Cisco Blogs


Cisco Blog > The Platform

Cutting Through The Techno-Babble

The Cisco Aironet 3600 features the Highest 802.11n performance with Cisco CleanAir™ technology and is the industry’s first 4 x 4 multiple-input multiple-output (MIMO) access point with three spatial streams. It has add-on options for 802.11ac or Wireless Security and Spectrum Intelligence (WSSI) Module and standard 802.3af Power over Ethernet (PoE) .

All right. Who is still awake? Show of hands?

One of the challenging things about working for a technology company is avoiding getting lost in the details.  There’s a time and place for technical specifications, to be sure.  But I believe that most people really want to know “How will all this technology make my life better?”. 

Read More »

Tags: , , , , , , ,

Duct Tape for Cloud: Integration Features of Cisco Process Orchestrator and IA for Cloud

The Cisco Process Orchestrator has very rich integration capabilities, yet we often hear the question, “Does it integrate with…” or “Does it work with” [insert product]. The Cisco Process Orchestrator is a primary component in the Cisco Intelligent Automation for Cloud management solution.

The fact is that in modern environments with modern orchestrators the answer is always yes. The reality is that cloud automation requires a Process Orchestrator tie into a variety of different systems in order to start offering cloud services. Remember, Cloud is an operating model, not a product. This means that to deliver self-service, on-demand services requires all the elements of the service be orchestrated.

Cisco’s internal private cloud is one such example.

The graphic below shows the components in the deployments. You see integration with Cisco UCS, VMware and storage, as you would expect. It also orchestrates IP address management (that IP won’t provision itself), Remedy incident, CMDB, ActiveDirectory (so tenants can log in), image management and a few other things such as Service Assurance.

By the way, the architecture below is Cisco Process Orchestrator provision across multiple Cisco data centers.

Read More »

Tags: , , , , , , , , , , , ,

Next Generation Video-over-IP Solutions Change How Trainers Train

As educators increasingly take advantage of networked video technology to move their traditional classrooms online, there is a growing need for both instructors capable of engaging students in these next generation online classrooms, and skilled networking professionals with the knowledge to meet the growing demand to deploy, support and maintain networked video solutions.

In 2011, Learning@Cisco introduced a Leading Virtual Classroom Instructor course that teaches participants how to prepare and manage a virtual classroom, effectively deliver material online, and use video and collaboration tools to maximize student participation and comprehension.

As the paradigm of education continues to evolve to meet new institutional and business requirements, developing instructional strategies for new virtual education environments based on networked video is becoming key to improving student results. The Virtual Classroom Instruction Specialist training and certification help ensure that instructors have the most comprehensive understanding of the latest video technologies and effective classroom collaboration strategies.

Read More »

Tags: , , , , ,

Happy New Exploit Kits! (I mean Happy Belated New Year!)

January 22, 2013 at 7:44 am PST

It’s only been a few days since we said goodbye to 2012 and we are already seeing what many predicted for 2013: an increase in the creation, enhancement, and usage of numerous exploit kits by cyber criminals. Cyber criminals don’t take long vacations in December. On the contrary, they “work hard” and make lots of money during the holiday season! These criminals are continuously improving their tools to keep up with us (the good guys) and continue enhancing their “money-making machines.” A real-life example is how cyber criminals were able to quickly incorporate the exploits of the recently found Java vulnerability that I described in a post a few days ago.

Exploit kits make it easy for these criminals because they can easily spread malicious software that exploits well-known and new vulnerabilities. New exploit kits are loaded with some of the most dangerous zero-day exploits and other features that allow criminals to increase their profits.

Read More »

Tags: , , , , ,

Deploying onePK Applications

This post expands on my previous posts about what makes onePK better, and the onePK software architecture. Here I focus on the application deployment options onePK makes available.

The deployment options are summarized in the diagram below.

Deployment

Process hosting means that the onePK application is running within a container on the same hardware as the network operating system (NOS). Read More »

Tags: , , , , , , , , , , , , , , ,