Casper™ Cloaking Technology

Casper™ Cloaking Technology by Designtex is an architectural film for glass walls that obscures digital screens to outside view. It acts as a smart shield to ensure data privacy, while providing the peace of mind to collaborate freely in any working environment. This is a breakthrough that will unleash space design in the networked modern world. Casper™ is the only cloaking technology of its kind anywhere. You have to see it to believe it.

Privacy as Standard.

It’s the perfect confidentiality cloak, obscuring only the light transmitted by large LED displays.

Anyone looking into the room from the outside sees just a black screen, while everyone in the room can work freely with peace of mind.

LED displays filter specific light oscillations.

By selectively filtering them again, Casper™ renders the display light invisible.

Promo Video

Casper Cloaking Technology Promo Video from Protective Film Solutions EU on Vimeo.

See more https://www.caspercloaking.eu/

Setting up Alexa for Business with Cisco Telepresence video conferencing

Alexa for Business helps you simplify your conference room experience. It lets you use your voice to start meetings and control your conference equipment. You can say “Alexa, join my meeting” and Alexa starts your scheduled meeting. When there is no meeting on the calendar, Alexa prompts you for a meeting ID to start a one-time meeting. Alexa for Business integrates with conferencing equipment providers, such as Cisco Telepresence and Zoom Rooms.

In this blog post, AWS describe how Alexa for Business integrates with Cisco Telepresence video conferencing endpoints.

https://aws.amazon.com/blogs/business-productivity/setting-up-alexa-for-business-with-cisco-telepresence-video-conferencing/

No sound on SX10 after downgrade from CE to TC SW

Recently one of my friends discovered that if an SX10 is downgraded from CE8.x to TC7.x , then audio is no longer carried over the HDMI output. After some experimentation he realized that the Configuration – Experimental – “Audio AudibleAndAudioPairingSoundRouting” is set to to ‘Split’ and THIS is what turns off HDMI audio out. The correct setting should be: ‘HdmiAndLineOut’.

Note that the “experimental” menu is hidden in the web interface, so you’ll have to search for “Experimental” to reveal this menu.

The SSH command would be:

xConfiguration Experimental Audio AudibleAndAudioPairingSoundRouting: HdmiAndLineOut

Thanks for the tip Theis.

5 steps to better virtual meetings

There’s no question that virtual meetings bring people together, speed up decision making, and save money. Today’s virtual meetings let customers connect with your experts despite distance and help you feel like you’re in the same room as colleagues from around the world. Here are five ways to make your virtual meetings more productive and impactful.
More than two-thirds of business professionals engage in virtual work.
— “It’s Unclearly Defined, but Telecommuting Is Fast on the Rise,” New York Times , Mar. 2014.
1. Be authentic.
Technology makes it easier to connect with others no matter the distance. But it can also feel like a barrier when it comes to building interpersonal relationships. The key is to invest a bit of time and treat people like actual people, not just voices or faces on a screen.
You’ll get more participation if you follow these guidelines:
  • Greet each participant as they enter the meeting.
  • Ask about their weekend or vacation plans.
  • Don’t mute your endpoint.
  • Avoid side conversations.
2. Put technology to work.
Look for collaboration solutions that are easy to use so you can focus on the meeting and not on the technology. Make sure face-to-face interaction is available through video—without it, you miss important parts of the conversation like facial expressions and nonverbal feedback.
The right way to use technology:
  • Use video so you can gauge reactions.
  • Share content like presentations or interactive whiteboards to engage participants.
  • Record meetings for people who can’t be there.
  • Ensure that people can join in from any device.
3. Communicate.
Meaningful communication can take many forms: one-to-one, team meetings, all-hands, and trainings. If you ask a question and hear crickets, change your tactics.
  • Address questions to specific people.
  • Encourage interaction.
  • Support two-way communication.
  • Discourage multitasking.
75% of users say video improves collaboration and productivity. — “Aiming to Increase UC Adoption? Look to Video,” Frost & Sullivan, 2014.
4. Play fair.
When the meetings are international, someone is invariably attending during off hours. Giving people the option to participate from home via video provides them the advantages and flexibility of a face-to-face connection.
  • Be sensitive to time zones so the same people don’t always have to work during off hours.
  • Make it possible for people to participate from anywhere and from any device. 
  • Allow everyone the opportunity to give feedback.
5. Follow virtual meeting etiquette.
Whether you’re collaborating from across the globe or just from across the office, video-enabled virtual meetings offer flexibility, consistency, and a higher level of cooperation. Think of them like traditional meetings with extra benefits.
  • Direct questions to people by name to cut confusion.
  • Use technology that can eliminate background noise.
  • Offer the flexibility that allows people to join from anywhere.
  • Use technology that helps identify who is speaking.
  • Use video for formal meetings and quick base touches
But remember that you’re talking to real people.

11.0 Collaboration SRND

You can find the 11.0 Collaboration SRND as well as previous versions of the SRND at the SRND landing page:  http://www.cisco.com/go/ucsrnd

While updates to SRND content were made throughout the document, the following are some notable highlights:

·         Gateways chapter: New sections on Expressway Business to Business Communications and Cisco Unified Border Elements

·         Collaboration Endpoints and Mobile Collaboration chapters: Coverage for Cisco Spark and the Cisco Collaboration Cloud.

·         Cisco Rich Media Conferencing chapter: Extensive updates made throughout including incorporation of applicable content from the previous Cisco Collaboration Services chapter.

·         Bandwidth Management chapter: New chapter replacing the previous Call Admission Control chapter.  In addition to the previous Call Admission Control content, this chapter has been updated extensively to cover QoS and other bandwidth management considerations.

·         Emergency Service chapter: Updated to include coverage for Unified CM native emergency call routing.

·         Collaboration Instant Messaging and Presence: Extensive updates made throughout including incorporation of some content from the previous Cisco Collaboration Clients chapter.

·         Cisco Collaboration Clients and Cisco Collaboration Services chapters: Eliminated with pertinent content moved to Collaboration Endpoints, Rich Media Conferencing, and Collaboration Instant Messaging and Presence chapters.

Catalyst Switched Port Analyzer (SPAN) Configuration Example

Introduction

This link describes the recent features of the Switched Port Analyzer (SPAN) that have been implemented. The SPAN feature, which is sometimes called port mirroring or port monitoring, selects network traffic for analysis by a network analyzer. The network analyzer can be a Cisco SwitchProbe device or other Remote Monitoring (RMON) probe. Previously, SPAN was a relatively basic feature on the Cisco Catalyst Series switches. However, the latest releases of the Catalyst OS (CatOS) introduced great enhancements and many new possibilities that are now available to the user. This link is not intended to be an alternate configuration guide for the SPAN feature. This link answers the most common questions about SPAN, such as:

  • What is SPAN and how do you configure it?
  • What are the different features available (especially multiple, simultaneous SPAN sessions), and what software level is necessary in order to run them?
  • Does SPAN affect switch performance?

See this link

 http://www.cisco.com/c/en/us/support/docs/switches/catalyst-6500-series-switches/10570-41.html

The Heartbleed Bug

heartbleed

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

http://www.heartbleed.com/

The HeartbleedBug and Cisco 

 

OpenSSL Heartbeat Extension Vulnerability in Multiple Cisco Products

Multiple Cisco products incorporate a version of the OpenSSL package affected by a vulnerability that could allow an unauthenticated, remote attacker to retrieve memory in chunks of 64 kilobytes from a connected client or server.

The vulnerability is due to a missing bounds check in the handling of the Transport Layer Security (TLS) heartbeat extension. An attacker could exploit this vulnerability by implementing a malicious TLS or Datagram Transport Layer Security (DTLS) client, if trying to exploit the vulnerability on an affected server, or a malicious TLS or DTLS server, if trying to exploit the vulnerability on an affected client. An exploit could send a specially crafted TLS or DTLS heartbeat packet to the connected client or server. An exploit could allow the attacker to disclose a limited portion of memory from a connected client or server for every heartbeat packet sent. The disclosed portions of memory could contain sensitive information that may include private keys and passwords.

Please note that the devices that are affected by this vulnerability are the devices acting as an SSL server terminating SSL connections or devices acting as an SSL Client initiating an SSL connection. Devices that are simply traversed by SSL traffic without terminating it are not affected.

This advisory will be updated as additional information becomes available. Cisco will release free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities may be available. This advisory is available at the following link:

http://www.cisco.com/web/about/security/intelligence/ERP-Heartbleed.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed

 

The following Cisco products have been analyzed and are not affected by this vulnerability:

  • Cisco IP Video Phone E20
  • Cisco TelePresence MXP Series
  • Cisco TelePresence Advanced Media Gateway Series
  • Cisco TelePresence IP VCR Series
  • Cisco TelePresence MCU all series

 

The following Cisco products are currently under investigation:

  • Cisco TelePresence Movi with Precision HD USB / Jabber Video
  • Cisco TelePresence Recording Server
  • Tandberg 770/880/990 Series Tandberg
  • Codian ISDN GW 3210/3220/3240
  • Tandberg Codian MSE 8310 model

 

Vulnerable TelePresence Products to Heartbleed
  

Endpoints

 

Infrastructure

  • Cisco Unified Communications Manager (UCM) 10.0 [CSCuo17440]
  • Cisco TelePresence Video Communication Server (VCS) [CSCuo16472]
  • Cisco Expressway Series [CSCuo16472]
  • Cisco TelePresence Conductor [CSCuo20306]
  • Cisco TelePresence IP Gateway Series [CSCuo21597]
  • Cisco TelePresence ISDN GW 3241 [CSCuo21486]
  • Cisco TelePresence ISDN GW MSE 8321 [CSCuo21486]
  • Cisco TelePresence ISDN Link [CSCuo26686]
  • Cisco TelePresence Serial Gateway Series [CSCuo21535]
  • Cisco TelePresence Server 8710, 7010 [CSCuo21468]
  • Cisco TelePresence Server on Multiparty Media 310, 320 [CSCuo21468]
  • Cisco TelePresence Server on Virtual Machine [CSCuo21468]
  • Cisco TelePresence Supervisor MSE 8050 [CSCuo21584]