In recent weeks several articles have appeared with respect to FCoE and have been trying to distill some of the technologies for its readers – with mixed success. One of the articles was pretty far off the mark; it prompted me to write the author to offer some corrections and clarification.
At first I thought that the article might have been simply a matter of laziness or FUD, but I didn’t want to jump to conclusions about motives – and I’m glad that I didn’t. In a very thorough email outlining where the author got his information I can not only fathom how he came to understand things the way he did, but also empathize with his frustration as a result.
In short, it’s not his fault. At all. He’s frustrated, and I feel his pain.
Read More »
Earlier this week Cisco made an announcement with partners NetApp and VMware discussing end-to-end FCoE. Not surprisingly, in the storage space this was picked up by quite a few press outlets and retweeted across the Twittersphere. Unfortunately, many people – the press included – started throwing warnings up about how FCoE standards weren’t done, trying to throw a heavy douse of cold water on a very solid announcement.
As a result, in this, my inaugural post as a Cisco blogger, it wasn’t very difficult to try to come up with a topic that was both important and topical. Obviously, there is a huge misunderstanding about the standards process, particularly when FCoE is concerned. There’s more FUD thrown around than you-know-what in a monkey cage.
The problem: most people would rather gouge their eyes out with a grapefruit spoon than think about FCoE standards.
While the ostrich approach may seem like the path of least resistance, the downside is that in this case, what you don’t know can hurt you. Plus, you get sand up your nose.
Read More »
Since the modern network security era begin in late 2001 with NIMDA and Code Red, I’ve been observing how to protect against threats and vulnerabilities to the enterprise across my professional experiences with dedicated security appliance vendors such as Fortinet and ServGate, and more recently in my strategic marketing role within Cisco’s enterprise services customer segment. Clearly, protecting the network at the edge and devices internal to the network has been challenging enough. Now, with the movement to virtual or cloud-based computing, this trend even further complicates the need for multi-layers of defenses at all access points into the cloud, both egress and ingress.
The legacy architecture of today’s information and communications technology (ICT) infrastructure unnecessarily increases overall management costs and complexity. Accordingly, ICT infrastructure is now moving toward a service-based consumption model often referred to as enterprise cloud services. This new model requires a fresh, contemporary way of thinking about both the underlying technology and the way ICT is delivered to ensure customer success.
Read More »
We’ve all been reading about Cloud Computing for some time now, and some of you have either been using Cloud Computing services or implementing Cloud Computing within your organizations. In many cases, the interaction of technical people with “Cloud Computing” was either a pay-as-you-go model with a Public Cloud service (EC2, Terremark, Savvis, etc.) or rapid virtualization and automation of their Private Cloud computing environment. At first glance, everything associated with the Cloud experience was great because it satisfied a top requirement from the business …. saving money!!
But as we all know, there are always two sides to every story. In this case, we ask the question, “Is saving money going to make the company leadership happy?”
Huh?? How can saving money not be a good thing for the company leadership?
Read More »
If you look at various businesses across the world, you’ll see that they are facing some similar strategic challenges – such as globalization, innovation, new business models, evolving customer transactions to interactions, environmental sustainability, new partnerships, and the need to reduce costs. To address these challenges, companies are adding rich communication, information and collaboration services and these services are increasingly being delivered by a data center. So, what are Data Centers? Data centers are buildings that house IT resources such as server, storage systems and networking equipment. These data centers typically host a large number of business and consumer applications and data, each running on a dedicated or shared hardware infrastructure. In today’s connected global marketplace, where customers and users expect to purchase products and access services 24×7, datacenters are playing an increasingly important role for successful experience.
In my work in the Cisco Data Center Advanced Services Product Management team, I’ve watched as Data centers have undergone transformation over the past few years to achieve significant savings in time, capital, and energy while increasing flexibility, efficiency, and comprehensive disaster recovery. At the same time, in both Cisco and our customers, I’ve observed how the demand on the next generation Data Center are always increasing and the push for IT organizations to deliver IT services to their customers faster and cheaper has never been stronger. The challenge to optimize how network, storage and compute resources deliver business services has become increasingly complex.
Read More »