Cisco Blogs

Cisco Blog > Data Center and Cloud

What is Infrastructure Programmability?

The programming of network resources is not just a trend, but also a way to future-proof IT and business needs.

This blog series examines how infrastructure programmability is providing a faster time to competitive advantage and highlights the differences between programmable infrastructure and traditional infrastructure, and what programmability means for your entire IT infrastructure.

To read the second post in this series that discusses benefits of network programmability, click here. To read the third post in this series that discusses how IT leaders can embrace this change, click here.

The proliferation of devices and applications has increased the complexity of traditional IT infrastructure. The complexity arises from manually managing the infrastructure box-by-box that is slow and error-prone.  The adoption of cloud computing has compounded the problem with on-premises and off-premises resources. As a result, IT leaders have to allocate critical resources to maintain and troubleshoot these systems. In a recent whitepaper, Zeus Kerravala indicated that 83% of IT budget is used to simply maintain the current operating environment. This leaves precious few resources to invest in business-enabling innovation.

At the same time, business leaders are demanding their IT infrastructure to provide them with a faster time to competitive advantage. Quick time to market is paramount in a world where a new competitive advantage might only last a few months or even weeks. And, as if these challenges are not enough, new cyber-attacks not only threaten innovation but can also threaten the organization itself.

Infrastructure programmability is providing a faster time to competitive advantage.

Infrastructure programmability is providing a faster time to competitive advantage.

Programmability to the rescue

Infrastructure programmability provides the ability to control and change the functions of IT infrastructure. Let’s take a closer look.

Read More »

Tags: , , , , , , , , , , , , , , , ,

The Future of Wireless: Times are Changing Before Our Eyes

We live in amazing times, ask anyone who ever had to look up a phone number in a phone book. In the past this was the only way you could find the number to your favorite restaurant if you wanted to make a reservation. Today, all we need to do is reach into our pocket or purse and grab our mobile device, open an application and in a few seconds (not minutes) we have the phone number. Not only that, but we can see the menu and make a reservation right from the device. Over time we have become dependent on carrying the world (both personal and professional) in our pocket. With mobility, we are always on, always connected: nothing—whether it’s your team’s latest score or that email from a vendor you need to send to your boss—is more than a quick search away.

What once seemed unfathomable, this way of always being connected is now commonplace. However, as the application developers sit and think of the next killer app, the IT team has to make sure the network can not only support this new app, but also assure the performance meets the higher and higher demands of new apps. This requires the network to be more application-aware. And the reality is that more applications that require higher network performance are coming at a faster rate. Add to it new devices that use these applications are becoming accessible to everyone. On top of that, the people that use these applications and devices are becoming more demanding in terms of reliability and experience. So what is an IT person to do?

“We were ahead of the times,” says Joseph Tufano, VP and CIO of St. John’s University. “But times have changed. You see it everywhere: for example, if you go to a basketball game on campus, and there’s a timeout, everybody is using their mobile devices.”

IT is always working to increase the wireless performance of the network. However, as more bandwidth becomes available, users increase their usage and consume that bandwidth. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cisco’s 802.11ac Portfolio Expands with the New Cisco Aironet 2700 AP

As a Product Manager there is some anxiety but more of an excitement around introducing a platform to the market. Today I am proud to be part of Cisco team that is  bringing to market the Cisco Aironet 2700 Series Access Point.  What it offers is a tremendous amount of power at a very attractive price point.  


We all know Wi-Fi is here to stay and is expanding all around us rapidly. That need for speed is exciting.  But what does that mean? Not everyone feels comfortable being on the cutting edge. Many of our customers are not as concerned about chasing the future and have more limited budgets that they hesitate to put down for the best AP knowing there are lower priced options.  At the same time, everyone is aware technology moves ahead with or without you, so they don’t want to give up lot of the new capabilities by going totally to the other extreme of not upgrading at all.  What they want is something that’s going to last for a while that gives them the advantages available today, but not have to invest a lot to get it. I equate this to buying something like a car.  A year ago when I was in the market to buy a new car I didn’t want to sacrifice whole lot of options but if there was one or two options that I could give up in order to save a bit of money, I was okay with that.

This is similar to what Cisco is offering with Aironet 2700 Series.  Customers have to choose something that they can utilize in their network that is better than any of the competitive solutions out there, truly built-for-purpose, sleek design on the outside yet tough on the inside and very powerful. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Not All 802.11ac AP’s are Created Equal: Built-for-Purpose vs. Purpose-Built

As more and more 802.11ac devices come to the market this year, businesses need to make sure the best possible 802.11ac wireless infrastructure gets deployed to make sure those 802.11ac end points are performing at both the best possible data rates and application throughputs to maximize the move to  802.11ac.

Cisco’s Aironet 3700 with HDX Technology does just that. If you’re thinking that the 3700 is just another 802.11ac AP,  think again: not all 802.11ac AP’s are created equal.

To demonstrate this, let’s take a Cisco 3700 access point..


When you open a Cisco AP, you will see dedicated memory (RAM) on the radio chipset itself (one on the 2.4 GHz radio, another on the 5 Ghz radio) to ensure the RF packets get processed “onboard” each radio instead of “offboard” in order to reduce latency and any packet processing collision from memory contention on the AP. Additional packet processing can be handled  on the “offboard” memory that is part of the network processor portion of the AP platform as well. This unique, innovative ASIC-based Wi-Fi chipset by Cisco exemplifies the built-for-Purpose design, and is the hallmark of Cisco’s 3700 Series AP.


Contrast this with the competitive landscape that claims to be Purpose-Built, but in reality is leveraging off-the-shelf merchant silicon-based 802.11ac WiFi chipsets. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: Navigating Security Threats in a Mobile World

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.

Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.

Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.


Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.

How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.

Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.

To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.

Tags: , , , , , , , , , , , , ,