I am thrilled to announce that Cisco IT’s Virtual Events service has been selected by InformationWeek as one of the top 500 technology innovations in the U.S. for 2013. Specifically, Virtual Events came in at #152. It is always gratifying to receive industry recognition – both for the technology innovation as well as visibility for the hard-working IT team behind it. Read More »
One critical factor to stay ahead in today’s dynamic and competitive video market is the agility to deploy new services and hardware fast.
But what do service providers really need in order to be agile?
An open client software is a great start. It provides a core software base so service providers can focus on innovating rather than handling fundamental software components. It is continually enhanced by the developer community and easy to integrate with hardware and software components from third-parties or the open software community.
A fine example of open software for video CPE is the RDK (Reference Design Kit). Originally begun by Comcast two years ago, RDK is evolving into a standardized open software base for the industry. It is enjoying growing support from a broad community of Service Providers, SoC, OEMs, software vendors, and system integrators. It provides a shared set of software components for QAM, IP, and hybrid devices. And it has a modular, layered architecture for easy hardware and software updates.
As an open software that enables agility, RDK ticks all the right boxes.
But to realize that agility—that is, to actually bring new services and platforms to market at a rapid pace with success—service providers need a partner with the right expertise, resources, and software components
What does this entail? Read More »
A long time ago I got asked to write about how to use Fibre Channel over Ethernet (FCoE) for distance. After all, we were getting the same question over and over:
What is the distance limitation for FCoE?
Now, the short answer for this can be checking out various data sheets for the Nexus 2000, Nexus 5500, Nexus 6000, Nexus 7000, or MDS 9X00 product lines. But it didn’t answer the most obvious follow-up questions: “Why?” and “How?”
Problem is, whenever you start talking about extending your storage connectivity over distance, there are many things to consider, including some things that many storage administrators (or architects) may not always remember to think about. The more I thought about this (and the longer it took to write down the answers), the more I realized that there needed to be a good explanation for how this worked.
Generally speaking, the propeller spins the ‘other way’ when it comes to storage distance.
To that end, I began writing down the things that affect the choice for selecting a distance solution, which involves more than just a storage protocol. And so the story grew. And grew. And then grew some more. And if you’ve ever read any blogs I’ve written on the Cisco site you’ll know I’m not known for my brevity to begin with! So, bookmark this article as a reference instead of general “light reading,” and with luck things will be clearer than when we started. Read More »
The software defined network has become all the rage lately for reasons that seem to vary and are caught up in interesting perceptions. One view was that it allowed a single network to be controlled centrally and divided up logically to prevent different groups from interfering with one another, well that’s true. Another view is that it provides a central place of management that configures and monitors the network for performance and faults, well that is true.
The basis is really the separation of the control plane (configuration and management) onto a server that centrally controls many network nodes. From the data plane which are the switches and routers that pass the data for the application from one end device to another, or many. The SDN controller communicates over a secure communications path using an API supported by the network device.
Yet what may be the most significant possibility of SDN is the ability to use programmatic control from the very applications that use the network for transport to stipulate any number of services that application needs from the network. We are seeing this in data centers that will allow end user departments to define a complete network for say ERP from within the ERP application and no help from IT. Why not for controls? And since SDN is based on open source initiatives the ability for anyone to create and market applications for say a controls system is very real. Read More »
On August 15, 2013, Brian Krebs featured a screen shot of a fake Outlook webmail login page used by the Syrian Electronic Army in a phishing attack against the Washington Post. If you look carefully at the location bar, you will note that the domain used in the phishing attack is ‘webmail.washpost.site88.net’.