Cisco Blogs


Cisco Blog > Architectures and Solutions

Next Generation Data Center Design With MDS 9710 – Part I

 

High Speed (16Gbps) and High Capacity (384 Line Rate ports per Chassis)

Data centers are undergoing a major transition to meet higher performance, scalability, and resiliency requirements with fewer resources, smaller footprint, and simplified designs. These rigorous requirements coupled with major data center trends, such as virtualization, data center consolidation  and data growth, are putting a tremendous amount of strain on the existing infrastructure and adding complexity. MDS 9710 is designed to surpass these requirements without a forklift upgrade for the decade ahead.

MDS 9700 provides unprecedented

  • Performance - 24 Tbps Switching capacity
  • Reliability -- Redundancy for every critical component in the chassis including Fabric Card
  • Flexibility -- Speed, Protocol, DC Architecture

In addition to these unique capabilities MDS 9710 provides the rich feature set and investment protection to customers.

In this series of blogs I plan to focus on design requirements of the next generation DC with MDS 9710.  We will review one aspect of the DC design requirements in each.  Let us look at performance today. A lot of customers how MDS 9710 delivers highest performance today. The performance that application delivers depend

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Evolution towards the Data-Driven Enterprise

Data has always been important for many (if not all) companies. Today however it is becoming increasingly easier to collect data about customers, business transactions, devices etc…, . This data enables companies to (more dynamically) optimize their business models and processes and differentiate themelves from their competitors. Before embarking on a (Big) data strategy it is important to understand what is driving this evolution and what are basic Screen Shot 2014-04-07 at 10.45.42architecture building blocks to take into account when transforming into a more data driven enterprise.

Several trends are fueling the evolution towards a more data-driven enterprise: Price/performance improvements in network, storage and computing and the rise of Cloud computing , make it more cost effective to deploy large IT infrastructures and capture data. New data management technologies and products such as Hadoop (MapReduce) and NoSQL/NewSQL provide scalable and more cost effective solutions than traditional SQL databases for various classes of problems.  The IT consumerization trend results in departments more actively pursuing analytics capabilities. Another important trend is the Internet of Things (IoT): The advent of cheaper sensors and improved connectivity are bridging the gap between the physical and digital world, enabling collecting data from more devices and environments. This sensorization is unlocking the potential to gather enormous amounts of data and details about almost everything.

These trends are creating new challenges and opportunities to harness and understand the data tsunamis, and leverage the analytics for decision making purposes, to better monitor, control, and understand complex systems from business dashboards to IoT eco-systems. Read More »

Tags: , , , , ,

Connected Healthcare: How Mobility Drives Better Care and a Healthier Society

As advancements in mobility continue to accelerate across all industries, one area that appears poised for some of the deepest transformation is healthcare.

Already, we are seeing how mobility adoption in hospitals — along with new personal health-monitoring devices — is enabling better patient care and a healthier society. And all of these breakthroughs dovetail into the revolution that we call the Internet of Everything (IoE) — the explosion in connectivity among people, process, data, and things that is transforming our world.

A great example is Brazil’s Universidade Federal de Sergipe, which is utilizing telehealth technology to provide patients with specialty healthcare. In the United States, nearly 70 percent of surveyed healthcare leaders say that clinicians at their organizations use mobile technology to view patient data, according to a new survey from HIMSS Analytics.

It’s also estimated that more than 17 million wearable bands will ship this year, putting new health-monitoring tools directly in the hands — or on the wrists — of patients. And with the deployment of strong wireless networks, such as the one used by Miami Children’s Hospital, hospitals are supporting a holistic mobile-enabled patient-care experience that is providing strides in electronic health records. Another intriguing breakthough involves devices such as the Scanadu Scout, which makes the handheld medical “tricorder” of Star Trek fame a consumer reality. Such advances are helping doctors, nurses, and patients reduce errors in miscommunication, while cutting costs.

Cisco_HealthcareMobility_Joseph Bradley

It isn’t about just becoming more mobilized; it’s about improving patient care and individual well-being. As Addison McGuffin, vice president of business technology innovation at Health Care Service Corporation, said, “Some of the things we’re looking at is a trend toward technology that is helping patients toward health performance and improvement on a daily basis.”

These examples show how mobility is reshaping the healthcare industry. Yet, according to a recent Forbes article, many hospital administrators perceive a “double-edged sword” when balancing the need to invest in technology with regulatory constraints. This topic also drove conversation at the recent HIMSS conference. At Kaiser Permanente’s booth, they asked the question: “Is Health IT Really Worth It?” With advancements in mobility shaping IT strategy and investments, I’d take Kaiser’s question a step further by asking, “Is Mobility in Healthcare Really Worth It?” Read More »

Tags: , , , , , , , , , , , ,

Are You Ready for Dev Ops and SDN Software Development with Cisco ONE?

April 5, 2014 at 3:10 pm PST

One of the great challenges of SDN – that many in my view underplay – is the change in paradigm from having a vendor deliver your network (hardware + software), to having (potentially) an ecosystem deliver your network – and this ecosystem may require you to develop software to perform network tasks or to integrate various SDN components together.  This was recognized quite astutely by consultant Jim Metzler, which I discussed in one of my earlier blogs“Applications can dynamically request services from the network” is what the SDN evangelists will tell you.  Jim astutely asked “How exactly do they do that?”.  Well ….. the true answer is that either (i) you need to buy [new] apps that do this off the shelf, as it were, or [more likely today] (ii) you need to modify your apps or develop new apps to do this. 

Coding - the New Networking?

Coding -- the New Networking?

So are you ready for procuring apps and/or developing software in your network design team now?  Don’t worry if you say “no”.  Let me first tell you a few customer reactions to this topic, and then let me update you on Cisco Services can help you develop new SDN apps that solve your specific network challenges.

Read More »

Tags: , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.

Cisco_NavigatingSecurityMobileWorld

Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,