Cisco Blogs


Cisco Blog > Architect & DE Discussions

Providing the Right Platform is Sometimes All it Takes

Change is the only constant. Except that it isn’t; constant that is. We are seeing changes to IT services, infrastructure, eco-systems, and business models, with consequent demands and expectations that we have not witnessed before. Cisco is responding to all of this with new technologies for the DevOps community, including APIs, development tools, training and more, all of which I discuss below.

The Economist likens this to the Cambrian era that saw the multiplication of life forms that populate our world today: “… this time is … different, in an important way. Today’s entrepreneurial boom is based on more solid foundations than the 1990s internet bubble, which makes it more likely to continue for the foreseeable future.”

What has made this possible, which the Economist illustrates with a variety of examples, is the ubiquity of communications and open source platforms in a “cloud” environment. The Economist lists these elements:

  • …snippets of code that can be copied free from the internet, along with easy-to-learn programming frameworks (such as Ruby on Rails).
  • … services for … sharing code (GitHub) …
  • … “application programming interfaces” (APIs), digital plugs that are multiplying rapidly …
  • … “platforms”—services that can host startups’ offerings (Amazon’s cloud computing), distribute them (Apple’s App Store) and market them (Facebook, Twitter).
  • … the internet, the mother of all platforms, which is now fast, universal and wireless.

What has also changed is that the IT stack is, in effect, collapsing. The “separation of concerns”, that kept the network infrastructure distinct from the applications running over it, is being whittled away. In October 2013 we teamed up Read More »

Tags: , , , , , , , , , , ,

Are you secure online?

Post contributed by Rich Mullikin, a technology professional who has worked with leading IT security, networking, and wireless companies for the past 14 years.

Threats to wireless security are rampant, from software programs designed to exploit weaknesses in security protocols to the average next door neighbor looking for a “free ride.”  There are even apps that allow intruders to snoop on your activity while you surf the Internet on an unprotected network, granting access to your passwords and user names. How often do you see your Facebook friends posting spam on everyone’s walls?!

We’ve said it a million times, and we’ll continue to say it: protect your home wireless network with a strong password!  I must admit that I failed to do that very thing for a couple of years after moving from California to Texas. I was protected in CA, but while setting up my wireless network at my new home in TX, I was in a hurry and opted not to set up a password to protect the network, assuming I’d do it later. Later was over two years, and then finally, after feeling guilty for that long that I wasn’t practicing what I preached, I remedied the situation.

Read More »

Tags: , , , ,