Cisco Blogs


Cisco Blog > The Platform

Mobile, Video, Cloud – Can A “Good-Enough” Network Handle It All?

April 26, 2011 at 10:35 am PST

There are times in our lives when good enough works just fine.

For example, a 1968 Volkswagen Beetle is good enough to get you from point A to B, but not for driving on the Autobahn. (I don’t know about you, but I’d rather have a Porche 911.)

And a 19-inch tube TV is certainly good enough for watching reruns of “Magnum P.I.,” but not for watching the big game. (I’d go for a 50-inch LED HD flatscreen TV, thank you very much.)

The same goes for the network. Good enough is fine for the network if all you need to do is send a few emails or watch an occasional video.

But a good-enough network isn’t good enough for…

Read More »

Tags: , , , , , , , , ,

Virtual Storage Has Real Benefits for Small Businesses

Improve hardware use and manageability as well as reduce costs with storage virtualization.

Virtualization was initially developed for large companies to make their infrastructure, particularly servers and storage, operate more efficiently and to cut spending costs on new hardware. Like many technologies, server and storage virtualization products are now being developed for small businesses to bring the same benefits to their networks.

Many smaller companies start by creating a virtualized server environment. Using hypervisor software, you can divide a single server into multiple virtual servers, each one running its own operating system and associated workload. This lets one server run many more different applications than the one operating system, one workload model of an un-virtualized server.

Read More »

Tags: , ,

Are you really secure ?

Yes, the question is “Are you really secure?” Now that I’ve asked a loaded question, let me get to the point.

The term “secure” sure has a lot of different meanings depending on the context in which it is used. If we take it from a corporate security perspective, your options are somewhat limited to physical security, as in video surveillance or physical access, or logical security, as in your laptop or data access. But, when you ask a security professional if they are secure, they will most certainly take that in the context of what they can control, and will most likely answer “yes”.

Well, what about the things you cannot control? You can control which products you buy to provide security, you control how they are installed and configured, and you control the processes and procedures that identify how they are managed and updated. But, can you control how they are manufactured?

Read More »

Tags: , , , , , , , , , , ,

Broadcast Recap: How Professional Services Can Increase Partners’ Profitability

April 20, 2011 at 1:54 pm PST

On Monday I hosted a live Channels Chat video broadcast with Bob Dimicco, Senior Director of Cisco Services. Bob is responsible for the Collaborative Professional Services program that was launched at Partner Summit.

During the broadcast, he offered an overview of how services are a key differentiator for Cisco partners, and he explained how services can drive partner profitability. Here’s a replay in case you missed it.

Cisco’s services strategy places the partner at the center, according to Bob, because partners are critical to Cisco’s go-to market strategy, whether a partner is selling professional services, managed services, or technical services.

In terms of sales, it used to be that products generated far more revenue for partners than services. Five years ago, 80% of partners’ business was product-based, and 20% was generated by services. Now, partners’ business is almost split evenly between product and services. Bob then told viewers that services help an end-customer see how technology can really generate business outcomes.

Want to learn more? In addition to the video replay above, we’ve got a text summary of the broadcast, along with time stamps to identify sections in which Bob addresses key topics, such as market opportunities around architectures, success stories, and how Cisco’s services are different from those competitors offer.

Read More »

Tags: , , , , , , , , , , ,

Fearlessly Consume Tier-1 Enterprise Applications in “Clouds without Boundaries”

With an ever growing mobile and distributed workforce, application developers are being tasked to develop applications that can also be remotely accessed by this global workforce. Application developers, with a very basic understanding of networking, assume the network has no boundaries and applications perform optimally regardless of the mode of access. At the same time, cloud computing is enabling applications to be consolidated into centralized and virtualized data centers, further increasing the distance from where the applications are being accessed. Network architects are also being challenged with current network designs for this application deployment and delivery model. The available bandwidth is being taxed as the ever growing applications portfolio competes for network resources to provide a satisfying user experience across the network without boundaries. This application delivery model also demands capabilities for better visibility and control, WAN optimization, and agility of the network to rapidly deploy and manage enterprise applications.

The Cisco Application Velocity solution addresses all the challenges associated with the delivery and consumption of enterprise applications over the network without boundaries. It is one of the five services in Cisco’s Borderless Network Architecture and is composed of innovative Cisco technologies that help IT professionals meet or exceed business SLAs, maximize user experience, optimize resource utilization, and increase reliability and user expectations.

Read More »

Tags: , , , , , , , , , , , , , , , , , , ,