Cisco Blogs


Cisco Blog > Enterprise Networks

Top 4 WAN Obstacles and Solutions to Cloud Migration

The biggest buzzword in the network industry is Cloud: the majority of organizations have a strategy to use cloud-based services and applications, whether it be Public or Private clouds. Organizations have come a long way since ’migrating to the cloud’ discussions began . Take a look at this video recorded just a few years ago when cloud was still an enigma:

But Cloud has never been a new concept: IT professionals have been migrating applications to centralized datacenters for decades now…mainly to share recourses and save money by having less IT personnel supporting branch offices. Unfortunately, application performance as well as reliability and uptime requirements quickly became barriers to this centralization. Read More »

Tags: , , , , ,

No Traffic with Application Visibility and Control

I love my job, but I really don’t enjoy my commute….and the unpredictable traffic. Living on the west side of San Francisco and working on the east side of San Jose, Google Maps tells me my journey is a hefty 47.2 miles and 1 hour and 1 minute (without traffic.) Holidays, rain, and accidents can add minutes and sometimes hours.

Twice a day, to and from work, I start asking the questions:

  • How busy is it on the road right now? Is the road full of tired commuters, semis, or concert traffic?
  • Which lane should I be in? If I’m in the fast lane, what are the odds of it coming to a screeching halt while I watch the other three lanes go by?
  • Do I need to detour to another interstate or highway due to an accident or concert?

Read More »

Tags: , , , , , ,

Virtual desktops, virtual workspaces, voice, video, … virtual reality

Today, there is lots of buzz around the big news from Cisco and our ecosystem partners with the launch of next generation VXI validated solutions.   If you missed our launch event, you can still get all the details online via our community.

Cisco Virtualization Experience Infrastructure (VXI) delivers desktop virtualization with secure access to data, voice, and video for fixed and mobile devices.    

Pretty cool but, why is virtualization important for government agencies? 

  1. cost control, more than ever government agencies are focused on strategies to improve operational efficiency and reduce costs
  2. flexibilty, allow government workers ability to work in different workplaces, from city hall to public works, with choices of different combinations of virtual desktops, voice, and video devices including latest smartphones, tablets, and Cisco Virtualization Experience Clients (VXC)
  3. security, better security and control of information in the data center rather than distributed endpoints and with the ”bring your own device” (BYOD) to work phenomenon, security is more critical than ever
  4. uncompromised, helping government agencies achieve mission objectives without compromising cost or resilience mandates

See more details below. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , ,

In a Network State of Mind

Innovative managed ISR G2 marketing with crowdsourcing platform jovoto

The ISR G2 is one of Cisco’s most versatile products -- it delivers next generation WAN and network services, enables the cost-effective delivery of high-definition video and collaboration, and provides the secure transition to the next generation of cloud and virtualized network services.  

Cisco has teamed with jovoto on an innovative marketing initiative to develop creative yet focused campaign concepts for managed ISR G2.  jovoto is an online collaboration platform that delivers creative collective intelligence and builds on the concept of co collaboration with its global community. It establishes a sustainable partnership between brands that seek ideas and creative idea-driven individuals and communities.

Launching on August 23, Cisco and jovoto will run a six week contest to challenge the jovoto community to create concepts that communicate a compelling value proposition for the ISR G2. Anyone can submit new ideas, review the submissions, and provide feedback and comments to make them even better. There are prizes for the top ideas and for the highest ‘karma’ points -- the most active participants who comment and help shape these ideas.

We want YOU!  Are you a designer with amazing ideas for how to turn the ISR G2 value proposition into an great marketing campaign? Submit an idea (or five)! Are you an IT professional who we’d want to hook? Give your candid feedback and tell us if these ideas would get you to think about ISR G2.

See the “In a Network State of Mind” contest landing page to get started.

http://bit.ly/networkstateofmind

Tags: , , , ,

Increasing Your Network Tolerance

As organizations look to improve operations through centralized control, they often need to take into account what would happen if an area of the network fails. In many cases, having a centralized controller-based wireless architecture in organizations with multiple branch offices has prompted the question, “What happens if the WAN is slow, or even worse, goes down?”

Many organizations have been reluctant to implement a centralized wireless controller located in the data center or private cloud due to this concern. Without centralized control, these organizations have two deployment strategies available to them:

  • Implement wireless controllers at each branch site. This approach is perfectly fine for an organization with many Access Points per branch, or those that require high throughput for applications such as Video. However, many branches only require a few Access Points per location or require simple applications such as bar-code scanning and printing. For these organizations, local controllers become less cost effective, with the capital expense becoming prohibitive.
  • Implement access points running in autonomous mode. This approach eliminates the benefits of having any kind of centralized control such as the ability to centrally configure wireless policy and security setting on access points, WIPS capabilities and advanced mobility services like CleanAir, leaving the branch vulnerable and opening the corporate network to attacks.

Read More »

Tags: , , , , , , ,