Sunday, January 13, 2019

Collaboration Technology: Making it Count in 2019 - Cisco Certifications


All product developers and engineers want to develop products that impact and change the world on a large scale.  Whether it’s changing the way we live, the way we interact, do business or build connections, we want our work to count!

In the Collaboration team at Cisco, we’re doing what we love to do! We’re shaping and delivering technology that connects more than 300 million people around the world.

And we’re just getting started.

Because here’s the thing: for collaboration technology to matter, it has to be in FRONT of the curve.  It has to be the conduit by which companies and people harness the pace and scale of change. People deserve to work SMARTER, not harder. They deserve more, and we’re bringing it to them!

Creating the Ultimate Experience


What’s our mission in 2019?  We’re going to win their hearts and minds. We’re going to focus on winning hearts and minds with experiences that make you feel like you’re in the same room with someone even when they’re thousands of miles away.  We’ll do it with intelligence and context wrapped in. And we’ll do it across our calling, video, meetings and contact center solutions.  Across the whole portfolio.

Picture joining a meeting – whether with someone around the world or across the street – and feel like you are RIGHT THERE, catching every nuance, every gesture, every moment of body language.

If you call a contact center, you don’t waste time explaining issues because the agent ALREADY HAS THE BACKGROUND. They know your history and anticipate your needs. Issues are quickly resolved and hey, maybe you buy a little something extra while you’re there. Just saying…

You have the choice to reach people on THEIR preferred device without having to sacrifice YOUR preferred device. You can count on, without exception, the ability to call anyone you need to, at any time without worrying about the quality of the sound. If you need to huddle folks together the moment inspiration strikes, you can do that from anywhere and from any device.

 Some might think this collaboration ‘wish-list’ is a little far-fetched, but at Cisco, we’ve been working to make it a reality through our meetings, messaging, devices, calling and contact center solutions.

And I repeat, we’re just getting started.

Our collaboration future is intelligent. We’re threading intelligence and machine learning throughout our award-winning platforms.  Get ready for us to show you what we’ve got this far!!!

Making Your New Year’s Resolutions


Truly immersive work experiences…the ones you walk away from completely energized? We make these a reality for our customers.  EVERY. SINGLE. DAY.

Not sure where to begin? Here are four absolute “must haves” for your 2019 collaboration technology ‘wish list” to make this happen:

  • Simple – Complexity is an absolute creativity and collaboration killer so your options need to be easy to use and easy to buy. Period.
  • Friendly – Technology exists in an ecosystem and collaboration technology is no different. Your choices shouldn’t isolate you from other options or opportunities.
  • Flexible – Simply put, work should be as mobile as we are. Technology that’s easy to access lets you be productive and impactful whenever and wherever needed.
  • Intelligent – Next gen technology needs to adapt and anticipate so you can improve and provide the best customer and employee experience. The ability to recommend, personalize and predict are the next table stakes for this industry.


Building Our Future


The way we work is changing at lightning speed. And our Cisco team is WILDLY excited because we know the work we’re doing is making it count!  We’re defining the future landscape. It’s where you have this amazing, intuitive, intelligent technology our customers love to use – technology that enables them to be their best, most creative, most innovative selves and helps them make the impossible, possible.

Do you see the same when you look ahead? I really hope so because you deserve it. If that’s not your reality yet, all I want to say is, get in touch and let’s build it together!!

Our experts say about Cisco Certification Exams



Monday, December 31, 2018

Transforming Enterprise Applications with 25G Ethernet SMF - Cisco Certifications


Bandwidth Drivers for 25G


Bandwidth requirements in today’s Enterprise networks are now being driven by dramatic increases in video conferencing by such systems as Cisco’s Telepresence and other real-time applications such as Augmented Reality, Mixed Reality and Virtual Reality. These are taxing the limits of traditional 10G infrastructure.  Whether it’s IEEE802.1ax WiFi Access Points or direct wired equipment with copper/fiber ports that require 1G/2.5G/5G/10G backhaul interfaces, new enterprisenetworks are being built with high speed equipment that now requires 25G ethernet interfaces.

What is “LR”?


For SFP (Small form Factor Pluggable) transceiver technology “LR” stands for Long Reach that traditionally refers to a reach of 10km.  The 25G SFP form factor, called SFP28 (28 Gb/s to account for encoding overhead) has been standardized and the LR specifications are available in IEEE P802.3cc™ – 2017 Amendment 11: Physical Layer and Management Parameters for Serial 25 Gb/s Ethernet Operation Over Single-Mode Fiber.

The 25G transceiver is similar to the 10G transceiver in that it uses a simple NRZ (Non-Return-to-Zero) modulation but it has higher bandwidth transmitter and receiver for 25G communication. It also includes a CDR (Clock Data Recovery) circuit to clean up the signals.  The 25G transceiver also requires that the host ports support RS-FEC (Reed Solomon – Forward Error Correction), which is not required for 10G.

Cisco’s newest 25G products, including the Catalyst Enterprise switches 9500/9400/9300/9200’s, have advanced ASICs that implement RS-FEC for 25G communication so that transmission error rate can be improved from a BER (Bit Error Rate) of 5×10-5 to 1×10-12. A BER of 1×10-12 is traditionally considered to be “error free” and is associated with other ethernet rates where upper layer protocols can deal with infrequent transmission errors.

Inter-building and Intra-building applications for SFP-10/25G-LR


25G-LR SMF transceivers are now being used for both inter-building and intra-building campus applications to provide high speed connectivity.

Inter-building applications: In large campus environments 25G is used to connect from the building’s distribution switches to a core switch(es) in another campus building. Because of the 25G-LR’s reach of 10km (~6.2 miles) the transceiver provides an excellent low-cost solution for relatively large campus environments such as hospitals, medical offices, college campuses, and business parks. The core switch typically connects to the service provider’s metro/core network with 40/100G links, but those links may also use 25G LR technology.

Intra-building applications: In many situations SMF is used (or has been used) to connect wiring closet switches for distribution.  In these applications, network builders and architects go beyond the limits of the traditional 300m over OM3 (or 400m over OM4) MMF (Multi Mode Fiber) by using SMF for large spans found in mega shopping malls, huge airports, and large manufacturing buildings. Now with Cisco’s SFP-10/25G-LR, networks can communicate at 25G without changing the SMF fiber infrastructure.

Migration from 10G to 25G


The new SFP-10/25G-LR transceiver has dual-rate capability that enables interoperability with 10G-LR SMF transceivers. This allows the network to be incrementally upgraded at either the end of the fiber. For example, Figure 4 shows how a Catalyst distribution switch is replaced with a new switch equipped with a SFP-10/25G-LR, but still communicates with the legacy 10G Catalyst wiring closet switch using 10G.  Then when the wiring closet switch is replaced with a new 25G Catalyst switch, it communicates with the distribution switch at 25G without changing the transceiver at the latter end.

Success Secrets: How you can Pass Cisco Certification Exam in first attempt 



Thursday, December 13, 2018

What is Cryptomining How to Get It on A Device - Cisco Certifications


What is cryptocurrency?


At the lowest of levels, cryptocurrencies are digital currencies that are unassociated with centralized banking systems, such as those run by various countries or economic zones around the world. Cryptocurrencies first rose to prominence close to ten years ago with the advent of Bitcoin, though the cryptocurrency market now boasts thousands of different digital currencies.

One feature that has made cryptocurrencies so popular is the blockchain: the public, digital ledger used to validate the coins and transactions. A major draw of blockchain technology is that it is difficult to modify or tamper with, thanks to cryptography and its distributed nature, which help secure transactions using cryptocurrencies.

What is cryptomining?


Whether it’s referred to as coin mining, cryptocurrency mining, or cryptomining for short, this is the process by which new coins are created or earned. While there are slight variations between coins, mining is largely the process of validating transactions on the blockchain, whereby those carrying out the processing are paid a fee for their efforts. In effect, you can earn coins by helping to validate the blockchain and the transaction ledger contained within.

In some cryptocurrencies, such as Bitcoin, new coins can also be generated when a new block of transactions is added to the blockchain. This is in essence an example of how new coins are “mined” while validating transactions on the blockchain.

What’s so bad about that?


In all actuality, nothing. Neither cryptocurrencies nor cryptomining are inherently malicious. There are plenty of well-intentioned people out there today using cryptocurrencies and participating in cryptomining activities. The one key aspect that separates your regular, everyday cryptomining from what we consider malicious cryptomining: Consent.

There is often little difference between cryptomining software that a user installs on their own and cryptomining software installed by a malicious actor. In fact, in many cases they’re exactly the same. The difference is that the malicious cryptomining software is running without the owner’s knowledge. And any software that runs on a device without the owner’s knowledge is cause for concern.

How did malicious cryptomining rise to prominence?


Prior to malicious cryptomining, ransomware had become the darling of malicious money-making enterprises. But as users became wise to the techniques used by computer-locking malware, and enterprises became better at preventing the disaster that ransomware threatened, malicious actors began to look elsewhere.

Malicious cryptomining also had some distinct advantages over previous money-making schemes. With ransomware, there never was a guarantee that the user of the device would pay out. They could have regular backups at the ready or they just didn’t care about what resided on the compromised device. In either case, reimaging the device solves the problem.

Even more risky, law enforcement agencies throughout the world began to crack down on ransomware attackers. As arrests tied to ransomware went up, more and more adversaries were drawn to the less risky prospect of peddling malicious cryptomining software.

Over the past couple years and into the first half of 2018, the value of cryptocurrency skyrocketed. As with anything software-related and valuable, malicious actors take notice, especially as it coincided with a decline in effectiveness of ransomware.

There were other distinct advantages that helped malicious cryptomining grow. One of the most appealing factors is how cryptomining falls into a grey area in terms of threats. Given how little difference there is between legitimate cryptomining and malicious cryptomining, many users that fall prey to the latter aren’t as concerned as they would be if they found another threat on their systems. If it’s simply mining coins in the background, and isn’t doing anything inherently malicious, why worry? There is an obvious appeal to attackers in this case, where they can reap the benefits without disturbing those they are taking advantage of.

A wolf in sheep’s clothing is still a wolf


Upon deeper reflection there are plenty of reasons to be concerned about malicious cryptomining.

As with any piece of software on a computer, cryptomining requires resources. And a piece of software that takes too many resources can have a negative impact on overall system performance. Not only that, but the use of extra resources requires extra power to facilitate it. It may not add up to much on one system, but multiply the cost over the number of endpoints in an organization, and you could see a noticeable rise in power costs.

Furthermore, there may be regulatory compliance implications when cryptominers are earning revenue on corporate networks. This holds especially true for those in the financial sector, where strict rules could apply to revenue generated using corporate resources, whether or not those in charge are aware of the practice.

But perhaps most worrying is that the presence of a malicious cryptomining infection, unbeknownst to those running a network, could point to security holes in the network configuration or overall security policies. Such holes could just as easily be exploited by attackers for other means. In essence, if a cryptomining infection is found on a network, what’s to stop other malicious threats from exploiting those same holes to carry out further malicious activity?

How does malicious cryptomining get on a device?


There are a number of ways, though rarely are these delivery methods novel. The methods used to deliver malicious cryptomining software are the same methods used to deliver other malicious threats:


  • Exploiting vulnerabilities in both endpoint and server-based applications
  • Employing botnets to spread cryptomining software to new and previously compromised devices
  • Sending emails that include malicious attachments
  • Leveraging JavaScript that allows for cryptomining in the web browser
  • Utilizing adware threats that install browser plugins that can be used to perform cryptomining



These are just a few of the more common ways malicious cryptomining arrives on a device. Naturally, as with any threat, if there’s a way to compromise a system, attackers will try it.

How do I prevent malicious cryptomining?


As with anything threat-related, a good security posture will go a long way from keeping malicious cryptomining at bay.


  • To detect and block malicious cryptomining, advanced endpoint protection is needed and should be part of a broader defense strategy.
  • You can utilize network security analytics to uncover where cryptomining activity may be occurring in your organization.
  • To prevent cryptomining applications from being installed in the first place, block network connections to web sites known to participate in mining cryptocurrencies.
  • DNS layer security can also be extremely effective in stopping cryptomining, preventing mining transactions from being sent back to the malicious actors.

Overall, if you practice a layered approach to security, with an effective line of defense that includes next-generation firewall, endpoint, security analytics, and DNS layers, you stand a better chance of detecting and preventing cryptomining infections on your network.

What is the current and longer-term outlook?


Over its history, cryptocurrency markets have demonstrated some fairly significant volatility. The sharp rises and sudden falls in cryptocurrency value is paralleled in the malicious cryptomining activity that we have witnessed. For instance, take a look at the overall volume of cryptomining-related traffic that Cisco has witnessed on the DNS layer. While there have been sharp peaks and valleys, the overall takeaway is that cryptomining is trending up as time goes on.

What is interesting is that the values of many popular cryptocurrencies has declined during the same time frame, trending downwards overall. Take Monero for instance, a popular coin used in malicious cryptomining.

There are a few possible reasons that these trends are at odds. It could simply be that malicious actors are continuing to push malicious cryptomining out because of the ease of deployment, the reduced risk if caught, and if users remain unaware or don’t care if it’s on their device, the longer time span cryptomining software will likely reside on a device, earning them more money.

Alternatively, it’s possible we’re seeing an overall increase in cryptomining activity specifically because the values of cryptocurrencies are declining. In order for a malicious actor to maintain revenue streams as the value of cryptocurrencies decline and their “return on infection” drops, more malicious cryptomining infections are required.

Conclusion


Money is and likely always will be one of the chief motivators for malicious actors in the threat landscape. In many ways malicious cryptomining can be looked at as a way for attackers to make a fast buck with little overhead, while the targets are less worried about the implications the threat on their devices when compared to others. Still, the indirect costs are nothing to ignore, and should be addressed regardless.

Thursday, December 6, 2018

Cisco Unites SD-WAN and Security to Address the New Cloud Edge - Cisco Certifications


The WAN is undergoing a radical transformation. Today, organizations host their applications in multiple clouds – public, private and SaaS. The way people work has also changed; employees connect from coffee shops and airport lounges, instead of just the office. Now, organizations must rely on the Internet to connect users to business-critical applications. This has resulted in a new Cloud Edge – the intersection of networking and security.

Cisco SD-WAN: Simple, Secure, Scalable


Cisco SD-WAN is built to address today’s most pressing issues, yet flexible enough to tackle the challenges of tomorrow. New innovations include:


  • Fusing Security with SD-WAN: From application-aware enterprise firewall and intrusion prevention, to URL filtering, advanced security is now integrated into Cisco SD-WAN devices and managed through a single pane of glass. And Cisco SD-WAN is all powered by Talos, the industry’s most powerful cyber threat intelligence solution.
  • Simplifying Cloud Security Deployments: By integrating Cisco SD-WAN with Cisco Umbrella, access to malicious destinations can be blocked before a connection is ever established.
  • Applications Experience: Cisco has partnered with Microsoft to enhance the Office 365 application experience for users. Unlike other vendors, Cisco SD-WAN monitors in real-time all available paths to the Microsoft Office 365 cloud. Using Microsoft Office URLs, Cisco is also able to determine the closest cloud, resulting in up to 40 percent faster performance for users.
  • Open and Programmable: With open APIs, Cisco SD-WAN provides service providers and partners the opportunity to create unique new services. To help developers and network engineers innovate, Cisco DevNet has created new SD-WAN learning labs and sandboxes.
  • New SD-WAN Infrastructure: With the world’s broadest SD-WAN portfolio powered by Viptela and Meraki, Cisco is offering even more options for customers with two new Integrated Services Routers (ISR) designed for small and large branch offices.
  • Quick Start Service: Cisco is also helping customers accelerate SD-WAN deployments and decrease risk via a new SD-WAN Quick Start Service.  For a fixed-price, customers get access to remote implementation and knowledge transfer capabilities to streamline projects. 
  • Easy to Buy and Manage: Cisco has made it easier to consume and manage the new solution. Both the network and security can be purchased through a single license model and managed through a single interface.

Our experts say about CCNP Exams in this video


Monday, December 3, 2018

Cisco certifications - Building Bridges with Jabber 12.5


Team messaging mode (available for preview in Jabber 12.5)

Team messaging mode for Cisco Jabber enhances the way you connect and get things done in small teams. This new deployment option provides a core set of Webex Teams messaging features from the cloud while keeping your calling services on-premises. You now have persistent one-to-one chats and team spaces, a new presence experience, advanced file sharing capabilities, and a powerful way to search in your Jabber application – all while keeping the advanced calling features that you know and love.

Team messaging mode not only provides a new team workflow in your Jabber environment, but also illustrates our commitment to customers. We use the extensible Webex platform to integrate with our existing solutions and deliver unique blended experiences. Our IT administrators can now provide new, cloud-delivered solutions while continuing to leverage their on-premises or partner managed calling services. Customers will also have the added benefit of native interoperability between Jabber team messaging mode and Webex Teams, as they leverage the same cloud platform. This can reduce the burden on your organization if you are transitioning from Jabber to Teams. No forced migrations, no user islands. Unlike other vendors, we are focused on productive user workflows through a cloud evolution.

Active controls


Our goal is to provide an excellent and consistent meeting experience no matter how you join a meeting. We continue to move towards that goal with active controls for Jabber users. The new controls give you more control over your meetings with a meeting roster, participant controls, customized layouts, and a new share experience.

These new features are available for Cisco Meeting Server customers, and we will continue to roll them out to other meeting types in coming releases. Meeting Server users now have the core functionality they need to host and use Jabber as their primary meeting client.

Additional Jabber 12.5 Features



  • Simplified Configuration Process: No more manual Jabber XML configuration file editing and uploading. You can now manage configurations using the Unified Communications Manager web interface. In the new interface, you can assign configurations to a group of users or device types.
  • Cisco Headset Management: The Jabber application will now automatically push updated firmware to your Cisco headsets to keep them up to date easily.
  • Media Routing Optimization: Jabber 12.5 now supports SIP ICE. ICE provides Media Routing Optimization, and remote users no longer need to “hair-pin” media through the expressway.
  • Updated User Experience: Jabber continues to have a modern design and user experience. In Jabber 12.5 we are releasing an updated design and better alignment with the rest of the Cisco Collaboration portfolio

Cisco Exam dumps – Cisco Partner Summit Key Takeaway

Cloud is now fueling our growth.

Chuck said it best: “That existential threat from four or five years ago that was going to be the end of us, that was going to lead to no customer ever buying a piece of IT equipment for an on-premise work ever, is actually driving our growth today.” This means Cisco and our partner ecosystem need to embrace a multicloud world for our customers. The good news is there’s no better company on the planet prepared to do this than Cisco – working with our partners. Cisco’s solution set, continued innovation, and exciting partnerships with players like Microsoft, Google and now AWS propel us into a market leadership position for us to optimize!

It’s time to drive customer obsession – and capture the $3.7T digital opportunity it creates for us.
As I shared on mainstage, while we’ve done an amazing job with our partners driving customer satisfaction over the years, it’s critical that we set the bar higher – now driving customer obsession – together. We must perform today – while transforming for the future – because our customers expect more from us.  They demand powerful business outcomes, consumption flexibility, and security and privacy rigor. It’s on all of us to drive this.

Customer success practices are foundational to our mutual future success.

Our transformational leadership challenge with our partners is to build robust Customer Success Practices driving a new sales motion around software, developing licensing expertise, building lifecycle practices and software development practices. This will catalyze customer obsession, customer retention and revenue growth.
Over the last two years we’ve experienced strong support and success in the top two pillars. Now, we collectively need to double down on building lifecycle and software development practices. Our top enablement priority for FY19 is right here, and our partner teams stand ready to help our partners build new muscle around customer success!

Great news. Our partners can take action now!
We want to ensure partners have the skills, tools and resources they need to take action around these focus areas today. I announced two new offers at Partner Summit our partners can take advantage of right now:

Lifecycle Adoption Practice Offer – Stronger partner customer adoption capabilities drives better renewal rates, greater expansion and fuels customer retention. During my Americas Geo Connection Session, I introduced LIFTinnovate, an ecosystem partner who compliments existing partners by providing tools and expertise to help partners build stronger adoption practices.  During FY’19, we’ll co-fund a lifecycle adoption services engagement where a lifecycle partner like LIFTinnovate can help Cisco partners build a customer lifecycle adoption practice.

cisco Exams-cisco Building Bridges Between Hope and Possibility


Technology holds great promise to improve lives – consider how every second in India, three people experience the Internet for the first time. Or how video collaboration units enable  patients at family health clinics in rural areas in Africa to connect to specialists at larger medical centers.

Yet technology can do little if a person lacks access to basic needs. We live in a world of complex global challenges that deeply impact millions around the world—water scarcity, hunger, homelessness, and unemployment, to name a few. According to the World Bank, 10 percent of the world’s population lives on less than US$1.90 a day. In addition, 2.1 billion people lack reliable access to safely-managed drinking water services, and 4.5 billion lack safely-managed sanitation services.

At Cisco, making a difference and improving lives around the world has been core to who we are for over 30 years. We have consistently leveraged our technology to solve real business and social problems, and ultimately to build bridges to new possibilities. It is this mission that has driven us to establish our Networking Academy program, which for more than 20 years has been providing IT training, preparing students around the world for entry-level jobs, career transitions, and professional certification. More than 9 million students in 180 countries have participated in Networking Academy thus far, and the number continues to grow.

We are also committed to helping locally within our own community – earlier this year, we made a five-year, $50 million commitment to Destination: Home, a San Jose-based public-private partnership focused on providing permanent housing to the chronically homeless in Santa Clara County.  We also recently announced a new $20 million TECH Fund investment with Pure Storage and LinkedIn to help build affordable homes in the greater Bay Area.

But given the incredible complexity of the issues that face us, it is clear that governments, companies, educational institutions, nonprofits, and individuals working in isolation cannot address these challenges alone. We all must work together to partner, creating local, regional, or national strategies and take advantage of the opportunities digitization can provide.

Partnering is also core to who we are at Cisco – we do it with our own customers and partners every day, helping them take advantage of the full potential of our technology and solutions. But we also do it with other organizations – schools, nonprofits, governments – that can help us leverage technology to have a positive impact on the world.

It is this commitment that has led us to build a partnership with Global Citizen, an organization focused on mobilizing 100 million socially-minded advocates who want to end extreme global poverty by 2030. Cisco and Global Citizen are united in our belief that we must all take a role in helping solve the world’s biggest problems, and that young people around the world can lead the way.