The OpenStack community recently reached a major milestone and celebrated its third birthday! The flagship open-source compute, storage and networking cloud platform has come a long way since the initial draft. Cisco is proud to be part of this community including participating as Vice Chair of the OpenStack Foundation and as Core Developer for Networking (Neutron).
Back in July, we celebrated OpenStack’s birthday with cake and the release of the Cisco OpenStack Installer for Grizzly. The Cisco OpenStack Installer makes it easy for customers to install, deploy and monitor OpenStack on Cisco UCS servers with networking plugins to the Nexus product line including the Nexus 3k, Nexus 5k, Nexus 6k and Nexus 7k. Watch this demo of how the Cisco Nexus plugin for Grizzly automates the upstream Cisco Nexus Top-of-Rack (ToR) switch:
More information on the Cisco OpenStack Installer for Grizzly can be found here.
We also celebrated OpenStack’s birthday by releasing the Cisco Reference Architecture for RedHat RDO OpenStack with UCS and Nexus. The Cisco OpenStack RDO Reference Architecture can be downloaded here.
Puppet is a key component of the Cisco OpenStack Installer. Cisco will be presenting an overview of Puppet and the Cisco OpenStack Installer at PuppetConf. Cisco will also be presenting details on how Puppet and OpenStack are key components of WebEx. PuppetConf will be held at the San Francisco Fairmont on August 22-23. Check out Cisco sessions at Puppet Conf here.
We would also like to thank everyone for the great interest and support in OpenStack at Cisco Live. David Yen’s keynote featured a demo of the new Dynamic Fabric Automation spine-and-leaf integration with OpenStack. Watch for the Dynamic Fabric Automation mention starting at 30:19 on this video.
The next OpenStack Summit is just around the corner! The OpenStack Summit will be held in Hong Kong on 11/5-11/9. Registration for the OpenStack Summit here.
We are looking forward to seeing everyone at PuppetConf and the OpenStack Summit.
Solving the Network Location Problem with LISP (Locator/Identifier Separation Protocol)
The first thing that comes to mind when someone mentions location is our GPS location. Our ability to roam around the earth with our mobile devices is something many of us take for granted. However, at the packet level on the Internet of Everything (IOE), trying to map the network location of a trillion new things may require some new thinking.
Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?
In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.
The annual Cisco Networking Academy Conference opened with a fitting tribute to celebrate its rich 15-year history. Cisco Executive Chairman Emeritus John Morgridge took the stage just days before his 80th birthday and told the audience the story of how Networking Academy was founded. Hundreds of academy instructors and Cisco staff watched in person from Cisco headquarters in San Jose, California and virtually from around the world.
According to John, there are 3 reasons why NetAcad has been such a success. First of all, it capitalized on Cisco’s strengths and capabilities. Cisco also invested for the longer term: 15 years and hundreds of millions of U.S. dollars. Finally, he mentioned and thanked the great instructors who have taught more than 4.75 million students in 165 countries since 1997. Today, NetAcad is evolving to keep up with the ever-changing educational system. One key component, according to Morgridge, is that “we test to master not to measure.”
The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.
Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »