Cisco Blogs

Cisco Blog > Data Center and Cloud

Smart Guys doing Cool Stuff with Cisco UCS

One of the great things about working at Cisco is the breadth of really smart, creative people that we get to interact with on a daily basis. We embrace the freedom that allows people to create things that are driven by their passion. One of those areas is in social media, where many people have discovered an outlet to express their knowledge in creative ways.

While we try and aggregate as much of the Cisco-centric goodness on our blogs, we often have employees that want the freedom of using different blogging platforms or combining their Cisco-centric content with personal viewpoints or non-Cisco-centric content. If you’re interested in some excellent in-depth technical discussions about Cisco UCS, I’d suggest following the blogs of the following people that all work for Cisco in our Unified Computing / Data Center organizations, working directly with our customers in the field.

Read More »

vSphere 4.1 support on Vblock

With the introduction of vSphere 4.1 by VMware in June, one of the most common questions to the VCE Coalition is when will it be supported on Vblock. We have always stated that there will be a small time lag between the release of a product-level component and it being tested and certified to run on a Vblock.

ESX 4.1 is now validated for all Vblocks: Vblock 0, 1, 1U and 2 and has been tested in conjunction with PowerPath Virtual Edition and Nexus 1000V.

ESXi 4.1 is supported by EXCEPTION ONLY at this time as Power Path for ESXi will not be available until Q3CY2010. An RPQ process is available for ESXi support if required, but this must be raised using the exception process.

Read More »

FCoE Fact or Foul? Fickle FUD Forces Frustration For Folks

In recent weeks several articles have appeared with respect to FCoE and have been trying to distill some of the technologies for its readers – with mixed success. One of the articles was pretty far off the mark; it prompted me to write the author to offer some corrections and clarification.

At first I thought that the article might have been simply a matter of laziness or FUD, but I didn’t want to jump to conclusions about motives – and I’m glad that I didn’t. In a very thorough email outlining where the author got his information I can not only fathom how he came to understand things the way he did, but also empathize with his frustration as a result.

In short, it’s not his fault. At all. He’s frustrated, and I feel his pain.

Read More »

Will The Real FCoE Standards Please Stand Up

Earlier this week Cisco made an announcement with partners NetApp and VMware discussing end-to-end FCoE. Not surprisingly, in the storage space this was picked up by quite a few press outlets and retweeted across the Twittersphere. Unfortunately, many people – the press included – started throwing warnings up about how FCoE standards weren’t done, trying to throw a heavy douse of cold water on a very solid announcement.


As a result, in this, my inaugural post as a Cisco blogger, it wasn’t very difficult to try to come up with a topic that was both important and topical. Obviously, there is a huge misunderstanding about the standards process, particularly when FCoE is concerned. There’s more FUD thrown around than you-know-what in a monkey cage.


The problem: most people would rather gouge their eyes out with a grapefruit spoon than think about FCoE standards.


While the ostrich approach may seem like the path of least resistance, the downside is that in this case, what you don’t know can hurt you. Plus, you get sand up your nose.

Read More »

Network-Centric Architecture – Backbone to Secure Cloud Delivery

Since the modern network security era begin in late 2001 with NIMDA and Code Red, I’ve been observing how to protect against threats and vulnerabilities to the enterprise across my professional experiences with dedicated security appliance vendors such as Fortinet and ServGate, and more recently in my strategic marketing role within Cisco’s enterprise services customer segment.  Clearly, protecting the network at the edge and devices internal to the network has been challenging enough.  Now, with the movement to virtual or cloud-based computing, this trend even further complicates the need for multi-layers of defenses at all access points into the cloud, both egress and ingress.

The legacy architecture of today’s information and communications technology (ICT) infrastructure unnecessarily increases overall management costs and complexity.  Accordingly, ICT infrastructure is now moving toward a service-based consumption model often referred to as enterprise cloud services.  This new model requires a fresh, contemporary way of thinking about both the underlying technology and the way ICT is delivered to ensure customer success.

Read More »