Cisco Blogs


Cisco Blog > Perspectives

#CiscoChampion Radio S1|Ep 26 MDS for Small to Cloud-Scale Data Centers

August 28, 2014 at 9:00 am PST

cisco_champions BADGE_200x200#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’re talking with Cisco Product Marketing Manager Prashant Jain, about MDS for Small to Cloud-Scale Data Centers. Amy Lewis (@CommsNinja) moderates and Patrick Swackhammer is this week’s Cisco Champion guest host.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco SME Read More »

Tags: , , , ,

Catalyst 6500 with Sup2T achieves IPv6 Certifications!

January 15, 2013 at 2:20 pm PST

The Global Certification Team is proud to announce that the Cisco Catalyst 6500 series switch with Sup2T has earned USGv6 and ReadyLogo Phase two certifications on IOS release 15.0(1)SY1 and later.  The details of the USGv6 certification can be found here.  LIkewise, the ReadyLogo information can be found here.

The Supervisor Engine 2T is designed to deliver higher performance, better scalability, and enhanced hardware-enabled features. Supervisor Engine 2T integrates a high-performance 2-Terabit crossbar switch fabric that enables 80 Gbps switching capacity per slot on all Cisco Catalyst 6500 E-Series Chassis. The forwarding engine on Supervisor Engine 2T is capable of delivering high-performance forwarding for Layer 2 and Layer 3 services. Supervisor Engine 2T delivers many new hardware-enabled innovations in the areas of security, quality of service (QoS), virtualization, and manageability. The rich feature set of Supervisor Engine 2T enhances applications such as traditional IP forwarding, Layer 2 and Layer 3 Multiprotocol Label Switching (MPLS) VPNs, and VPLS. The Cisco Catalyst 6500 with Supervisor Engine 2T and all the features and the technical advancements establish product leadership in borderless networks as well as data center deployments.  More information on the Catalyst 6500 with Sup2T can be found on Cisco.com

Get up to the minute updates on Cisco product certifications from the official GCT twitter, @CiscoCertTeam!

 

Tags: , , , ,

BYOD on a University Campus: A Student’s Perspective

There is a new generation of college students out there, I would know as I recently was one of them.  Information being at your fingertips is no longer a luxury, it is a necessity.  Professors’ expectations of their students have increased dramatically due to the wealth of information on mobile devices.  Every class I attended leveraged some form of wireless access to the web.  Instant message in response to real-time questions and online submissions are just two of many examples of how network access has been integrated into the education system.  Professors would consistently use online tools such as online drop boxes for projects and web conferencing tools.  According to MarketWire 92% of college students feel a laptop is a necessity, this indicates that the requirement of mobile access at a university is a given and the college experience is defined by the ease of that access. 

Professors are on tight schedules and are generally available only at certain times of the day.  Imagine- wanting to contact a professor during open hours only to fall short because your laptop had difficulty getting any kind of connection.  I remember the frustrations of wanting to revisit PowerPoint presentations on a class website in the library, only to realize that I was sitting by the one window notorious for being a wireless dead zone.  Dorms were infamous for spotty coverage.  Having the dorm room located closest to the access point for best access was purely by luck of the draw.  I was not so lucky.  In my dorm, you would not get any wireless access unless you were sitting right next to the hallway.  That’s why I am especially envious of the students of Colorado University, whose alma mater upgraded to enterprise-class coverage. 

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cisco Catalyst 6500 Momentum [INFOGRAPHIC]

News always gets attention, right? What happens afterward? Does anyone remember the stories? Or, to look at it another way, who buys what we’re selling?

With a presidential election at hand in the U.S., expect the candidates to continue to claim that their opponent has changed his story. If you bought what he was selling before, you’re being asked to buy something different now.

Thankfully, the networking business isn’t an election. And our story for Cisco Catalyst 6500 Series switches in campus core and distribution isn’t changing…

Infographic:  Read More »

Tags: , , , ,

Cisco Catalyst 6500 Series FIPS 140-2 Validated!

May 10, 2012 at 12:22 pm PST

The Global Certification team is delighted to announce that the Cisco Catalyst 6500 has been awarded FIPS 140-2 Level 2 Certification.Certificate  #1717!

The certification covers the following:  Cisco Catalyst 6506-E [1], Catalyst 6509-E [2] and Catalyst 6513-E [3] Switches with Supervisor Cards (VS-S2T-10G or VS-S2T-10G-XL) and Line Cards (WS-X6908-10G or WS-X6908-10G-2TXL)

  • (Hardware Version: 6506-E -M0 [1], 6509-E -N0 [2], 6513-E -S0 [3], Supervisor Card VS-S2T-10G -B0, Supervisor Card VS-S2T-10G-XL -C0, Line Card WS-X6908-10G -A0, Line Card WS-X6908-10G-2TXL version -B0 and FIPS kit packaging (CVPN6500FIPS/KIT=); Firmware Version: 15.0(1)SY1)

Efficiently scale, virtualize, secure, and manage your network remotely with Cisco Catalyst 6500 Series Switches. Offering a high-performance, feature-rich platform suitable for deployment in campus, data center, WAN, and Metro Ethernet networks, the Cisco Catalyst 6500 Series provides a strong foundation for Borderless Networks, so you can connect anyone, anywhere, at any time.

Learn more about the Catalyst 6500 Series on Cisco.com!

FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated.

Tags: , , , , ,