More than two months have passed since Superstorm Sandy devastated communities and lives in the eastern United States and the Caribbean.
But Jim Killoran, executive director of Habitat for Humanity of Westchester, still shows up at 6 a.m. every day to lead dozens of volunteers who have come to the Rockaways in Queens, New York, to help families clean, repair, and rebuild their homes.
Jim Killoran of Habitat for Humanity of Westchester surveys damage in Breezy Point section of the Rockaways.
Read More »
Tags: breezy point, Cisco, emergency, habitat for humanity, hurricane, relief, rockaways, Sandy, superstorm, westchester
Is the product safe to use? I have been asked this question on occasion in a non-technical sense and maybe you have too. In a technical context, I could frame the question as “Are the online services and underlying technologies supporting my services safe?” A continuous effort must go into substantiating the preferable answer (“Yes”) that we are looking for, both prior to and after releasing a product or service into the wild. Security Intelligence Operations (SIO) includes a team of network security experts that form the Security Technology Assessment Team (STAT). They provide security assessment expertise across Cisco’s product and services organizations. In this article, I elaborate on their role and how they complement product and services organizations at Cisco in helping to protect you, our customer.
In the not-so-distant past it used to be that the majority of notoriety around product security was focused more around physical aspects. For example, a manufacturer announces a product recall about a defect (i.e. vulnerability) that could cause potential physical harm or worse. Fast-forward to today where computing devices and associated Internet plumbing comprise an entirely distinct category of product security needed. Within that category, I would also suggest that services and the underlying supporting infrastructure would also fall into this category in the ongoing quest for achieving network security. I think that this quote from a U.S. government hearing underscores the value of that quest as well.
“When we bring in new technologies, we bring in new exposures and new vulnerabilities, things we really haven’t thought about. It takes a little while before we understand it, and after a while we begin to secure it. But our mindset needs to change. This is not the same as industrial technologies or new ways of doing aircraft or cars. These technologies are global and they expose us globally, literally within milliseconds.”
House of Representatives Hearing on Cybersecurity: Emerging Threats, vulnerabilities, and challenges in securing federal information systems
Business units and quality assurance groups at Cisco apply multi-level security processes throughout the development of products and services to ensure that security is embedded into everything that is ultimately delivered to customers. For example, Cisco’s secure development life cycle (SDL) provides a highly effective process in detecting and preventing security vulnerabilities and improving overall system quality. Cisco SDL has several elements that include, but not limited to, source code analysis and white box testing that feed into the security posture of a product or service. Cisco has a security advocates program, a virtual community of people who understand network security and secure product development (and testing) and who can share and evangelize that knowledge with their peers, their colleagues, and their management.
Read More »
Tags: Cisco Security, Cisco Security Intelligence Operations, cisco sio, cybersecurity, secure software, security to of mind, vulnerability
Video collaboration and telepresence technologies will play an increasingly important role in transforming the delivery of education.
“Telepresence expands the learning environment by offering students a virtual window on the real world, by reducing administration costs so more can be spent on teaching, and offering increased equity of access to learning for all.”
Antoniette Guglielmo, Ph.D.
Distance Learning Educator
Los Angeles County Museum of Art
We are pleased to introduce an important new paper from California State University, Monterey Bay (CSUMB) entitled, “Facing the World: Telepresence in Education” that provides practical guidance for educators to effectively plan, implement and realize the benefits of video collaboration in K-20 classrooms.
Read More »
Tags: collaboration, higher education, TelePresence, video
As 2012 came to a close, I found myself looking back not only on the events of world at large but also on just how much progress we have made here at Cisco with the Cisco VXI Smart Solution. I took a moment to reflect on the incredible value VXI delivered to our customers last year.
Since its inception in 2010, the Cisco VXI Smart Solution has been at the center of successful virtual desktop initiatives. VXI brings together compute and collaboration in a complete solution and lets people seamlessly experience their desktops anywhere--on any device. I am very pleased to say that we have more than 1,000 VXI customers and that number is growing. With every new release, VXI has evolved with innovations that maximize performance, scalability, security and user experience while minimizing complexity and risk.
In 2012, we delivered major enhancements across the solution. We introduced optimization that reduces storage costs--often one of the biggest investments in a desktop virtualization program. We have enhanced data center performance and scalability with the remarkably successful Cisco UCS, or Cisco Unified Computing System. Now customers can easily scale from 500 to 29,000 virtual desktops on a single system by simply adding blades. The advantage of these performance enhancements becomes very obvious when large user groups are logging on at the same time—just imagine a call center at 8 am on a Monday.
Security is always at the top of the list for any organization thinking about virtualization. In 2012, Cisco VXI enhanced security for end users with support for Cisco AnyConnect VPN and single sign-on with Citrix Receiver. Security policy was also improved with integration of Cisco Identity Services Engine (ISE) into the solution. ISE gives customers greater control with policy-based security services for both corporate and employee devices, protecting organizations from data loss, compliance issues, loss of revenue and brand damage.
The VXI Smart Solution has always been a leader in user experience for desktop virtualization. We pioneered a new collaboration architecture for voice and video by eliminating the primary cause of poor quality in virtual desktop environments--namely the hairpin effect. We went even further this year by integrating Cisco Wide Area Application Services (WAAS) Software, which reduces the amount of bandwidth needed to deliver workspace traffic over the WAN by up to 70%. Now, people are able to collaborate with voice and video calling on their virtual desktops – or as we like to call it– the Unified Workspace.
Complementing the VXI technologies are comprehensive design guides, services, support and our technology partner ecosystem. The Cisco Validated Designs (CVDs) for VMware and for Citrix give our customers an end-to-end blueprint for implementation and they are updated with every release to facilitate success. To further assure a premium experience and exceptional flexibility, we have expanded our ecosystem of technology partners to include smartcards, endpoints and accessories.
While it gives me much satisfaction to reflect on the past 12 months I am even more enthusiastic about what’s in store for VXI in 2013. Right off the bat, you’ll hear about the next chapter in the evolution of the VXI Smart Solution with our upcoming announcement. Join us on January 17 to learn what’s new.
Tags: Cisco AnyConnect, Cisco Borderless Networks, Cisco Data Center, Cisco Identity Service Engine (ISE), Cisco UCS, Cisco Unified Computing System, Cisco Validated Designs, Cisco Virtualization Experience Infrastructure, Cisco VXI, citrix, collaboration, virtualization, VMware
Today many look to SDN as the next big revolution in Networking. But why is there such hype? What radical change in the economics of networking will shift the industry? The answer is Virtualization.
Virtualization’s growth is still in its infancy, and many aspects remain unexplored. Still there are aspects of which we are certain:
- With an explosion in the number of Virtual devices, it is unaffordable for humans to remain in the loop for routine network operations.
- Emerging business models are not achievable when (slow) humans are involved in the provisioning process. Read More »
Tags: API, IRS, ONE, onePK, OpenFlow, operations, OSS, SDN, virtualization