Cisco Blogs


Cisco Blog > Mobility

Mythbusters: Unified Access Edition: Part 1

There’s been a lot of buzz around our recent Cisco Unified Access Solution announcement. We understand there is also some confusion around what’s what, what’s required for Unified Access, and what the impact will be on IT.

In true Mythbuster fashion, let’s all discover why no myth is safe – through a 5-part series of posts. In this series, we’ll look at some of the most common myths that have been floating around and unveil the truth.

Myth 1: Moving to the Cisco Unified Access solution requires the complete replacement of the existing access switch infrastructure.

This is pure fiction. Cisco has always promoted that the network infrastructure should evolve and we understand that different organizations will feel the impact of the Internet of Things, mobility and BYOD at different times and will address them differently. The new Cisco Unified Access solution provides you flexible deployment options, including separate wired and wireless, converged access, cloud-managed, and more. The deployment model chosen will depend upon the lifecycle of the existing infrastructure.

Read More »

Tags: , , , , , , , , , , , , ,

What Does “Enterprise Class” Mean, Anyway? A Case Study with 3G/4G

[WARNING: This blog post contains specifics on actual product features. Stop reading now if you prefer PowerPoint to Excel.]

“Enterprise class.” Sounds awesome. But does it have any meaning to your business?

It turns out that it does, but we need to dig into a real product example to make it clear. One shining example from Cisco is our leadership in Enterprise class (there’s that phrase again!) 3G/4G. Let’s use this example to highlight how our engineers create “Enterprise class” products by focusing on: Read More »

Tags: , , , , , , , , , , , , , , ,

London 2012: the Olympic Network (part one)

Anticipation of the upcoming summer Olympic Games has already lifted my spirits. This week I received an invitation from Andrew Millar, the British Consul General in Houston, Texas – it’s an opportunity to attend a viewing party for the opening ceremony later this month. I’m really looking forward to that event.

You may recall that in my last story, the ICT Infrastructure Investment, I shared some of the interesting high-level details about economic outcomes and seven of the the key principles that were used to develop the overall ICT solution.

Read More »

Tags: , , , , ,

Software Defined Networking for Service Providers: Data Center Fabric Analogies breakdown in the WAN

Lately I’ve been seeing some industry people trying to apply the principles of data center network fabric models to their Wide Area Networks (WANs), and implying that such can be extended through service provider WANs.  Data center fabrics and WANs are horses of very different colors with way too many differences for these perspectives to hold up.

Fundamentally they are different beasts with one more easily tamed than the other.   Data center networks generally have well known end points and well-ordered designs.

Multi-tenant Data Center Designs

Bandwidth within data centers is virtually unlimited relative to WAN bandwidth.  It is much more stable and constrained in its characteristics when it comes to things like latency, loss, jitter, capacity, restoration capabilities – all of which have significant influence on WAN services delivery.  The same data center network assumptions exist between each of the end points, which makes fabric modeling for data centers generally a good approximation and thus possible to use.

Some private WANs that interconnect data centers may align closely enough with a fabric model, making it a good enough approximation.  But this is a unique case and is essentially Read More »

Tags: , , , , , , ,

Can Cloud Cost You Your Job? (Pitfall 2: Force Fitting Cloud into Your Current Security Model)

In a previous blog, I posted the first of three pitfalls of  hitching your wagon to the cloud . Today, let’s cover the second pitfall of force fitting cloud into your current security model.

Recently, I had an opportunity to listen to the CIO of a Fortune 100 company talk about top business care-abouts for IT. We have all heard about cloud and virtualization as technology care-abouts, but this CIO boiled it all  down to two things that matter for IT: Productivity and Risk. Read More »

Tags: , , , , , , , , ,