“Difficult to see. Always in motion is the future” – Jedi Master Yoda.
Yoda image credit: www.yodaquotes.net
“Planning for the future can be challenging . To effectively prepare for the unknown it is best to design into any plans, the added flexibility. This is especially true with IT. ” wrote Amit Jain
In a very clear article , published for the NetApp Community , Amit explores solutions to wire your data center storage network once with a flexible network technology that can be re-configured through software to run any storage protocol
Wether you are ready to make the transition from FC to Ethernet or not, Amit suggests elegant architectures which provide maximum flexibility.
He explains on one hand the primary reasons to adopt Multi-hop and end-to-end FCoE, on the other hand the advantages of Cisco 10 Gigabit Ethernet networks with Unified Port (UP), and the new functionalities provided by NetApp Unified Target Adapter (UTA 2), which prepare you for a future transition if you decide to wait .
“Ethernet-based data center infrastructures offer a degree of future-proofing because the physical transport can support multiple protocols and data traffic types, including block and file storage traffic” insists Amit.
To stay ahead of the game, I encourage you to read here the full article, and to check Amit’s series of blogs on customer adoption of end-to-end Ethernet-based Multi-protocol storage networks.
Each week, we’ll highlight the most important Cisco partner news and stories, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:
As always, we all thank you, the Cisco partners, that truly make these awards happen. Your commitment and hard work are what power these awards, and your vision and feedback are what drive the evolution of Cisco programs and tools.
Be sure to check out the awards for this year and give us your thoughts. Read More »
I recently contributed a chapter titled “Advanced Technologies/Tactics Techniques, Procedures (TTPs): Closing the Attack Window, and Thresholds for Reporting and Containment” that was published in an anthology Best Practices in Computer Network Defense: Incident Detection and Response, published by the IOS press. In the chapter, I recommend a number of TTPs that can move the cybersecurity balance of power away from adversaries to infrastructure defenders. Acting on the TTPs I propose—including focusing hard work and clear thinking on network security basics—will pay maximum dividends for the cybersecurity defender.
The book’s publishers have graciously granted me permission to reproduce the chapter on the Cisco website, and you are welcome to read it here. Please take a moment to read it and let me know what you think in the form of comments on this blog post.
Thanks in advance for your thoughts and reasonably well considered opinions!
The paper describes what IoT means for manufacturers today, including some of the compelling business benefits and value from improved connections between people, processes and data. A recent video infographic, ‘Manufacturing Tomorrow’s Possibilities’ produced by Cisco Consulting Services cites some statistics, including how intelligent connections across the value chain resulted in ‘reduction of time to market drives 1.2% bottom line improvement’:
Is the combination of cloud computing and mobility a perfect storm of security threats?
Actually, yes. And you should prepare for them as if there is a storm coming.
As businesses become increasingly mobile, so does sensitive data. In fact, in a recent survey conducted by ESG,
31% of security professionals say that the biggest risk associated with cloud infrastructure services is, “privacy concerns associated with sensitive and/or regulated data stored and/or processed by a cloud infrastructure provider.”
With cloud-based services, it is key to have visibility into applications and provide consistent experience across devices accessing the web and cloud applications. More users are leaving the standard PC behind and engaging cloud applications through a mobile device, making application-layer security and user access security critical. Smartphones and tablets are able to connect to applications running anywhere, including public, private and hybrid cloud applications, opening your data to potential attacks. Security professionals need assurances that their cloud security provider will appropriately secure customer data while ensuring availability and uptime.
The conversation is no longer if you’ll be attacked, but when. And will you be prepared?