Cisco Blogs


Cisco Blog > Data Center and Cloud

Cisco Unified Computing System in Production

May 19, 2009 at 12:00 pm PST

Our ConC TechMinute celebrity, Sidney Morgan discusses the deployment of Cisco UCS in our production environment and how it has improved power efficiency in our Richardson data center. You can also listen to Sidney discuss how we are integrating the UCS into our existing storage environment.

Read More »

Chuck Hollis, EMC VP of Global Marketing and CTO, on FCoE, Virtualization and Cloud Computing

May 15, 2009 at 12:00 pm PST

Cisco will be present at EMC World 2009 and on the web at “Live at EMC World” Bill Marozas ,Cisco Director Storage Networking, took this opportunity to ask Chuck Hollis, Vice -President Global Marketing, and well known EMC blogger tough questions “Chuck Hollis here from EMC. I was asked to “guest blog” for Cisco on a few topics that I found interesting. image I hope you find the questions (and answers!) thought provoking! Q: What is your view of the evolution of the Storage Networking industry? In particular, how do you see the use of transfer protocols evolving in the data center? I think we’re all pretty agreed on the end state of storage networking: Ethernet wins – period. It won’t happen overnight, but the outcome is inevitable, if you think about it. The more interesting questions revolve around the “how” and the “when” of this transition, rather than the final outcome. Right now, enterprise data centers are intrigued about the potential of converged Ethernet data center fabrics for their next generation architectures, and in many cases are building it into their long term plans. As a result, I think you’ll see a healthy co-existence of FC and FCoE for many years – traditional storage networking infrastructure working alongside newer converged Ethernet infrastructure using the same switches, management tools, etc. Very few customers would ever consider a rip-and-replace approach. A related debate is “what storage protocols will we see on this converged wire?”. For us at EMC, this really isn’t a religious debate, and more a case of customer preference driven by specific use cases.

Read More »

Switch Architectures and Highways

Since Cisco first introduced the concept of oversubscribed Fibre Channel modules in the storage networking industry with the MDS 9000 Family, there has been quite a bit of confusion between oversubscribed and blocking architectures, often incorrectly using the two terms interchangeably. I’m going to use a simple analogy with the highway (where I spend too much time on, because of my commuting) to try to explain the not-so-obvious difference. Read More »

Architectural Innovation: A Clean Break from Tradition

When the first automobiles were conceived and designed, it was difficult for some people to take a forward-looking view of this innovation. The term “horseless-carriage” was an attempt to describe this new mode of transportation from a historical perspective.horseless carriageReady for road trials by September 1893, the vehicle built by Charles and Frank Duryea was the first gasoline powered automobile in America. The brothers had purchased a used horse drawn buggy for $70 and installed a 4 HP (horse-power), single cylinder gasoline engine.Just imagine what automobiles would be today, how they would look and function, if product designers and component engineers stayed with the notion that it’s a carriage -- minus the horse? Read More »

The Impact of Virtualization on Wide Area Networks — Part 2

In this posting we’ll move from server virtualization and its potential impact on both WANs and IT organizational structures to desktop virtualization (also known as VDI, or virtualized desktop infrastructure). The emerging set of VDI technologies and solutions has many benefits to offer, many ways to deploy, and even more complexity and interdependency across IT teams than server virtualization. Clearly desktop virtualization adds a new level of complexity to, and new operating models for, IT groups — technology-wise for supporting end users via the network, possible new types of devices used, and a further increased requirement for security. Read More »