As we start off this New Year, how about including a resolution to improve application delivery? In Best Practices for Application Delivery in Virtualized Networks – Part I , we covered key application delivery challenges that have come up due to the complexities of managing the many types of applications that enterprises use today, and further complicated by data center consolidation and virtualization. We then covered some best practices, courtesy of Dr. Jim Metzler’s 2011 Application Service Delivery Handbook, which recommended taking a lifecycle approach to planning and managing application performance.
A key step to the lifecycle approach is to implement network and application optimization tools, such as WAN Optimization solutions and Application Delivery Controllers, including server load balancers. Of course, these solutions are not new to the market and already address many of the needs that exist with delivering enterprise applications in virtualized data centers -- namely, the need to ensure network reliability, availability and security for users accessing these applications. In this post, we will discuss a recent study by IDC, where IT decision makers across Europe and the US spoke out about their strategies for using server load balancers to deal with emerging challenges.
. What important attributes do you look for in your server load balancers?
Read More »
Tags: ACE, application control engine, application delivery, application delivery controller, application performance, availbility, Cisco OTV, cloud bursting, data center security, DWS, Dynamic Workload Scaling, enterprise application, IDC, jim metzler, load balancer, Load Balancing, network optimization, Network Services, Nexus 7000, OTV, Overlay Transport Virtualization, resiliency, security, server load balancer, server load balancing, Tina Feng, Unified Network Services, virtual machine intelligence, virtual network services, virtualization
It is certainly a new day and age for many aspects of today’s society. One prominent sector that continues to lead by example in this area is the Internet, more specifically the online shopping environment. Note that online shopping is not a simple matter of go to a website, click “buy,” and checkout. That would be too simple. Ironically the purchase aspect itself tends to be the simplest matter here. The crux of the experience begins with the search and research phase. What exactly does one need/want? Is there a particular brand in mind? Is there a popular alternative? The convenience of asking and gathering answers to these questions and many more begin the journey, and thanks to the power and slew of resources the Internet provides, shoppers are able to search common products, brands, uses, verify details such as durability, ease of use and more based on the numerous rating systems, applications, web 2.0 solutions, social networking, and the ongoing phenomena that continue to evolve. So what does this mean? What does this have to do with security? Quite simply, all of this equates to more TIME on the Internet. Furthermore, the continued rise in scam and theft activities during the holidays is an additional means for concern. As mentioned in a recent Cyber Risk Report Law enforcement and government agencies continue to search and seize counterfeit and fraudulent websites. This includes counterfeit merchandise in addition to fraudulent website domains. More time spent on the Internet means there is more potential for exposure to threats and vulnerabilities. Simple math right? That said, let’s look at some numbers to provide valued context…….
Read More »
It’s hard to believe another year has come and (almost) gone. Every year seems to speed by ever faster, much like the pace of technological advancements. We understand that it’s a challenge keeping up with the latest technologies that impact your small business. So we were curious to find out what topics caught your eye this past year on the Small Business Blog.
Security was by far the most popular topic; and security in all forms—from your core network to personal devices to the cloud. That’s not surprising when you consider all the ways in which you can now access data.
Here’s the list of top 10 posts for 2011:
Read More »
Tags: cloud, networking, routers, security, small_business, switches
At Cisco, we are focused upon internally and externally sharing social media best practices and lessons learned from individuals who have successfully integrated social media into their day job. We recently sat down with one such social practitioner, Jennifer Halim, a subject matter expert (SME) on the Customer Support Team, to learn more about how she incorporates social media into her job at Cisco.
Jennifer joined the Cisco Technical Assistance Center (TAC) in 2007 and focuses on security products in Australia. In 2010, she became a Technical Account Manager with ScanSafe, Cisco’s cloud-based web security service. Even after the move, she managed to keep up to date with the technology that she used in her previous role by actively participating on the Cisco Support Community. With over 322,000 registered users and 11 years of history, the Cisco Support Community is a platform on which technical experts and Cisco customers can interact with each other by asking and answering questions in the discussion forums, commenting on blogs, rating videos, and more. While spending an average of one to three hours per day contributing to the discussion forums regarding Cisco Security products, she participates completely out of her own will during after business hours. Through her engagements on this website, Jennifer states that she is constantly learning from other contributors to the community, and she enjoys the satisfaction of being able to help customers by answering their questions and resolving their issues.
Community participants like Jennifer who have responded to customers have contributed to Cisco’s $80 million in annual cost savings that is attributed to the Cisco Support Community and is a conservative estimate based on TAC case deflection. Based on the number of customer cases resolved, Jennifer has been one of the top contributors since she joined the community in 2010.
How does she manage to integrate her Support Community activities into her day job?
Read More »
Tags: ambassador, Australia, best practices, Cisco, Cisco Supporty Community, Customer Support, forums, lessons learned, ScanSafe, security, social media, TAC, Technical Assistance Center
Organizations are faced with providing security for employees that are rapidly adopting new technology in their personal and professional lives and expect their work environments and employers to do the same. As the data from the new Cisco 2011 Annual Security Report and the Cisco Connected World Technology Report Chapter 3 show, organizations that do not or cannot provide that type of environment are at risk of losing the ability to compete for those employees and business opportunities. If employers attempt to block, deny, or forbid mobile devices, social networks, instant communications, and new technologies in the work place employees will likely ignore the policies or, even worse, find ways around them that open your environment to unrealized risks.
Read More »
Tags: 2011 annual security report, botnets, Cisco, cloud_computing, cyber security, DDoS, identity, malware, security, spam