In the same year Cisco was founded, Kate Bush recorded the hypnotic Cloudbusting,one of her most iconic songs and music videos. Conceived by Terry Gilliam and featuring Donald Sutherland, there is a strikingly poignant moment in the video where Bush’s character is ‘cloudbusting’ with her father and she first realizes that adults are fallible.
Many enterprises (30%) have been leveraging cloud services cautiously or only in an internal (private) cloud manner. The reasons for this vary but these are the most common:
IT applications (~80%) are not cloud enabled i.e. traditional client server apps or non-x86 apps
Perceived security and performance concerns
Perceived lack of control and loss of IT governance and policy
While these reasons are valid, the evolution of cloud services and the ability to transform traditional IT services, governance, and policy controls mean this Cisco CSA can now address these reasons.
This use case example focuses on Security because it is a major consideration for most customers. The market growth for security is driven by increased demand for security applications such as network security and “confidentiality” of services. Security services are seen as an emerging market and are expected to grow to $40B by 2017. Managed Threat Defense is projected to be $3.7B of that $40B. Read More »
I’ve had the opportunity this year to meet with mobile operator leaders from around the globe. Whether they are large or small, focused on consumer services or businesses, or engaged in video or mobility, their ambitions are much in line with our strategy: to help them monetize and optimize their networks, while accelerating their ability to deliver their services.
As mobile operators are deploying new technologies to help achieve their business outcomes, “virtualization” is often touted as the answer, and, in part, that is correct. At Cisco, we believe it is important to frame the discussion properly in order to reap the full benefits of what’s possible in networking.
The network is increasingly becoming virtualized, and virtualization is increasingly becoming networked. Virtualizing applications is an initial step that can provide some advantages. However, Read More »
At the ITS World Congress last month in Detroit, we saw a wide range of intelligenttransportationsolutions and concepts. The most popular solutions on display –presented by several Auto Manufacturers, ITS suppliers, and Cisco along with partner Cohda Wireless – were simulated and live Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) demonstrations, which showed how vehicles will communicate to each other and to roadside infrastructure in the not-too-distant future. A key goal of V2V and V2I is safety, for drivers and pedestrians, as vehicles will be able to synchronize their movement with traffic lights, roads, toll plazas, rail crossings and of course other cars.
Cisco also showed how Connected Transportation solutions can leverage the intelligent – and virtualized – mobile core network. We demonstrated a [fictional] after-market connected car application (“CarConcierge”) that enables users to remotely start or unlock their car, do a car “health check,” and extract car-sourced analytics over an LTE mobile network. The demonstration showed how the Connected Transportation market will see an explosion of innovative new applications that mobile operators can monetize by providing secure, intelligent, and cost-effective connectivity and process automation to devices and vehicles.
Watch a video summary of the Cisco demonstration: Read More »
This is part 3 of the “Your Business Powered By Cisco Customer Solutions Architecture (CSA)” blog series.
Physical Infrastructure Layer
The physical infrastructure layer is where the physical resources reside. This includes equipment typically used in a data center such as network devices (switches, routers, firewalls, and load balancers), computing resources, storage and facilities. Physical infrastructure products and the connectivity to the cloud, customer networks, partners and cloud brokers are secured in this layer.
Virtual Infrastructure Layer
The main purpose of this layer is to abstract the underlying physical resources into pools of logical resources with attributes and service assurance parameters. In addition, it greatly simplifies management processes, accelerates service delivery to market, and reduces operating expenses. Simplicity of provisioning and management along with security can be obtained by creating many logical networks from one physical network. The physical infrastructure layer is virtualized using various methods (hypervisor technology, Application Centric Networks, etc.) into a virtualized infrastructure layer. This is analogous to creating VLANs within a physical LAN. The Resource Abstraction and Control functionality in this layer views the physical layer in a more holistic fashion by allowing the orchestration, network and security controllers to enforce appropriate policies to the traffic and the underlying network infrastructure.