Avatar

Today the switching and wireless markets are worth US $19.2 billion and $4.2 billion, respectively, representing the largest migration business opportunity in the networking industry. The Cisco Catalyst switching portfolio has been refreshed across every platform, creating a once-in-a-lifetime sales opportunity.

Migrating your customers to new products – and including support services for each product – helps you protect your install base, create recurring revenue streams, and provides you the opportunity to generate incremental business by focusing on your customers’ business outcomes. All supported by the new functionalities our portfolio of products and technologies can enable.

You can help your customers successfully move to the next generation of technologies with the Just Switch It initiative which provides resources to help you:

  • Start new customer conversations
  • Promote migration and upsell to the newest Cisco switches and wireless solutions
  • Talk to your customers about the value of support services versus warranty
  • Address competitive threats with solutions, services, and financing

https://youtu.be/paT7q-YcheA

We’ve put together a marketing package that includes everything you need to encourage companies to evolve their network. There are price promotions to help you persuade buyers and a set of materials you can use to reach more customers: 

Continue reading “Just Switch It: Migrate Customer Switches, Wireless Access Points”



Authors

Andres Sintes

Global Senior Director, Partner GTM

Global Partner Organization (GPO) - Digital Transformation & IoT

Avatar

By Leonard Luna, Senior Marketing Manager, Cisco Service Provider Solutionsleonard_luna

If it’s Spring, then it is time for OFC/NFOEC – the world’s leading event for advancing optical solutions (March 9-13).  Cisco will, once again, have a strong presence, including our largest booth ever (booth 4359), at this year’s event being held at the Moscone Center in San Francisco, California.  Building upon the industry wide dialog around multi-layer convergence and SDN, we will showcase the Evolved Programmable Network (EPN), the Cisco Network Convergence Systems (NCS) and our highly innovative CMOS photonics technology – CPAK.

EPN is the foundational layer for Cisco Open Networking Environment ( ONE) strategy and is the natural evolution of the IP next generation network (IP NGN). It is designed specifically to leverage the opportunities presented by the Internet of Everything (IoE). It optimizes the delivery of multi-service solutions over service provider networks.  An EPN increases service provider revenue opportunities, lowers total cost of ownership (TCO) and supercharges service agility.  One of the key elements of Cisco’s EPN architecture is the Cisco NCS product family featuring the NCS 6000 Series IP Router, the NCS 4000 Series Converged Packet Transport platform and the NCS 2000 agile ROADM platform.  A key differentiator to Cisco’s EPN is our growing portfolio of CPAK transceivers delivering never before seen levels of density, power savings and flexibility to Cisco’s portfolio of data center switches, IP routing and transport solutions.

At OFC/NFOEC, Cisco will showcase Continue reading “Demystifying Multi-layer Convergence and SDN at OFC/NFOEC 2014”



Authors

Sanjeev Mervana

Vice President of Product Management

Emerging Technologies & Incubation

Avatar

On Thursday, February 27, at the 2014 RSA Conference, Chris Young, senior vice president of Cisco’s Security Business Group, and Padmasree Warrior, Cisco’s chief technology and strategy officer, delivered a keynote address on “The New Model of Security.”

If you missed the conference in person, you can now join us online, in the Cisco Security Community, to view an on-demand webcast of the keynote. You’ll gain further insight into how Cisco is uniquely positioned to deliver new innovations for security solutions that are visibility-driven, threat focused, and platform based.

We encourage you to interact with Cisco experts and your peers in the new online Security Community as you watch the webcast. The Security Community is also your portal to read the latest blogs related to the announcements, watch videos, continue your dialogue with Cisco experts and your peers, and stay informed about upcoming webcasts.



Authors

Heather Caldwell

Security Community Manager

Global Social Media organization

Avatar

We in IT are faced with many challenges from our end users.  From IT costs to application performance, while always keeping an eye on our network security posture.  This reminds me of a sign on the wall of my auto mechanic’s shop: Good, Fast, Low-cost. I was always told I am allowed to pick only two.  I would of course question him, “why cant I have something with high quality, on time, and within budget?”  This always made him smile, but he still told me I could only pick two.

So back to our IT challenges: Cost, Performance, and Security. Application performance is something we can all see, feel and touch. When thinking about performance, we need to also consider where these applications are coming from.  Looking at applications like Microsoft’s Office 365, we are seeing mission critical applications from outside our data centers being delivered as Software as a Service (SaaS) solution. Does this matter to our end users?  They sit at their PC’s, Tablets, Mac’s, etc. and know when something is not going fast enough.  Their expectations are growing; they always expect the best performance. If they don’t feel their Outlook e-mail is opening fast enough or that the saving of their PowerPoint file is taking too long, they do not hesitate to let us know.  And oddly enough, everyone just assumes it is the network.  So not only do we need to think about our networks, but the Internet performance as well.

Continue reading “Delivering Application Optimization for Office 365”



Authors

Bill Reilly

Product Manager

Enterprise Networking Group

Avatar

“I’m a photographer too!”

 

The Oscar’s last night reminded me of a story, shared by Stevan, one of our producers. As it goes, he was in a bar and happened upon on a conversation with a nice fellow who apparently was also a working photographer. Stevan did what many of us do naturally, which is to look for clues that we are talking to someone who is at our level professionally or someone who simply talks a lot. No alarm bells were going off…this fellow seemed straight up with consistent references to equipment, style, workflow, what have you.

Stevan was enjoying the exchange and began to think he had happened upon a new relationship that could become valuable professionally as well. This new friend spoke of his focus on celebrity photography and began to name drop, Angelina Jolie, Brad Pitt, Meryl Streep, Kevin Spacey and on and on. Suddenly, he remembered that he did have his portfolio in the car, would Stevan like to see it? ‘Sure!,’ Stevan exclaimed…that is excactly what he would like to do. His new friend returned a few moments later with a portfolio/photo album under his arm and placed it on the counter. He began narrating the back story as he showed incredible pictures with amazingly good accesss to top celebrities.

It was obvious this guy was looney tunes however.

Every picture contained celebrites just as promised…but these incredible pictures were obviously captured in someones living room. He had been taking pictures of his television set. No attempt to crop out the TV or improve the quality…this was straight up….creepy. Now what do you do? Stevan had a choice to make- confront the guy with the obvious issue or simply extract himself from the situation as quickly, politely (and safely) as possible. Was this a set up? There was an urge to look for hidden cameras. To brace for the big reveal that must happen next. Nothing happened. So there he sat, looking at pictures of this guys TV set…page after page as this ‘professional photographer’ earnestly shared his innocent(?) delusions.

Congratulation to all the winners from last nights Oscar ceremony. Perhaps you are now a fresh addition to his prized portfolio.

Robb



Authors

Robb Boyd

Producer, Writer, Host

Avatar

The University of Nevada, Las Vegas (UNLV), founded in 1957, is located in the heart of showbiz industry in Las Vegas. The school offers higher education programs ranging from business, engineering, fine arts and music, and science, and professional schools such as dental medicine and law.

The school’s mascot, Hey Reb, was recently featured on Hulu’s “Behind the Mask,” and you may recognize the Southern Gym during the dance scene between Elvis Presley and Ann-Margret Olsson in the movie Viva Las Vegas.

With over 24,000 unique WLAN users per day, 1.1 gigabytes of throughput per second, and more than 50 wireless access locations across campus providing WLAN coverage, this educational institute demands a massive Wi-Fi network.

In the previous blog, we highlighted some of the Bonjour enhancements of the 7.5 software release and the deployment of Bonjour at St. Margaret’s Episcopal School, a K-12 school. In this blog, we will describe details about UNLVs WLAN deployment, how they use Bonjour services, and give you an insight into rapid pace of innovation necessary to support this technology in the education arena. Continue reading “Cisco Bonjour helps make beautiful music at University of Nevada, Las Vegas”



Authors

Jeevan Patil

Director, Product Management

Wireless Network

Avatar

Tom Edsall, ACIThis is a two-part blog series developed in association with Tom Edsall, a Cisco Fellow and CTO of Insieme Networks, recently acquired by Cisco Systems. The intent is to elaborate on foundational design principles of Application Centric Infrastructure (ACI), a transformational approach for next-generation and cloud deployments. While the vision of ACI is an expansive one, this blog series focuses on the role of SDN overlays, their deployment considerations, as well as benefits that customers could derive from the unique implementation of overlays in an ACI solution.

The philosophy of Application Centric Infrastructure

Cisco’s Application Centric Infrastructure approach focuses on the most important thing in the data-center: applications.  Without applications, we would not even need a data center at all!  Everything we do in the data center ultimately is used to support those applications and the data that they work on because that is what ultimately drives business value.

The modern data center must be able to deploy applications rapidly, using any and all resources (compute, storage, network) available in the data center at any time.  It must also be possible to grow, shrink, and move applications as needed.  This will drive business agility and efficient use of resources.

The problem is that classical networking systems were developed in a world where there was less focus on any application anywhere, any time. Instead the focus was on on building large, static, IP networks.

Our solution was to create an application centric infrastructure where the emphasis is on the application rather than on the network.  In order to do this we had to change the abstraction of the network from one that is, well, network centric to one that is application centric.  In addition, we had to employ some SDN techniques to change the network from a traditional static infrastructure to a more dynamic, agile, flexible infrastructure. Let’s look into some of these techniques in detail.

Integrating SDN concepts

We employ two important concepts used in typical SDN solutions: overlays and a centralized controller.  Overlays give us network flexibility that was never possible before by separating the location of a device from its identity. The centralized controller gives us consistent network behavior wherever an application is deployed, the application centric abstraction of the network, and a single point of control.  While these benefits are important, even fundamental, to building a data center capable of supporting the business requirements of application agility, they also introduce their own set of problems in traditional SDN deployments that must be addressed. We will discuss these issues and their solutions shortly.

The SDN overlay and application abstraction is built on top of networking hardware that must move data across the data center quickly and efficiently without requiring changes to the applications, servers or storage elements attached to it.  The hardware must do this in an efficient, reliable manner and provide as much assistance as possible to the network operator when troubleshooting and monitoring those applications as they use the network.  Lastly, this hardware must be cost effective, power efficient, and space efficient.

Continue reading “ACI Design Principles: The role of SDN Overlays in Application Centric Deployments – Part 1”



Authors

Shashi Kiran

Senior Director, Market Management

Data Center, Cloud and Open Networking

Avatar

IMG_1155This week I had the opportunity to attend the RSA Conference in San Francisco.

The theme for the conference this year was “Share. Learn. Secure” with a focus on recent breaches, surveillance programs and DDoS attacks with:

  • Hundreds of educational sessions with insights, best practices and real implementation case studies
  • Live keynote speakers
  • Two expos featuring hundreds of solutions including Cisco and Sourcefire booths featuring threat-centric security solutions to reduce complexity, provide visibility, continuous control, and advanced threat protection

Cisco’s Chris Young, SVP, Cisco Security Business Group, and Padmasree Warrior, Chief Technology and Strategy Officer, delivered the keynote “The New Model of Security” sharing our vision and strategy Intelligent Cybersecurity for the Real World.

If you did not attend RSA  in person, starting March 3 you can view an on-demand webcast of the keynote.

Continue reading “Highlights from RSA 2014”



Authors

Kacey Carpenter

Senior Manager

Global Government and Public Sector Marketing

Avatar

Cisco is proud to sponsor the DoGooder Video Awards for the third year in a row. These awards recognize the creative and effective use of video in promoting social good.

The submissions included a wide array of funny, moving, and informative videos that embraced strong storytelling to communicate important messages. It was a difficult task, but the DoGooder Team has chosen the finalists – and now it’s up to the public to choose the winners.

Visit the contest site today and cast your vote. Public voting is open through March 10, 2014.

DoGooderLogo1

Continue reading “Vote for Videos that Inspire Social Good”



Authors

Alexis Raymond

Senior Manager

Chief Sustainability Office