Yes, really. I just got back from Cisco Live! Milan where Chris Young, Senior VP at Cisco, spoke to the Cisco security story, Intelligent Cybersecurity for the Real World. The Cisco security strategy addresses many security challenges across a range of attack vectors (network, endpoint, mobile devices, cloud, or virtual). It covers the entire attack continuum with point-time solutions and dynamic analysis of real-time security intelligence. This reduces the security gaps and minimizes the complexity. Not many network providers or pure security players can make this claim. Ask your secure access provider, how do you address the access to the broad range of threat vectors? And when a threat comes in how do you manage it? Read More »
That is it, Cisco Live Milan is over! The “before” of anticipation, seemingly a moment ago, is replaced by the “after” of takeaways and accomplishments for the week. Some passed their CCIE certification, some met a new business partner, but it’s likely that everyone learned something new. I am not an exception.
During the week, I presented at two different technical breakout sessions (BRKRST-2304 -- Hitchhiker’s Guide to Troubleshooting IPv6 and BRKEWN-2666 -- IPv6 on WiFi: You talk too much! NOT anymore) and spent my remaining time working with everyone in the Network Operations Center (NOC) to ensure that IPv6 is a smooth ride for all of the 9,000+ devices on the network. Not only did I learn a lot, but this year at Cisco Live Milan was a year of “firsts” for me.
- For starters, it was the first time I shared details about my experience with large-scale IPv6 WiFi setups with Cisco Live attendees in the form of a breakout session. After talking with attendees, my main takeaway -- Read More »
If you were unable to attend Cisco Live! Milan, or weren’t able to attend all the sessions that interested you, Cisco has made the session videos and PDFs available on the Cisco Live! website. More videos are being added daily and all should be available by February 22, 2014.
The Cisco Live! website maintains a large on-demand library with presentations and video recordings from Cisco Live! events hosted from 2011 to present. After registering, anyone can view the presentations and embedded videos at their leisure. Your Cisco Live! account is not tied to your Cisco.com account, so those credentials will not work!
Exciting new announcements are made regularly at Cisco Live! In Milan, Chris Young, Senior Vice President of Cisco Security, took the opportunity to share that Cisco was opening up it’s TrustSec capabilities to other vendors. In his blog post, Kevin Regan highlights what this means to the community. Read More »
I am not qualified to discuss it much, but can you guess what this does?
ne = NetworkElement("172.16.66.1", "JasonsApp")
conn = ne.connect("admin", "cisco", sc)
intf1 = ne.get_interface_by_name("FastEthernet0/1")
If you guessed that it logs into a switch at 172.16.66.1 and disables interface F0/1 for 5 seconds and re-enables it, then you guessed right.
Let us talk a little about putting the “ability” in programmability. Did I code in college? Yes. Was I good at it? Not really. Dijksta’s algorithm (the actual coding bit) drove me crazy, however, actually using and operating networks quickly became my cup of tea. I became a network geek. Subnets? Awesome! Cisco CLI? Sweet. Using Enhanced Interior Gateway Routing Protocol (EIGRP)? Yay! AVVID? Even better. But I never wanted to see C++ or another “program” again.
Fast forward to 2014. I’m still a networking guy but now I’m seeing code again. The good news is, maybe like you, I hang out with some really cool people. I challenged a couple of them to help me demonstrate program “ability” to networking people on the show floor at CiscoLive Milan…with me as the test subject! Read More »
Cisco’s vision for ‘The World of Many Clouds’™ drove us to a leading position in the Cloud Market:
- Cloud infrastructure equipment sales: Ranked #1 in the industry three quarters in a row by Synergy Research for Q3 2013
- According to IDC analysts and buyer perception, Cisco is an IDC MarketScape “Major Player” worldwide. (IDC MarketScape: Worldwide Cloud Professional Services 2013 Vendor Analysis)
- Cisco named a “Strong Performer” and earns top marks on strategy for strategic vision and roadmap in private cloud software solutions (The Forrester WaveTM: Private Cloud Solutions, Q4 2013, Forrester Research, Inc.)
On January 28, at Cisco Live! in Milan, we announced important extensions to our Cloud Portfolio.
In this fast evolving cloud market, customers require flexible solutions to extend their infrastructure, take advantage of public cloud services and optimize their sourcing options, while maintaining consistent policy and security mechanisms.
Use cases like Test and Develop, Capacity Augmentation and Disaster Recovery require customers to integrate internally sourced services with public cloud and virtual private cloud services. Business leaders are realizing that the use of public cloud services needs be to standardized by IT to manage escalating costs, security risks and compliance requirements.
Enterprises and public sector institutions are eager to embrace a hybrid cloud model, but current approaches offered by large public cloud providers are proprietary and lock customers into their way of consumption. Other hybrid cloud approaches require customer to have a consistent hypervisor environment.
Customers want to make hybrid cloud the new normal, and they expect to do it with choice, consistency, control and compliance.
Our new Cisco InterCloud solution accomplishes all that – it enables bi-directional secure workload mobility to and from any supported or participating cloud provider, is hypervisor agnostic and it works with heterogeneous infrastructures. Depending on your IT and business requirements you can now move your data and applications to the Public Cloud with end-to-end security.
At the same time, Cisco InterCloud allows cloud providers to lower the barrier to public and virtual private cloud adoption, and easily extend their customers encapsulated data center into the public cloud with consistent network and security policies.