Just a quick heads-up--we have quite a few interesting things going on at EMCworld this week, including a session by our Cisco-on-Cisco TechMinute celebrity Sidney Morgan. Listen to Sidney give a brief update on our sessions. Sidney’s session is “Case Study: Implementing Next-Gen Data Center Solutions” on Tues, May 19, 2:45-3:45 pm.We will also have a couple of our bloggers on-site, so definitely swing by the Cisco booth and say hello. While we will not be streaming live from EMC, we will be posting videos taken onsite and blog and twitter posts to our EMC World website at www.cisco.com/go/emcworld09. The videos will be of onsite interviews with Cisco DC execs and SMEs, demo owners, partners, etc.
Cisco will be present at EMC World 2009 and on the web at “Live at EMC World” Bill Marozas ,Cisco Director Storage Networking, took this opportunity to ask Chuck Hollis, Vice -President Global Marketing, and well known EMC blogger tough questions “Chuck Hollis here from EMC. I was asked to “guest blog” for Cisco on a few topics that I found interesting. I hope you find the questions (and answers!) thought provoking! Q: What is your view of the evolution of the Storage Networking industry? In particular, how do you see the use of transfer protocols evolving in the data center? I think we’re all pretty agreed on the end state of storage networking: Ethernet wins – period. It won’t happen overnight, but the outcome is inevitable, if you think about it. The more interesting questions revolve around the “how” and the “when” of this transition, rather than the final outcome. Right now, enterprise data centers are intrigued about the potential of converged Ethernet data center fabrics for their next generation architectures, and in many cases are building it into their long term plans. As a result, I think you’ll see a healthy co-existence of FC and FCoE for many years – traditional storage networking infrastructure working alongside newer converged Ethernet infrastructure using the same switches, management tools, etc. Very few customers would ever consider a rip-and-replace approach. A related debate is “what storage protocols will we see on this converged wire?”. For us at EMC, this really isn’t a religious debate, and more a case of customer preference driven by specific use cases.
Since Cisco first introduced the concept of oversubscribed Fibre Channel modules in the storage networking industry with the MDS 9000 Family, there has been quite a bit of confusion between oversubscribed and blocking architectures, often incorrectly using the two terms interchangeably. I’m going to use a simple analogy with the highway (where I spend too much time on, because of my commuting) to try to explain the not-so-obvious difference. Read More »
When the first automobiles were conceived and designed, it was difficult for some people to take a forward-looking view of this innovation. The term “horseless-carriage” was an attempt to describe this new mode of transportation from a historical perspective.Ready for road trials by September 1893, the vehicle built by Charles and Frank Duryea was the first gasoline powered automobile in America. The brothers had purchased a used horse drawn buggy for $70 and installed a 4 HP (horse-power), single cylinder gasoline engine.Just imagine what automobiles would be today, how they would look and function, if product designers and component engineers stayed with the notion that it’s a carriage -- minus the horse? Read More »
In this posting we’ll move from server virtualization and its potential impact on both WANs and IT organizational structures to desktop virtualization (also known as VDI, or virtualized desktop infrastructure). The emerging set of VDI technologies and solutions has many benefits to offer, many ways to deploy, and even more complexity and interdependency across IT teams than server virtualization. Clearly desktop virtualization adds a new level of complexity to, and new operating models for, IT groups — technology-wise for supporting end users via the network, possible new types of devices used, and a further increased requirement for security. Read More »