Cisco Showcases “Innovation, Customer Traction and Partnership Success” at MWC 2016

Source: Cisco
Jetlag is way over rated, and in Barcelona there is tremendous enthusiasm for Cisco here at Mobile World Congress . This week, we are showing how we’re delivering on our strategy of helping service providers drive profitable business outcomes in today’s digital world and keep pace with an industry undergoing unprecedented change: Innovation— With the launch of multiple technologies, including the Ultra Services Platform with customers Deutsche Telecom, SK Telecom and Orange , as well as announced plans to build a 5G router with Ericsson and Intel for Verizon’s industry-leading 5G program . Customer momentum— Multiple customer wins with several top-tier service providers and mobile operators, including DT, SK Telekom, […]Cisco Showcases “Innovation, Customer Traction and Partnership Success” at MWC 2016

Using Veeam FastSCP for Microsoft Azure with Azure Resource Manager

Source: Veeam

When Veeam released Veeam FastSCP for Microsoft Azure a couple of months ago, we still deployed our VMs (virtual machines) in the classic ASM (Azure Service Management) model. Microsoft recently released a new model called ARM (Azure Resource Manager). I’m not going into depth about the differences between the two models, but I did want to point out that a VM deployed in the ASM model is deployed differently in the ARM model.

Microsoft views the ARM model as the future to deploy new compute resources. Unfortunately, because of the differences in deployment, Veeam FastSCP for Microsoft Azure doesn’t work anymore out-of-the-box. For this reason, you’ll need to make some changes inside the VM to get it working again.

Here is the procedure to take advantage of Veeam FastSCP for Microsoft Azure with Microsoft ARM-deployed VMs.

Create firewall rules

In the classic model, firewall rules were called endpoints, and they needed to be created per VM. In the ARM model, you can create a security group that you can use to create firewall rules for all VMs in that resource group.

In my example, I have a resource group called Veeam-VMBP and I created a network security group with the exact same name. Here, you’ll want to add an inbound rule to make sure that your traffic is from the computer where you are running FastSCP to the VM on port 5986 (default HTTPS Windows Remote Management).

Veeam VMBP - network security group

As an example, see the below rule that I created:

Add inbound security rule

Install or create a (self-signed) certificate and enable PowerShell remoting

In the classic model, when you deploy a VM, PowerShell remoting is configured for you. In the new model it is not, so you will need to do it yourself.

NOTE: This process will vary, depending on whether you use a publicly signed o self-signed certificate. Since most cases are with a self-signed certificate, I will discuss this variation. When you want to use a publicly signed certificate, the process is much easier because you only need Set-WSManQuickConfig –UseSSL to get things working.

Below you will see the PowerShell one-liners I used to configure my deployed Windows Server 2012 R2:

  • $Cert = New-SelfSignedCertificate -CertstoreLocation Cert:LocalMachineMy -DnsName "FastSCP-Server"
  • Export-Certificate -Cert $Cert -FilePath C:tempcert
  • Enable-PSRemoting -SkipNetworkProfileCheck –Force
  • New-Item -Path WSMan:LocalHostListener -Transport HTTPS -Address * -CertificateThumbPrint $Cert.Thumbprint –Force
  • New-NetFirewallRule -DisplayName "Windows Remote Management (HTTPS-In)" -Name "Windows Remote Management (HTTPS-In)" -Profile Any -LocalPort 5986 -Protocol TCP

Some explanation:

  • The first line creates a self-signed certificate with the DNS name of my server (in this case, FastSCP-Server). It then stores it in the certificate store.

NOTE: Add the certificate details to a variable called $Cert to use it further.

  • The second line exports the certificate to a location (in this case C:temp). If you have an error on this line, note that the directory has to exist upfront, it will not be created.
  • Third line will enable PowerShell remoting. I used the -Force to skip the user prompts and -SkipNetworkProfileCheck to ensure that PowerShell doesn’t complain when your network connection type is public (which it probably will be)
  • The fourth line creates the HTTPS listener, which won’t be created automatically, only the HTTP listener and connects the certificate to it
  • Finally, the fifth line creates a new Windows Firewall rule that opens Windows Remote Management over HTTPS

And Poof! You can once again use Veeam FastSCP for Microsoft Azure.

Connecting to the server

Below you can see that I can connect to my server again and I have access to the data on my VM.

Veeam FastSCP for Microsoft Azure


Veeam FastSCP for Microsoft Azure works out-of-the-box when used with a Microsoft Azure VM deployed in the classic model. However, when you deploy a VM in the Azure Resource Manager model, things are a bit different and Remote PowerShell is not configured anymore. To be able to take advantage of Veeam’s solution, you will first need to take a few quick steps to manually enable it.

Using Veeam FastSCP for Microsoft Azure with Azure Resource Manager

Lenovo Unveils New Way for Users to Connect Across Devices, Networks and Borders

Source: Lenovo

Barcelona – February 21, 2016: Lenovo (HKSE: 992) (ADR: LNVGY) today announced a new global wireless roaming service called Lenovo Connect. A long-time mobile virtual network operator (MVNO), Lenovo will now offer Lenovo Connect, a seamless communication service that works across devices, networks and borders for customers in China and EMEA. Lenovo Connect eliminates having to buy a separate SIM card and offers benefits such as low-priced global roaming and enhanced customer engagement by leveraging Lenovo’s Big Data and cloud services. It provides a simple, fast and cost-effective connectivity solution for companies of all sizes and mobile professionals to stay always connected. 
Lenovo Unveils New Way for Users to Connect Across Devices, Networks and Borders

Lenovo Unveils TAB3 Mobile Devices

Source: Lenovo

Barcelona – February 21, 2016: Lenovo (HKSE: 992) (ADR: LNVGY) today unveiled the TAB3 10 Business, an Android tablet engineered for business use, and the TAB3 7 and TAB3 8, Lenovo’s first series of family-friendly tablets. The TAB3 10 Business is designed as the smart company-ready, employee-friendly choice, pairing the power and versatility of Android 6.0 with the optimization and services that matters most to business professionals. Offering full support for Android For Work™, the tablet also boasts an array of security and encryption options to help users keep these devices and the work-related data on them safe and secure. 
Lenovo Unveils TAB3 Mobile Devices

Lenovo™ Launches New Travel-ready Windows® 10 Tablet and YOGA™ Laptops

Source: Lenovo

BARCELONA, SPAIN – February 21, 2016 – Today at Mobile World Congress®, Lenovo (HKSE: 992) (ADR: LNVGY) introduced two new consumer Windows 10 PCs: YOGA 710 and 5101 convertible laptops and the ideapad MIIX 310 2-in-1 detachable tablet. We recognize consumers’ need to work on multiple devices for different tasks. For example, they may text on a smartphone, work on a laptop, and read on a tablet. That’s why we designed each of our new devices to either convert or detach into tablet mode, so users can do more with the comfort of typing on a keyboard and the power of the latest generation of Intel® processors, while giving them long battery life2 to leave the power cord at home.
Lenovo™ Launches New Travel-ready Windows® 10 Tablet and YOGA™ Laptops

Protecting Innovation: Update on ITC Cases

Source: Cisco
Earlier this week, Cisco received some welcome news. The U.S Patent and Trademark Office has rejected Arista’s second attempt to invalidate a Cisco patent that was asserted in the ‘945 International Trade Commission (ITC) investigation. This is also a patent where the ITC staff recommended a finding of infringement. We are now looking forward to early March and the public release of detailed rulings in the first ITC case (‘944). We expect the release of two key documents: Final Determination […]Protecting Innovation: Update on ITC Cases

Mobile World Congress: It’s Not Just for Mobile Anymore

Source: Cisco
Here we are, at the verge of what is the 30th Mobile World Congress , in Barcelona. It’s a show I tend to characterize as “the water cooler for telecom,” because everybody is there! Over its impressive and storied history, starting in London in 1987, MWC has consistently served up the “firsts” that ultimately become everyday realities, and indeed necessities — the first mobile phone call, for instance. The first text message, the first tablet, the first app store — even the first […]Mobile World Congress: It’s Not Just for Mobile Anymore

Wave good bye 2 slow WiFi

Source: Meraki-Cisco

On February 9th we announced the launch of the latest access point (AP) to join the Meraki wireless portfolio, the flagship MR42. The MR42 is a 3×3:3 802.11ac Wave 2 AP that ushers in a new era of high performance, more efficient WiFi thanks to  the inclusion of Multi User – Multiple Input Multiple Output (MU-MIMO).

In addition to this, the MR42 continues our strategy of completely integrated beacon and Bluetooth Low Energy (BLE) functionality. This sees the MR42 becoming our most technology advanced wireless platform, with four integrated radios and the latest 802.11 wireless standard, yet all in a sleek low profile design.



MU-MIMO allows wireless networks to more efficiently service the increasing numbers of phones, tablets, and other personal mobile devices. MU-MIMO does this by allowing the AP to communicate with multiple devices concurrently, rather than consecutively.

With Single User MIMO (SU-MIMO) the AP can use the multiple spatial streams to send a large amount of data to clients that can receive all these streams. Devices such as laptops could support two or sometimes three streams, allowing for high speed connections. Unfortunately smaller mobile devices like phones can typically support only one stream, and thus can’t take advantage of this capability.

SU-MIMO-b1MU-MIMO solves the problem of devices being unable to use all these spatial streams. The AP can use the individual spatial streams to send separate transmissions to distinct clients simultaneously. This increases the total network performance and improves the end user experience, especially when large numbers of devices are connected.

MU-MIMO-bThe addition of MU-MIMO complements Single User MIMO (SU-MIMO) rather than replacing it. An AP can choose the best way to transmit: simultaneously to multiple devices as efficiently as possible, or consecutively to individual devices as fast as possible. It is now time to wave goodbye to slow WiFI.

Are you looking for a next generation wireless solution that can future proof your network against the growing demands of your users? Then there is now one clear choice, the cloud managed Meraki MR42 AP. To find out more details you can visit the product page or listen to one of our launch webinar recordings.

Wave good bye 2 slow WiFi