Today’s IT organizations are stuck between a rock and a hard place. Most face an avalanche of new bandwidth requirements hitting their networks, yet too few resources to support the business’ needs. In 2013, three out of four organizations will not have any additional wide area network (WAN) budget (Nemertes Research). That means 75% of IT teams will not be able to buy more bandwidth to address exponential traffic growth, and will need to re-think their entire approach to the network if they want stay successful. Treading water will not be an option.
Here is a sampling of the trends that are challenging IT now:
#GameChanger is the one word we used to describe the new branch router: ISR 4451-X. We said it was designed from the ground up with rich services and application delivery in mind. How did we do that? Two words: Service Containers.
Service Containers are embedded into the router hardware itself, making it easy for you to manage and operate network services and applications. Services and applications are protected within each container, making it possible for each service to perform at the level that you need to, but also gives you the flexibility as its embedded nature entails. And since these containers can talk to each other even if they are on a separate device, you get high availability for your branch automatically. Read More »
Many branch offices rely on Cisco ISR G2 (Integrated Services Router, Gen 2) as their IT platform. This router series delivers highly secure data, voice, video, and application services through a modular design. This turns the router into a platform for WAN Optimization (through Cisco WAAS) and Application Visibility and Control, among other services.
When companies need to add a server into the mix at their branch, Cisco’s UCS E-Series is an obvious choice. You basically have a server blade that can be inserted right into your router. The E-Series is especially great for multisite organizations that have centralized IT but still need to host applications locally at their branch office. This need can come from performance requirements, survivability, or compliance, for example. Read More »
A few weeks ago, Cisco introduced our new vision for enterprise-wide network architecture based on the Cisco Open Network Environment (ONE) framework. This approach is not a radical departure from traditional networks, but a transformative architecture that brings unprecedented openness and programmability to enterprise-wide networks (not just data centers) to be ready for the Internet of Everything. It transforms networks making them more agile, high-performing and application-centric, while making the best use of existing network resources (brownfield deployments).
The need for this architecture is predicated upon the increasing number of applications, the complexity of deploying them, and the fast changing business environments that they need to support. These environments include multiple mobile devices users are bringing into the network as well as the sensors and other connected devices we expect will make up the 50 billion networked devices Cisco and GE have predicted for 2020. They also include new cloud-based application deployment models. This complexity is impacting the networks that need to serve these environments. Read More »
Its interesting to note how much ‘cloud’ has crept into many of our personal lives already. Dropbox, iTunes, Amazon and many other services (plus so many apps) that are leveraging this kind of infrastructure and we often don’t think about it. Frankly, we don’t often care!
Making this work in our multi-location offices with business critical functions and security at stake is of course a different matter. Cisco has been doing some interesting work with something called ‘Cloud Connetors.’ The general idea is to make it really simple for the applications and the network to become more mutually aware of each other. How they can work better together.
We just released ‘Spotlight on Cloud Connectors.’ Watch and see how these things can simplify everything from centralized back up to identity and access management. We cover a numbe of differnt examples.