Cisco announced tonight that it has a new CTO. She is a woman, and she has one of the coolest names on the planet: Padmasree Warrior. Warrior was formerly CTO of Motorola. She worked at Motorola for 23 years, and, when named CTO in January 2003, became Motorola’s first female executive vice president.
Warrior was the creator of the Motorola-hosted blog, “Bits at the Edge,” which was unfortunately but understandably shut off at her resignation this week. The blog was extremely insightful and read avidly by technology enthusiasts around the globe. In it, Warrior examined technical innovations from sometimes surprising angles and mused about the effects they would have on their respective industries and on the people who used them.
Cisco is a smart company and already has a blog post up from Warrior in its heretofore lackluster corporate blog, The Platform. She writes a fairly generic welcome piece about how Cisco is poised to take on “the next wave of Internet evolution” and she is happy to be joining them. Let’s hope that she’s just testing the waters and that Cisco provides her with a true “platform” and free rein to explore and interact with users and customers about issues and concerns that really matter to them.
You really can’t call mobile phones “phones” anymore, what with all the Web 2.0 applications springing up, such as FaceBook for BlackBerrys. These phones, or devices, have really become more like miniature computers, and this shift has its benefits and drawbacks.
I’m not suggesting the technology itself is a problem; what I mean is that users have to change the way they think about their devices. Even calling these devices “smartphones” does the products some disservice by keeping “phone” in the name. Sure, the device looks similar to a phone and it has voice capabilities, but that doesn’t mean a user can think it is merely a phone.
What happens is that users may often practice the same disregard for their mobile device that they would their old cellular phone, like leaving it in their hotel room or cab, or wherever you’ve lost a phone before. (I’ve had the strange misfortune of dropping mine into a bowl of soup.)
When we lose mobile devices, it presents a very real threat for enterprises: whatever corporate information is stored in the device can be compromised. It may not be the end of the world (depending on what mobile security precautions you’ve put in place beforehand), but treating a mobile device like a phone can cost a company.
The conundrum at the other end of the spectrum lies in thinking your mobile device is a computer. I know people don’t use these two words interchangeably or have a sudden relapse and think their computer is a phone. What I mean is that we want to do all the computer-esque actions on our devices — such as typing — and this is physically impossible. In this way, a handheld is very much like a spork: A spork saves you the trouble of carrying a fork and a spoon, but fails to really fork your meal or contain liquids; a mobile device brings portability to network data, but seriously lacks keyboard functionality and ergonomic earpieces (they’re about as comfortable as pressing a brick to your head).
I find a lot of irony in the fact that we want, and still try, to type on our handhelds. Logically, whatever we’re typing on must expanse the length of our two hands across — and this optimal typing size (we’ll say 11″x4″) could never fit into the palms of our hands. How will a handheld contain something at least twice the size of the hand (and fit into a pocket or purse)?
There are some remedies for the situation: foldout keyboards, for example — but having this extra piece of equipment does bulk up your load. Unless you have the deep pockets of a trench coat (which I’ve seen many a techie wear) it’s inconvenient to bring a foldout keyboard with you everywhere. QWERTY keys on smartphones work faster than traditional touch-dial phones, but typing with thumbs severely sacrifices the speed you get out of typing with all 10 fingers. Let’s not forget voice recognition software either; it has come a long way and might be the best solution for this problem.
If you’ve had no issues with the form factor of your mobile device, by all means, stop me now. There are plenty of wish-list gadgets out there that work great. But if you’re struggling like the rest of us, I’m all ears to your horror story or solution. Maybe we’re stuck for now — until someone invents an inflatable keyboard.
Maybe you are hoping to catch up on some networking know-how before the new year… or perhaps you could use a free gift for that special geek on your holiday gift list. Either way, I’d like to help. Thanks to the friendly elves at Cisco Press, we have a big stack of networking books to give away! Here are a few examples:
- CCNP BSCI Portable Command Guide by Scott Empson
- CCNA Portable Command Guide second edition by Scott Empson
- LAN Switch Security: What Hackers Know About Your Switches by Eric Vyncke and Christopher Paggen, CCIE No. 2659
- End-to-End Network Security: Defense-in-Depth by Omar Santos
If you’d like a chance to win one of these books, all you need to do is comment on this post and tell us the number one networking issue you’d like to learn more about in 2008, and post your comment before 8:00 a.m. EST December 10. Don’t forget to include an email address where we can reach you (and you can email us separately if you are worried about spammers, but don’t forget to include your ITKE ID so we’ll know you posted)! We’ll pick winners at random and keep sending books (chosen at random) ’til we run out. (Unfortunately, we can only ship within the U.S., but we’d still like to hear from our international readers.)
We can’t guarantee you’ll get the book before Dec. 25, but we’ll do our best. Good luck, and thanks in advance for your input!
The first time I talked to Cisco about the networking vendor’s foray into digital signage, I was a bit confused. Why would the largest enterprise networking vendor want to jump into an area targeted at consumers, especially something as futuristic as digital signage, which boils down to essentially an electronic or digital advertising screen like you would see in Times Square, displaying video content that can be changed on the fly without physically changing the sign itself? It’s similar to something seen in Minority Report or Back to the Future II.
For example, digital images could be changed depending on the consumers who are in close proximity to the sign. So, if you’re attending a punk rock convention, digital signs in the area could feature a mohawked teen snarling at you to promote a certain product, event or service. Similarly, say that same convention center hosts a video game convention, those signs could quickly, easily and cheaply be switched up to feature Ms. Pac Man or Link staring you in the face. Those advertisements would be sent to the sign via IP video.
To me, it sounded like a deviation from Cisco’s core competence of routing and switching.
But recently I had a chat with Rick Sizemore, chief strategy officer for MultiMedia Intelligence for a SearchNetworking.com story. Sizemore, an expert on digital signage and other next generation mediums, broke it down for me. He pointed to several strategic moves Cisco has made in the IP video arena that, coupled with Cisco’s networking expertise, makes the vendor a top competitor in the digital signage and interactive advertising spaces.
I’m not exactly sure how companies are going to leverage all of this next-generation technology, or how Cisco is going to build on its digital signage and IP video plans to make it a viable revenue-generating medium for those companies. But if Sizemore’s discoveries and predictions ring true, which they have so far, it won’t be long before we’re greeted in an airport or a shopping mall with advertising and signage that can target us specifically.
We talk a lot about the importance of mobile device management, but outside my job as an editor on a networking site, it’s not something I think about that often. Until, three days ago, I misplaced my cell phone.
It took me one day to figure out that the phone wasn’t actually plugged into the charger at home or hiding under the seat in my car. On the second day, I became annoyed that I didn’t have my contacts and started to worry that the phone fell out somewhere on the pavement. By the third day, I was becoming somewhat frantic, imagining someone was calling all their relatives in another country and I’d be stuck with the charges, or prank-calling my friends and business associates. Although, I have to admit, the prospect of buying a new phone was actually a bit exciting.
This is my personal and somewhat decrepit flip phone; the “wireless” line on my business card is a bit misleading and my paranoia over losing is a bit exaggerated. But had I actually lost a corporate mobile device, I can only begin to imagine the very real threats such a loss could imply: The cost of device replacement, the lost productivity due to a misplaced contact list, and the possibility that a malicious outsider or competitor could have access to sensitive data.
I just listened to a SearchMobileComputing.com podcast on this very topic, called “Controlling Risks and Costs for Better Security.” The podcast covered eight mobile security risks that can be countered using effective mobile device management. The author, Simon Forge (of Ptak, Noel and Associates) goes beyond just the challenge of managing corporate mobile devices and explains some ways to do it; he also hints at management systems that take the responsibility away from the employee/end user and return it to the network manager.
I know that if I was a network manager, I would want to have a plan to cope with an errant mobile device. And as an end user, if I had anything more powerful than a basic cell phone, I wouldn’t mind someone else shouldering the burden of responsibility for mobile data security.
On the bright side, I shoved aside a stack of papers today and found my phone right on top of my desk. Too bad they don’t make a management system for that!
Boston recently held a “hazardous materials drop-off day,” when residents of the city could take their half-empty cans of varnish and paint thinner, car batteries and the like for proper disposal at a certified facility. Unfortunately, we had to wait in line for almost an hour — in our cars — to drop off the materials. One has to wonder how much gasoline was burned and how much pollution was released into the environment in the interest of preventing pollution from the paint cans we disposed of.
I’m pretty much an average Joe when it comes to helping the environment: I recycle; I don’t support fur farming or deforestation or poaching. I’d like to do more, but I draw the line where my creature comforts start to be compromised. Although I have to say that I spend most of the long Boston winter wrapped in blankets because we keep our heat down — although that’s primarily a financial concern before an environmental one.
Corporate IT is pretty much the same when it comes to the environment, I suspect. While nobody wants to tear down an old-growth forest to erect their colossal data center (or maybe I’m wrong about that, having never visited the Pacific Northwest myself?), in today’s always-on, high-availability world, businesses have to put their bottom line before other concerns. Conservation sounds nice, but try telling that to an angry customer who can’t access his data because you’ve shut off your backup power supply and experienced a server failure.
The network eats a lot of power. Gary Audin, president of network consulting firm Delphi Inc., recently discussed this issue with our news editor, Andrew Hickey, in a two-part interview that covers both the device drain on power and how to convince upper management to go green.
The challenge of delivering high availability while cutting costs and conserving energy is before us. Is your company considering any “green” initiatives? What’s the most radical compromise you’ve made on behalf of the environment? Send me an email or post your comments below.
> Continue reading part 2, “Amazing Grace.”
> View all our IT Guy cartoons on SearchNetworking.com.
This cartoon is partially based on an idea suggested by our reader, Jim Shumaker. Jim will receive The Cubes IT Guy playset (not affiliated with The IT Guy or TechTarget) for his suggestion. Thanks, Jim!
I’ve been a writer and editor in the enterprise networking market for 11 years now, and one topic I dread being asked about is network management. I didn’t really understand it when I started learning about networking, and I don’t really understand it now. But the more I learn about the topic, the better I feel about that; because I meet few people who understand it much better than I do.
The problem is not network management itself; the idea is straightforward and is of obvious importance, especially in companies where the network has a big influence on business success (which is most companies, these days). My challenge has been in attempting to understand and categorize a wide range of products that simply defy categorization.
When I ask readers about network management, they often define it according to the particular tool they use, which can range from a basic protocol analyzer to a full-blown suite like HP OpenView. Within that range there are product groups that seem like they should be comparable, but features and functionality vary wildly. One network monitoring tool might show a schematic of your network and alert you if a device fails or traffic levels reach a predetermined unhealthy level. Another network monitoring tool is able to give detailed usage data for every device and performance metrics for each application running on the LAN and WAN, all presented in easy-to-read charts that compare actual results to past performance and service-level guarantees.
This makes it difficult for network managers to choose appropriate products. Muddying the waters even more is the recent overlap between network and applications management, as well as security management and monitoring. Many products incorporate applications and security elements, making it even harder to compare them. Add in that enterprises typically use several network management products in a layered fashion, all connected to element managers for different devices, and you have a complex scenario.
How can you make sense of network management and use it to its fullest advantage? One way is to have a clear game plan. The report, Network management systems: The good, the bad, and the ugly, brought to you by our partnership with Info-Tech Research Group, provides a step-by-step methodology for evaluating your network management environment. The resulting analysis can help you identify where your existing products are already managing the network well, how they work together, and where you should be making investments in additional products or upgrades. Check out the report and let us know if it helps make your network management look any less ugly.
Last night I was watching Attack of the Show again and they mentioned a site called BuzzFeed, which picks up the latest and greatest Web trends and conversations and compiles them all with an editorial perspective. One of the trends they had picked up on of late was the rise of “anti-social networking” sites, which are pretty much what you’d think.
Enough people have gotten fed up with Friendster and LinkedIn (and hearing how social networking is the new black) and have formed parodic sites like Snubster, EnemyBook, and isolatr… designed, in the words of EnemyBook, to “disconnect you to the so-called friends around you.”
I suppose social networking was overdue for a backlash, although you probably don’t need me to point out that there’s an irony in connecting to disconnect. Especially if you believe that parody is the sincerest form of flattery (in the world of social media, in particular), then you have to think that the authors and users of these sites are really more interested in promoting an agenda, a sneering iconoclastic stance that nonetheless snuggles right up next to that which it seeks to mock — like Sid Vicious spitting out the lyrics to “My Way” — the essence of punk rock, but knowing all the while that for all his swagger, he was really a pretty boy in an extremely well-marketed boy band.
[kml_flashembed movie="http://video.google.com/googleplayer.swf?docid=-2087192624265886477" width="400" height="326" wmode="transparent" /]
Anyway, if you really don’t want to connect to other people, why not just go to the library and bury your nose in a book?
The other interesting think about anti-social networking sites, as pointed out in naturalsearchblog, is their effect on search engine optimization efforts. It undermines your efforts to associate with the “right” keywords if you go and list a bunch of stuff that you hate. (Maybe that’s why Hatebook makes their content pages uncrawlable.) I thought of this same problem once when I was listing all the things I disliked on my personal blog profile… I didn’t want the system to connect me with other people who listed “Thomas Kinkade” or “beer pong” just because I said I didn’t like those things. So I scrapped the list.
Of course, maybe that’s the point of anti-social networking… I can make un-connections with other cranky people who hate the same things I hate. Is it easier to relate to someone about your dislikes than your likes? Hmmm… well, speak ill of Steve Ballmer on any Linux forum and you’ll probably find a friend for life.
Tell me you haven’t heard this before: Getting a certification earns you more pay. This week, however, Foote Partners LLC released a study revealing just the reverse: the average premium pay for uncertified workers trumps those who are certified. They have seen the average premium pay for uncertified workers increase 8% and decrease 2.3% for certified engineers in the past year.
I sat down with cofounder and CEO of Foote Partners LLC’s David Foote a few weeks ago to discuss the value of networking certifications in the job market. At that point in time, statistics for non-certified versus certified IT worker base pay percentage had just come to a head. Foote saw that managers were just beginning to look more at the skills IT professionals had to offer over the certifications they had obtained. In light of these new statistics, we’re really seeing results of this statement now. In less than a month we’ve seen a huge difference in how certifications are viewed.
“Part of the reason for this is the steady convergence of IT and business as, quite clearly, the design and delivery of products and services is heavily enabled by technology,” Foote stated in his report. New technology has always lead to new specialized jobs (think IT engineers). With the rapid rate the tech industry evolves at, it should come as no surprise that the IT job market would follow suit. To paraphrase Foote’s words, the toll that skill certifications are taking is just a drop in the bucket of changes we will see in the industry as a whole.
“IT professionals today have to be routinely knowledgeable about a whole lot of things that have to do with their employers’ industry, customers, and products–enough to take a strategic as well as tactical role in growing the business,” Foote said. But is it possible for IT to be completely converged in the business? Foote Partners LLC found that managers are most likely to hire IT pros with superior business skills, over IT pros with superior tech skills.
Does a decrease in pay for certified engineers mean that the workforce will start to see less-knowledgeable workers? IT guys and gals constantly juggle between certifying, schooling and getting work experience, and it finally seems that work experience is more valuable to managers. We can hopefully see experienced IT workers getting the recognition they deserve. No more struggling to prove their skills on paper; no more sacrificing work experience to chase down a certification.
Will this mean certifications will no longer exist? Should you request a refund of your Cisco training camp check? Not entirely. For one, Foote says “The Department of Defense has made [the decision to make]* certification a condition of employment,” meaning, once this goes through, The Department of Defense Directive 8570 will only hire security workers that have security certifications. So if you plan on helping Uncle Sam’s security sector five years from now, these stats won’t mean a great deal.
What else should you expect to see? Foote Partners LLC says that “the IT career ladder has been replaced by meandering career paths that span business functions and enterprises.” So rather than a rigid, one-way climb, think more about moving up, diagonally and across a jungle-gym rope ladder.
*The Department of Defense Directive 8570 is not mandating certifications for another five years.