Avatar

#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking about IWAN deployments with Cisco Communications Architect David Prall. Lauren Friedman (@Lauren) moderates and Sven Kutzer and Rikard Strid are this week’s Cisco Champion guest hosts.

Listen to the Podcast

cisco_champions BADGE_200x200Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco SME
David Prall, @pralldc, Communications Architect

Cisco Champions
Sven Kutzer @svenkutzer, Senior Systems Engineer
Rikard Strid, @rikardstrid, Founder thingk.me, Clayster AB Continue reading “#CiscoChampion Radio S1|Ep 21 IWAN, You WAN, we all WANt Intelligent WAN”



Authors

Rachel Bakker

Social Media Advocacy Manager

Digital and Social

Avatar

Organizations are rapidly moving critical data into the cloud, yet they still have serious concerns about security and other business risks. Read Bob Dimicco’s blog to learn several important steps companies can take to mitigate the risks of cloud services, such as uncovering shadow IT, assessing data security, and instituting cloud-specific employee policies.



Authors

Robert Dimicco

Senior Director

Advanced Services

Avatar

Do any web search on the inhibitors of moving to cloud and you’ll find a primary challenge rises to the top—business risk. The benefits of cloud often outweigh risks, which is why more and more business information is being shared in the cloud. In fact, 50% of Global 1,000 companies will have customer data stored in the public cloud by 2016 according to Gartner.

The rapid transition of critical data into the cloud and the use of SaaS for business processes mean that organizations need to have a solid approach to manage the business risks of cloud.  We have worked closely with customers and Cisco’s own IT department to identify some initial steps that organizations can put in place to mitigate the risks of cloud services with IT governance.

Revise how your company data classification system applies to cloud services. 

Businesses typically have already established a tiered classification system including private, confidential, public, etc. This system needs to be revised to detail what and how information should be shared in the cloud. These policies also need to take into account any regulatory or compliance requirements.

Communicate an employee policy specific to cloud service usage.        

Recently, I was speaking with a large healthcare provider about what policies they had that outlined what employees could share in the cloud. The customer’s IT group believed that a general company code of conduct safeguarded them. However, as the conversation progressed they realized that their current policies were not explicit as to how this applied to cloud.

Employee policies need to clearly outline what can and cannot be shared with approved corporate cloud vendors. For example, even though a vendor like Salesforce.com or Box.com might be approved, an organization may not want certain confidential information to be shared with an outside vendor. Additionally, these policies also need to address personal use of cloud services (file sharing services, for-free email accounts, etc.). These policies need to be periodically communicated to employees as well as how their actions might be monitored to ensure compliance.

Discover and determine the risk profile of shadow IT.

According to a recent Forrester study, 43 percent of respondents believed shadow IT practices were major threats to their respective organizations. It is critical to discover and classify the services being used that have not been approved by IT. Once identified, there are typically three approaches to handling the risks of shadow IT.

1)    Assess and onboard critical cloud applications.

2)    Block risky cloud applications with secure web gateways or data loss prevention solutions.

3)    Monitor applications and as-a-service usage with alerts for unusual activity.

Establish a data security assessment process for new cloud services.

A vital way to ensure that business data is kept safe is to have a thorough risk assessment process as cloud vendors and services are brought on-board. This process should take into account the following five elements:

  • Initiation – Establish what elements of your business a vendor will be involved in and what data will be shared with the vendor. Will they handle confidential/private information or only public data?
  • Data encryption and integration – Test the encryption of data as it passes from the organization to the vendor as well as how the data will be stored at the vendor’s data center. Understand how a vendor would integrate with your systems (creating single sign-on, pull corporate data, etc.).
  • Vendor data security policies Can the vendor uphold the policies for protecting your corporate data based on the classification system defined above, and do so the same way or better than your IT department would? Evaluate the vendor’s disaster recovery plan, compliance and regulatory processes, and identity and access controls.
  • Vendor stability and proprietary policies – According to Gartner, 1 out of 4 cloud service providers will be out of business in two years.   This is largely due to financial instability or acquisitions. Businesses need to ensure that vendors they choose to work with are financially stable. Find out how the vendor would handle your data in the event of a business closure or acquisition. Additionally, do they use a proprietary technology approach that might lock you into using them? Insist that vendors use an open source approach that would help you transition to a new vendor if an SLA was not met or if the vendor was acquired or went out of business.         
  • Ongoing vendor monitoring – Establish a process to regularly review vendors (annually for those dealing with business critical processes, less regularly for those with less impact).

These are some initial steps to managing the business risks of cloud. However, businesses that are looking to reap the benefits of cloud and avoid risk must put in place a lifecycle approach to manage cloud services.

We recently introduced Cloud Consumption Optimization, an annual subscription service that helps customers govern their cloud adoption from end-to-end and continually monitor cloud use. Learn more about how we can help you govern cloud and manage cloud risks at http://www.cisco.com/go/cloudconsumption

 



Authors

Robert Dimicco

Senior Director

Advanced Services

Avatar

During a panel on IoE in Business last week, Stanley Black & Decker announced the results and estimated productivity savings, upside revenue, and risk cost avoidance of a new Connected Factory Wireless implementation conducted with Cisco and AeroScout Industrial. In partnership with AeroScout, we’re excited to share the details on how Stanley Black & Decker has transformed manufacturing operations with IoT.

Visit our post on the IoE Blog where Patrick Gilbert, AeroScout Industrial and I share details about Stanley Black & Decker’s plant in Reynosa, Mexico and best practices that helped Stanley Black & Decker improve labor utilization by 12 percent, increase throughput by around 10 percent, and reduce material inventory carrying costs by 10 percent.

Read the full article Stanley Black & Decker: Connecting Internet of Everything, One Line at a Time



Authors

Chet Namboodri

Senior Director

Global Private Sector Industries Marketing

Avatar

bioShot-sWritten By Wayne Cullen, Senior Manager, Service Provider Architectures

Along with cloud computing, M2M, collaboration, and hoodie sweatshirts, virtualization is a trend du jour. Like all trends, it’s based on an old idea (dating back to the mainframe era) that has now been reimagined for new purposes. One of the newest roles for virtualization is network functions such as those in switches, routers, and network appliances, including firewalls and load balancers—thanks to Network Functions Virtualization (NFV). And this is just the beginning of what is going to be virtualized in your network.

Being a Selective Virtualizer

Virtualization can provide some big cost savings and reduce network complexity. But virtualization is like chocolate. You eat too much and some bad things can happen. The early days of virtualization (when servers were virtualized) provide a cautionary tale. Server virtualization lowered CapEx but led to skyrocketing operational costs because much more complex processes—hence highly-skilled staff—were required.

The lesson: Be selective in virtualizing your resources and functions. And focus your time optimizing your network to lower TCO with a flexible, adaptable infrastructure as part of your virtualization efforts.

How and Where to Optimize Your Network for Virtualization



Authors

Sanjeev Mervana

Vice President of Product Management

Emerging Technologies & Incubation

Avatar

Cisco has a broad base of data center customers with a diverse set of requirements and we meet their needs with Nexus – the most comprehensive switching portfolio in the industry.  This week, we are making announcements for both the Nexus 9000 series and the Nexus 3000 series that provide design and deployment flexibility for our commercial, enterprise, service provider, as well as cloud customers.  Key points of the announcement include:

  • ACI (Application Centric Infrastructure) is shipping this month;
  • Additional linecard and chassis options provide customer choice and flexibility;
  • 100G linecards for the Nexus 9500 will be available in Q4CY14 and will offer the highest density in the industry; and
  • New starter kits and bundles help customers ease transitions.

Nexus 9000 family

The Nexus 9000 Series

 ACI is shipping this month

 The Nexus 9000 series can operate in standard NX-OS mode or in ACI mode. In either case the Nexus 9000 portfolio delivers the value of the “5 P’s” of Power efficiency, Price, Port density, Performance, and Programmability. NX-OS mode provides customers with the value of the NX-OS operating system used by tens of thousands of customers in data centers around the world.  ACI mode adds to NX-OS capabilities by providing an application driven policy model, integration of hardware and software, and centralized visibility, among other things. ACI requires a controller and switch software.  Both are shipping this month. It is important to note that the pricing for this solution is simple and predictable.  There is a perpetual license for each leaf switch.  Other pricing approaches in the industry are monthly and are based on varying elements like number of VM’s.  Comparing the two approaches is somewhat like comparing a cell phone bill that is either flat rate or usage based.  Personally, I like the simplicity and predictability of flat rate.  See The Future of Networking, as well as SDN and Beyond  for additional details on new ACI announcements and how they can take you beyond SDN.

Additional linecard and chassis options underscore flexibility

We’ll consider how flexibility is delivered for both modular and fixed platforms.  For modular switching, the Nexus 9500 modular chassis family offers different line card options that can be mixed in the same chassis and allow customers to “dial up” or “dial down” their design based upon the price, performance, feature set, and scale they want to achieve.  There are basically 3 different ‘flavors’, all of which are now shipping:

  1. The Nexus 9500 X9400 set of 1/10G and 40G line cards are based on merchant silicon and provide industry-leading price and performance compared to other merchant silicon switches. These provide a very cost effective solution ideal for traditional modular data center designs.
  2. The Nexus 9500 X9500 set of 1/10G and 40G line cards are sometimes referred to as “merchant plus” because they have custom Cisco ASICs, in addition to merchant silicon, and are ideal for customers that need performance together with additional buffering and VXLAN routing capabilities. The X9500 line cards can be used in future ACI designs as well.
  3. The Nexus 9500 X9600 set of 40G line cards provide performance without compromise even for small packet sizes.

The Nexus 9300 series offers ACI capabilities (ala the X9500 linecards in item 2 above) in a fixed form factor.  For customers interested in a merchant only fixed form factor, we offer the Nexus 3000 family.  This week, we announced the new Nexus 3164, which provides 64 ports of 40G and is a great solution for 40G access or space constrained aggregation.

100G linecards

We are also announcing 100G linecards that we believe will deliver industry leading port density of up to 128 ports of 100G in a single chassis.  100G for both the X9400 and X9600 series will be available for the Nexus 9500 in Q4CY14.  Cisco will offer an 8 port 100G X9400 line card and a 12 port 100G X9600 line card.

New starter kits and bundles ease transitions

There are numerous packages available to ease transitions – from 1G to 10G, 10G to 40G, or from traditional networks to ACI.  There are 2 bundles I want to quickly call out.  The first provides a smooth transition for customers with older End of Row Catalyst 6500’s in their data centers.  It occupies the same rack space and uses the same cabling as they currently have, but provides 10X the performance.  The second is basically an ACI starter kit, providing the APIC, spine switches and leaf switches, even optical cables – everything required to set up and get started with an ACI pod.

In summary, Cisco is continuing its rapid pace of innovation and execution around ACI and data center switching overall.  Ultimately, this means customers gain choice, flexibility and true innovation to support their business needs.



Authors

Craig Huitema

No Longer with Cisco

Avatar

Every year a new attendance record is set at Mobile World Congress by networkers participating from over 200 countries across the globe. This grand attendance of industry-defining vendors, technology enthusiasts and exhibitors triggers an explosive growth in the number of Wi-Fi capable devices being brought to the event. For MWC 2014, Cisco partnered with Fira Gran Via and GSMA to pull off one of the most successful high density Wi-Fi network deployments in the history of global tech events. This blog kicks off a series to provide a glimpse of behind the network, into the design stages, and the course of actions undertaken to implement a robust high density wireless network which served more than 22,000 concurrently connected unique devices and a total of 80,880 devices throughout the event. Full details in whitepaper here.

Setting the Scene

Divided into eight massive exhibition halls, Fira Gran Via covers around 3 million square feet (280,000 square meters) of area which also includes outdoor areas, restaurants, conference rooms, network lounges and a continuous elevated walkway flowing through the entire venue. Higher the environmental complexity, the more fun and challenging it is to achieve the right wireless design for a pervasive network that meets all the needs.

An aerial view of Mobile World Congress 2014 arena at Fira Gran Via, Barcelona
An aerial view of Mobile World Congress 2014 arena at Fira Gran Via, Barcelona

Generally, the physical design of large convention and exhibition halls bear an impish knack of unfavorable conditions for a ubiquitous high density Wi-Fi network, owing mostly to the lofty ceiling heights and construction components. Continue reading “Behind the WiFi Network @ Mobile World Congress 2014: Setting the Stage”



Authors

Shivesh Ganotra

Technical Marketing Engineer

Enterprise Infrastructure Solutions Group

Avatar

Blog authored by Chet Namboodri, Cisco and Patrick Gilbert, AeroScout Industrial

Last week, at an Internet of Everything event in Chicago, Cisco and its partners showcased how an increase in connected devices is improving lives and businesses in both private and public sectors. From connected energy to more efficient hospitals to smart cities, the Internet of Everything (IoE) is producing real, transformative results. Amongst industries—even considering all of the existing automation and controls implementations from the last 50+ years—manufacturing has the most potential for growth and development by connecting the unconnected, estimated by Cisco to have nearly $4 trillion in IoE opportunity value at stake through 2022.

During a panel on IoE in Business, Stanley Black & Decker announced the results and estimated productivity savings, upside revenue, and risk cost avoidance of a new Connected Factory Wireless implementation conducted with Cisco and AeroScout Industrial. Stanley Black & Decker, headquartered in New Britain, Connecticut, is a leading global provider of hand tools, power tools and related accessories, mechanical access solutions, electronic security and monitoring systems, and products and services for industrial applications. They’re generally familiar to anyone who’s ever tried their hand at remodeling or handiwork. In 2005, Stanley Black & Decker opened a new plant in Reynosa, Mexico, to manufacture dozens of products, such as jigsaws, planers, cordless drills, floodlights, and screwdrivers for the DeWALT brand and lawnmowers for the Black & Decker brand.

https://www.youtube.com/watch?v=qec9L_uMqH0 Continue reading “Stanley Black & Decker: Connecting Internet of Everything, One Line at a Time”



Authors

Chet Namboodri

Senior Director

Global Private Sector Industries Marketing

Avatar

In part one of this series we covered the internals of HDDs, in part two we went over the internals of SSD, In part three we continue reviewing storage concepts to refresh or learn the right lingo.

Lets start by understanding “Redundant Array of Independent Disks” (RAID). There are RAID levels like RAID0 and RAID1 that are easily to understand and others like RAID5 and RAID6, which many sysadmins misunderstand.

Redundant Array of Independent Disks (RAID)

In the past RAID was also referred as a “Redundant Array of Inexpensive Disks”.  At the end of the day Continue reading “Decoding UCS Invicta – Part 3”



Authors

William Caban-Babilonia

Senior Cloud Architect

Cisco Champion