, whether these boundaries are physical or virtual and the ability to do the right level of policy orchestration to maintain compliance and the overall security posture.  These tools have been grouped into three key areas: management and reporting, insights, and policy orchestration.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

TechWiseTV 120 Defending the Data Center

September 20, 2012 at 10:30 am PST

We had to dig further, past our initial meetings internally and determine what would make this particular story unique from previous ones we have told this year.  As it turns out, we had plenty of material to share but three really good shows done earlier, now provide great context for appreciating the innovation we talk about in this one.

Check out: Fundamentals of High End FirewallsFundamentals of Intrusion Prevention and (TechWiseTV 115) Firewall Reinvention with the ASA-CX

So topically, Security in the Data Center is an easy hit of course.  It almost sounds like an Oxymoron as many are convinced it is some kind of insurmountable obstacle. Nothing could be further from the truth.   It seems to top many lists.  [Watch 'Defending the Data Center' Right Now.]

As Cisco broadens the tool set with new models and deployment options, we broke this one down along party lines:

Read More »

Tags: , , , , , , , ,