President Barack Obama has been reelected as the 44th president of the United States. And while he may still be holding on to his treasured Blackberry, most of us are more interested in what technology trends he and his administration will pursue to make public sector agencies smarter, faster and more efficient.
To solidify his commitment to furthering technology, Obama made mention of it in his victory speech:
“But despite all our differences, most of us share certain hopes for America’s future; we want our kids to grow up in a country where they access to the best schools and the best teachers. A country that lives up to its legacy as the global leader in technology and discovery and innovation. With all the new jobs and new businesses that follow.”
So looking at Obama’s track record and guarantees, what should the public sector have its eyes on? Take a look at the four technology trends identified by many as likely second-term priorities: Read More »
What’s wrong with running my campus network on Gigabit Passive Optical Network (GPON) technology you ask?
Let me count the ways!
I was just reading a White Paper by Nick Lippis of the Lippis Report entitled, “GPON vs Gigabit Ethernet in Campus Networking” that lays out the issues pretty well in my opinion, and concludes up front that GPON is “suited to niche applications” and that “many GPON assertions and claims are overstated.”
Nick does a nice job of contrasting the two approaches, a last mile SP technology (GPON) that might be a good choice for the home & kids, with a Highly Available Ethernet Design that should be used to run a real business.
I’ll leave it to you to read the details, but he covers facts on all the key areas from power consumption and cabling costs to network scaling, single points of failure, and troubleshooting capabilites.
All this adds up to GPON being a poor choice in the Campus when you look at the Total Cost of Ownership (TCO) even though the initial acquisition costs might be lower for the hardware itself. When you look under the covers, the real price is quite high for GPON in terms of a “lack of flexibility, greater power consumption (certainly not green), limited network capacity, upgrades are system-wide events, troubleshooting tools and skilled technicians are limited and lacking, and multiple single points of failure exist.”
He goes on to say, with the Ethernet market being tens of billions of dollars, research and development is assured while competition privdes the motivation for innovation and feature enhancement. An Ethernet campus network is a safe investment.”
Have you heard the news? 3D versions of the Star Warsmovies will begin rolling out in 2012. I know some sci-fi geeks…ah, friends…who can hardly wait.
Me, I prefer Force 3. I like to think of them as the living, breathing version of Star Wars. No Darth Vaders, no jittery C-3POs, but plenty of Luke Skywalkers—regular “heroes” intent on designing technology solutions with a relentless focus on meeting their customers’ business needs.
But what really grabs my attention in their video below is that Force 3 gets it, they truly do. As a thriving Cisco Master Partner, pushing products isn’t on their intergalactic radar— it’s not even within low-earth orbit.
So if it’s not selling gear, what’s Force 3’s strategy for success? Read More »
The Cisco 5900 Series Embedded Services Routers (ESR) are optimized for mobile and embedded networks that require IP routing and services. They can operate reliably in harsh environments, such as those subject to power surges and extreme weather conditions.
These routers are complemented by Cisco IOS Software and Cisco Mobile Ready Net capabilities. With this technology, they provide highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links.
FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated. The NIST website contains details on the Cryptographic Module Validation Program (CMVP).