This week we’re back on Engineers Unplugged with special guests J Metz (@drjmetz) and Francois Zimmerman (@francoiszim), who discuss Flash Acceleration and the recent CVD release (Cisco Solution for Hitachi Unified Compute Solution) on the topic. Great discussion about how flash storage is changing the conversation, from the tech and business perspective:
What are you seeing in the industry? Agree or disagree, post a comment, send a tweet, follow along using one of the methods below!
Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
Episodes will publish weekly (or as close to it as we can manage)
My team maintains and supports Cisco IT’s internal implementation of the Cisco WebEx Social collaboration platform. Cisco employees use WebEx Social for internal collaboration and knowledge sharing in online communities, and as a central repository for documents, videos, and other information resources. Read More »
In one of my earlier blogs, -- “How to get more SAN mileage….” -- I had highlighted how one can deploy End-to-End FCoE using a converged Director-class platform, like Nexus 7000, connected directly from the converged access switch, like UCS FI, in order to get the utmost agility. Well, this is how ITOCHU Techno-Solutions Corporation (CTC), a Cloud Service provider, deployed its network to get significantly higher mileage.
CTC provides a wide range of IT services for business customers in Japan. The company’s Cloud Platform Group recently launched its innovative ElasticCUVIC shared private cloud service, which helps customers reduce infrastructure cost and management complexity. With large numbers of VMs, CTC wanted to simplify its data center architecture and IT management while optimizing scalability. The challenge was to deliver high-performance, easy-to-manage cloud services at scale.
The company evaluated several storage networking solutions and turned to Cisco for Fibre Channel over Ethernet (FCoE) solutions, which greatly simplify the infrastructure and management. CTC built its two newest data centers in Yokohama and Kobe with ultra-high performance and flexibility in mind. CTC implemented an End-to-End FCoE architecture using Cisco Nexus 7000 Series Switches, Cisco UCS servers, and FCoE connections between the switches, servers, and FCoE storage arrays.
With the converged FCoE architecture, ElasticCUVIC is enabling CTC customers to gain Read More »
Discovering a breach where ePHI has been stolen certainly falls into the ‘not a good day at work’ category. It can be catastrophic for some, especially if the compromise occurred months ago and wasn’t detected. Or if a 3rd party discovered the breach for you, which occurs more often than we think, 47-51% from 2010 – 2012 based on the Ponemon Institutes 3rd Annual Benchmark Study on Patent Privacy and Data Security.
On our list of 9 HIPAA Network Considerations, we are onto topic #8, Breach discovery times: know your discovery tolerance.
Breach discovery times: know your discovery tolerance
Your business associate(s)must be tracked
From the 2013 Verizon Data Breach Investigations Report, two thirds of the compromises were not discovered for months, or longer. What is your tolerance for “not knowing?” Can that discovery time tolerance be justified through reasonable due diligence, or are you back at the “ignorance is bliss” phase (blog #4), which could be interpreted as Willful Neglect in the case of a breach of PHI?
Source: Verizon 2013 Data Breach Investigations Report
When we think of the term “collaboration” we can often get trapped in the cycle of thinking that it only applies to IT departments and the bottom line. However, it’s important to consider how the role of the enterprise is shifting thanks to the consumerization of IT. For example, how can IT leaders satisfy new user demands while unleashing the power of a sound mobile strategy?
With today’s technology-driven global economy, enterprise mobility and collaboration tools need to be about connecting communities, not just companies. Never has there been a time when more business processes extend beyond headquarters. Organizations need to enable all types of connections: From the mobile worker to the teleworker, from other businesses to target consumers, from traditional branch offices to the cloud. This any-to-any type of collaboration is no longer keeping the enterprise at the center. Instead, the future is driven by all types of users.
It’s clear that users expect to collaborate anywhere, on any device, with any workload. They want to collaborate like they’re in the office regardless of their location. IT leaders must keep user demands top-of-mind when working to deploy a BYOD policy. This can create challenges and opportunities in five key areas: