Avatar

Cisco Live 2014 is fast approaching in few weeks from now.
This is an important year for Cisco Live as well as Fibre Channel (FC) along with Fibre Channel over Ethernet (FCoE) family of products. For Cisco Live : it is celebrating 25th anniversary on its home ground – Bay area, San Francisco. For Storage Market, Next Generation MDS product family lineup with 16G linerate FC and 10G FCoE support has renewed the energy in SAN industry with large customers building Green field Datacenters using new 16G FC and 10G multihop FCoE. This year has seen lot more traction on multihop FCoE; new set of customers now include Aerospace, Financial and Technology solution companies.
More details can be found here under Case studies.

BhavinyadavI asked Bhavin Yadav, from the engineering team, to bring his technical  expertise and knowledge of the customer’s needs  to help us create a catalog of the sessions you don’t want to miss at Cisco Live San Francisco .

“This year at Cisco Live, we have lot more focus and sessions on both SAN technologies – Fibre Channel (FC) and Fibre Channel over Ethernet (FCoE). Once the registration is finished, you can subscribe to the sessions and put it on your calendar as well. The Cisco Live Smart Mobile apps launching on April 28th will also help us drive to the right session using our smart phones.
In April 2013, a little while before last year’s Cisco Live 2013 in Orlando, Storage business unit of Cisco released its next Generation Fibre Channel Director class switch MDS 9710 and Multiservice Fabric Switch platform MDS 9250i. By now, most of us know that MDS 9710 is designed to support 16G linerate FC and 10G FCoE using its FC and FCoE Linecard modules. MDS 9250i is a 2 RU switch that gives us all the flexibility we need in terms of multi-protocol support, whether it is FC / FCoE / FCIP or ISCSI. MDS 9250i has 16G FC Line rate ports with 10G FCoE, 2 x 10G FCIP ports along with iSCSI support as well. This is like a Swiss army knife – you can use it anywhere (backups, storage migration, etc.) for any of the mostly used protocols (FC, FCoE, FCIP, ISCSI) in Fibre channel industry.

This year, we are bringing in more than 20 sessions to the storage track in various flavors, ranging from Learning Storage Fundamentals, Design, Deployment, Operation, Troubleshooting, Best Practice, Migration, etc. Let me highlight some of the important sessions for Storage experts. This will help you quickly identify, reserve your spot and get most out of the Cisco Live 2014 for storage focused technology experts.

Storage specific sessions:

BRKARC-1222 – Cisco MDS9000: expanding the family:
This session presents detailed analyses of the new members of the market leading MDS 9000 family, demonstrating their performance, reliability and flexibility. Topics include architectural design and enhanced capabilities of Cisco MDS 9710 and MDS 9250i, their typical use cases and interoperability with the other MDS 9000 family members as well as Nexus switches. This session is designed for storage engineers involved in FC and FCoE network design and Data Centre storage architecture. An understanding of FC switching technologies and FCoE benefits is assumed.

2 hours Technical Breakout – Presented by Adarsh Viswanathan

BRKSAN-2282 – Operational Models for FCoE Deployments – Best Practices and Examples:
Converging SAN and LAN traffic onto common infrastructure enables customers to realize significant cost efficiencies through reducing power consumption, cooling costs, adapters, cables, and switches. FCoE/Unified I/O also provides additional flexibility through a wire-once model that allows ubiquitous access to block storage from all servers.. This session will help customers determine the FCoE operational model for their organization to successfully share a Converged Network between LAN and SAN teams. Best practices, case studies, and configuration examples will be provided, based on experiences with Cisco customers who have successfully implemented FCoE. The session covers operational management for FCoE deployments on Nexus 5000, Nexus 6000, Nexus 7000, Nexus 7700 and MDS.

90 min Technical Breakout – Presented by Jason Walker and Santiago Freitas

Continue reading “Cisco Live US 2014 : Looking Forward to Great Sessions on Storage Networking (FC and FCoE)”



Avatar

Note: The full report can be found here as well as chapter 1.2, “The Internet of Everything: How the Network Unleashes the Benefits of Big Data

The World Economic Forum launched the 2014 Global Information Technology Report (GITR) today, and the annual assessment provides insight into two questions: where will see the next evolution of the Internet take hold, and how can we as a society improve on Big Data?

The report includes the Networked Readiness Index (NRI), assessing 148 countries across 54 different indicators. Finland, Singapore and Sweden again top the NRI rankings, followed by the Netherlands, Norway and Switzerland, with the US rising two spots to 7th. Hong Kong, the UK and Korea round out the top 10. Because the NRI comprehensively measures the level of information and communications technologies (ICTs) development in countries, it provides an early indication of where the next evolution of the Internet will first take hold: the Internet of Everything.

The Internet of Everything is the value from connecting devices, data, processes and people, underpinned by the ubiquity of Big Data applications. Countries leading in the NRI have the infrastructure and policy environment to facilitate the growth of the Internet of Everything. And the NRI also points to specific actions that countries need to take to improve their ICT infrastructure and business environment. While Big Data insights are creating tangible benefits for governments, businesses and citizens, there is more we can do to make Big Data even better by improving networks to facilitate Big Data, as well as addressing critical technology and policy challenges.

Big Data applications are all around us, improving the way we work, live, learn and play. In Spain for example, the municipal government of Barcelona is using data from connected devices and sensors to increase productivity and create jobs, improving the quality of life for all Barcelonés. Devices that remotely monitor water pressure and pipe leakage is saving $58 million per year; Internet Protocol (IP) controlled street lights are reducing annual maintenance costs by one-third; revenue from remotely monitored parking is increasing revenue by $50 million and the data-driven economy has created 47,000 jobs over the last seven years not withstanding the economic crisis. In the private sector, businesses that apply Big Data analytics have experienced 26% improvement in business performance, and harvesting big data for decision-making can increase global corporate profits by 21%.

The ubiquity of Big Data applications is fueled by the fact that IP networks are connecting billions of physical devices and this accelerating volume of data is driven by four major trends:

  1. IP is fast becoming the common language for most data communication particularly for proprietary industrial networks.
  2. Previously unconnected places, people, things, and processes are connecting to networks bringing billions of people and devices online over the next five years.
  3. Existing physically stored information is being digitized in order to record and share previously analogue material, and the digital share of the world’s stored information has increased from 25 percent to over 98 percent over the last decade.
  4. The introduction of Internet Protocol version 6 (IPv6) now removes the technical limit on the number of devices that can connect to the Internet, theoretically allowing for trillions of trillions (1038).

Improving the ability of IP networks to transmit data for processing, as well as enabling networks to create, analyze and act on data insights can accelerate the positive impact from Big Data. Building this capability will require improving network infrastructure, enhancing analytical capabilities and ‘intelligence’ in the network with distributed computing.

There are however, several critical challenges that need to be addressed because these technical and policy issues can either accelerate, or impede, the positive impact of big data analysis as part of the Internet of Everything.

Policy and Technical Issues

For example, robust industry standards are needed for interoperability and economies of scale.  While there are different requirements for critical networks, such as utilities that are closed, and networks connected to the open Internet (for example, those that monitor parking space availability), common standards will allow information to be exchanged within, and among, these networks as needed and appropriate.

Similarly, policymakers must also identify the appropriate balance between protecting the privacy of individuals’ data and allowing for innovation in service delivery and product development. And robust security is needed to reliably prevent hacking and access by unauthorized and unwanted users. In order to ensure a healthy ecosystem where users, consumers, and businesses feel safe in engaging in Big Data activities, network security is essential.

Careful radio spectrum planning is needed to enable wireless machine-to-machine (M2M), as well as people-to-people (P2P) and people-to-machine (P2M), connectivity. Spectrum requirements are going to be heterogeneous and will include narrowband and broadband; short haul and long haul; continuous data transmission and short bursts of data; and licensed spectrum as well as license-exempt spectrum.

These and other technical and policy issues require careful consideration and are discussed further in chapter 1.2, of the 2014 GITR. How the global community tackles these challenges will go far in determining Big Data’s impact on countries, businesses and individuals.



Authors

Robert Pepper

No Longer with Cisco

Avatar

Information Technology (IT) and Operational Technology (OT) networks have historically been completely separate, with users of each living in blissful isolation. But the Internet of Things (IoT) is changing all of that! In the IoT paradigm, IT and OT professionals will need to work together to drive pervasive security across the extended network. The same security tools will need to be applied consistently across the extended network, but with differentiated policy enforcement to account for differences between the two environments.

Read the full blog post to learn more.



Authors

Jeff Aboud

IoT Security Manager

Internet of Things Technologies

Avatar

IoT Double Edged SwordWhen I was in grade school, my best friend had a favorite saying whenever he disagreed with somebody’s observation that two things were really similar. “It’s the same, only different,” he would quip. Though this phrase was mostly intended to be flippant and evoke an emotional response from the recipient, I’ve finally found a topic where his phrase is 100 percent legitimate; IoT security. That’s because when it comes to securing IoT, we’re not talking about a single, homogeneous network, but rather the extended network which comprises both Information Technology (IT) and Operational Technology (OT) environments.

While existing IT networks have included cloud and perimeter security for many years, OT environments have traditionally been air gapped from the Internet, and therefore only required physical security components to ensure a high level of secure access and safety for plant personnel. And since IT and OT networks were completely separate, the radical differences in their approach to security didn’t make much of a difference – users of each simply lived in blissful isolation. But IoT is changing all of that! Continue reading “The Extended Network Requires Security That’s the Same, Only Different”



Authors

Jeff Aboud

IoT Security Manager

Internet of Things Technologies

Avatar

Note: This is the first of a three-part series on Next Generation Data Center Design with MDS 9700; learn how customers can deploy scalable SAN networks that allow them to Scale Up or Scale Out in a non disruptive way.  Part 2 | Part 3 ]

High Speed (16Gbps) and High Capacity (384 Line Rate ports per Chassis)

Data centers are undergoing a major transition to meet higher performance, scalability, and resiliency requirements with fewer resources, smaller footprint, and simplified designs. These rigorous requirements coupled with major data center trends, such as virtualization, data center consolidation  and data growth, are putting a tremendous amount of strain on the existing infrastructure and adding complexity. MDS 9710 is designed to surpass these requirements without a forklift upgrade for the decade ahead.

MDS 9700 provides unprecedented

  • Performance – 24 Tbps Switching capacity
  • Reliability – Redundancy for every critical component in the chassis including Fabric Card
  • Flexibility – Speed, Protocol, DC Architecture

In addition to these unique capabilities MDS 9710 provides the rich feature set and investment protection to customers.

In this series of blogs I plan to focus on design requirements of the next generation DC with MDS 9710.  We will review one aspect of the DC design requirements in each.  Let us look at performance today. A lot of customers how MDS 9710 delivers highest performance today. The performance that application delivers depend

Continue reading “Next Generation Data Center Design With MDS 9710 – Part I”



Authors

Tony Antony

Marketing

Solutions

Avatar

It’s springtime…typically the time of year when you need to purge your house of all the clutter that’s accumulated during the winter. At the same time, spring always reminds me to do some extra sprucing up around the Cisco digital house — and start checking it from top to bottom with renewed vigor.

So I took stock recently and was pleased to see all the heavy-duty spring cleaning improvements we’ve made of late. Here’s a sampling, plus some tips on how to approach your digital spring cleaning regime:

Leverage data and insights.

We took a recent look at the traffic patterns on our Cisco.com menus. The majority of visitors to the “Products and Services” menu were gravitating to a subset of items. So we took the opportunity to do some clean-up and make that menu more readable by eliminating items with low traffic.

For more details on this change, see our blog: “A Simple Update to Our Cisco.com Menus”. Continue reading “How are You Sprucing Up Your Digital Strategy for Spring?”



Authors

Heather Alter

Senior Manager

Digital Engagement

Avatar

Last week at Redhat Summit in San Francisco, Cisco Data center was well represented in speaking sessions, and solutions expo. I saw lots of traffic at our demo booth featuring Cisco ACI with OpenStack. Customers and Partners alike, showed great interest in how Cisco APIC integrates with OpenStack and enriches Data center operations. We showed the powerful capabilities of Cisco’s Neutron plug-in implementation and how workflow functions like, “create network”, “create subnets and vlan”, “create security groups”, etc. can be elegantly accomplished from the Open Stack console and aligned with the APIC object model via the APIC-Open Stack  API integration. View Demo here: http://youtu.be/pWMXTb237Vk

ACI with OpenStack demo
ACI with OpenStack demo

We also presented in two sessions one titled “Deploying OpenStack with Cisco networking, compute, & storage” and the other  “Automating Red Hat Enterprise Linux deployments with Cisco ACI & OpenStack”. We talked about plans to introduce the group policy model from ACI into OpenStack so that  DevOps teams and NetOps teams can streamline and automate their work while focusing on application and tenant needs at a policy level.

Ravi_DeCapite_t_0450_OpenStack_with_Cisco

The benefit will be that the Group Policy Plugin provides APIs to build Application Network Profiles including service chain requirements.  Both OVS and the ACI Fabric then implement the full policy including distributed L2, L3, and security.   ACI also allows customers to separate tenant polices from operation.  The Tenants manage their applications while the ACI admin manages network operations and infrastructure using policy and it’s all done with automation that speeds up your OpenStack operations.

There was also strong interest in the OpFlex protocol, which Cisco announced at Interop a few weeks ago and how it opens up the ACI policy framework to a broad eco-system. We had lots of other demos showing our Open Stack integration, from a UCS, Nexus 1k, UCS Director stand-point, to round off a 360 degree view of our commitment to broad industry initiatives.

I want to shift focus now to two cool videos recorded last week, by the dynamic team of Joe Onisick and Lilian Quan from the Insieme Business Unit, at Cisco. Joe emphasizes “traffic flows within the ACI Fabric, and application of policy”, while Lilian covers the magic behind how “traffic is handled within the ACI fabric” with emphasis on re-route, bounce, ARP flooding avoidance, etc.,

Stay tuned for more videos on the ACI Fabric mode in near future. We also have a slew of whitepapers coming up that will cover the APIC/ACI Fabric innovations. Check out the recently posted APIC Policy Model whitepaper  that walks you through the basics of the object oriented policy model, Spine-Leaf network architecture and its benefits, APIC policy enforcement, Unicast/Multi-cast policy enforcement, concept of end-point groups (EPG) and all related concepts that you would find extremely valuable as you consider a policy based network architecture for your Data center needs.

I will be covering more exciting news on the ACI front, as we approach Cisco Live San Francisco. Stay tuned

Reference Links

APIC Policy Model whitepaper http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-731310.html

OpFlex – An Open policy protocol http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-731304.html

OpFlex – An open source approach http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-731303.html

(ACI-OpenStack demo) http://youtu.be/fYQDvKVg-ag

(Opflex announcement) http://blogs.cisco.com/datacenter/introducing-opflex-a-new-standards-based-protocol-for-application-centric-infrastructure/



Authors

Ravi Balakrishnan

Senior Product Marketing Manager

Datacenter Solutions

Avatar

This two-part blog series discusses the future of wearables and mobility in an #InternetOfEverything world.

Since the dawn of time, humans have been motivated by an innate desire to be connected to each other and to information. Today, we are seeing this need satisfied as the Internet of Everything (IoE) evolves to connect more people, process, data and things than ever before. An essential part of the growth of the Internet of Everything will depend on how mobile devices, connected things and wearable technology adapts and develops to become more aware and intelligent.

Today, the wearable device market is a nascent, but growing market. There are about 160 unique wearable devices on the market, and IDTechEx predicts wearables will grow to a $70 billion market in the next ten years. However, despite its growing market share, many still have limited views of what a wearable is and the innovation these devices will encourage in our mobile-led IoE world.

In this post, I’ll share some thoughts I presented at the recent Wearable Technology Conference that explores how we will soon see wearables move from being just wearable to becoming aware-able through increased contact, connections and context.

Let’s Start at the Beginning…What is a Wearable?

There is a lot of confusion in the industry about what a wearable is and the role it plays in our lives.  For example, advances in exoskeletons for military applications and sports define a wearable as more than just a device for your wrist.

And it’s not just for humans.

Osaka University and the Tokyo University of Agriculture and Technology (TUAT) co-developed a fuel cell that is expected to be used for forming a wireless mesh networks with cyborg insects in emergency situations. In this case, insects can be used for wirelessly transmitting various sensor signals in areas that humans simply can’t go – such as disaster areas or for search and rescue efforts. It may seem a bit crazy now, but connecting these flying sensor insects to the network can create a very interesting, new capability that will challenge our definition of what a wearable is over time.

Why Now – and what’s all the Hype About?

Simply put, the size of technology is shrinking. Technology shrinks every decade about a 100-fold, so while in the mid-80’s we were carrying around a separate music player, telephone and calculator, today we carry all those capabilities into one device: our smartphone. Couple this trend with ongoing advances in microscopic sensors and computers the size of a grain of sand and it’s clear we are just beginning to understand what’s possible for new IoT connections and mobile innovations.

Wearable 2.0: From Wearable to Aware-able

While most wearables on the market today are built to capture WHAT we are doing, they don’t tell us HOW we are doing. We are seeing an evolution of wearables that will focus more on HOW we are doing, and capture insights that can change our lives. For example, while today’s wearable bracelet or watch can tell me my body is moving, it cannot tell me anything about my biological processes – such as my glucose levels or blood pressure.

For this evolution to occur, wearable devices – or aware-able devices – require three things:

Cisco_WearableAwareables - Dave Blog

  1. Contact with your body
  2. Connections with the world
  3. Context by providing relevant information

Let’s take a deeper look at each of these “Three Cs.”

Continue reading “Wearable to Aware-able: Contact, Connection, Context”



Authors

Avatar

While out talking to customers, I’ve continually heard about three fundamental security challenges they are wrestling to manage: changing business models, a dynamic threat landscape, and fragmentation of security solutions.  The 2014 Cisco Annual Security Report estimates there will be a global shortage of over one million security professionals this year alone.  The combination of these challenges has created security gaps, reduced visibility, and led to increased complexity.

We have designed our solution to allay these concerns. Business needs are quite fundamental, but often times you’re better served by having a team of experts work on your behalf. You do not have to worry about assessing the best technology options, retaining the right number of security experts, and constantly staying current with the changing threat landscape. Instead, you can partner with a trusted advisor in a simple cost-effective way. Today we are pleased to introduce Cisco Managed Threat Defense Service, which allows the power of a global operation to watch out for you.

Powered by proven Cisco Security solutions such as Cisco Advanced Malware Protection (AMP), Sourcefire FirePOWER, and Cisco Cloud Web Security, our unique platform includes market leading technology.  Managed Threat Defense uses machine learning algorithms and predictive analytics to detect possible threats in real-time. This approach assumes the cyber-attacks today will not look like those yesterday, and employs heuristics designed to spot anomalous traffic patterns.  Suspected incidents get immediately escalated to a trained Cisco Security Investigator in one of our global Security Operations Centers, where they validate the fidelity of the incident before partnering with your team to remediate.

We know the challenges you face, from difficulty retaining the top security talent to keeping up with the changing nature of threats. So we’ve put together a technology platform designed to deliver the operational outcomes you want coupled with the 24 x 7 expertise required to help stay a step ahead of the adversaries.



Authors

Bryan Palma

Senior Vice President and General Manager

Cisco Advanced Services