Avatar

She’s an inventor, she’s a mom, she’s a VP at IBM…Jessica Murillo does it all. She’s not only a role model for women in technology, she’s a role model for anyone in technology. With dozens of patents, years of experience, and a strong vision of the tech trends that will impact business over the next several years, she is someone worth listening to. I interviewed her last week for OpenStack Podcast #18, and got her thoughts on:

  • Why tech needs women
  • Why IBM is so interested in OpenStack
  • OpenStack’s growth and momentum compared to Linux
  • The power of the OpenStack Summits
  • How she manages to raise a family while building such an impressive career
  • Why it’s important to ask for help and build a strong personal as well as professional support community
  • Why more girls don’t gravitate toward science, math, and engineering, and what we can do to change that

https://www.youtube.com/watch?v=WRpwC6Zt51s

To see who we’re interviewing next, or to sign-up for the OpenStack Podcast, check out the show schedule! Interested in participating? Tweet us at @nextcast and @nikiacosta.

For a full transcript of the  interview, click read more below.

Continue reading “OpenStack Podcast #18: Jessica Murillo”

Authors

Niki Acosta

OpenStack Evangelist

Avatar

This week, Cisco Corporate Social Responsibility will follow Deborah Huyler and Andrew Torres, two Cisco Networking Academy Dream Team students, as they set up wireless access points, provide network troubleshooting, and soak in the sights and sounds of NBA All-Star 2015. They’ll be sharing their stories from Madison Square Garden, the Barclays Center, and other event venues through journal entries, photo slideshows, and videos!

Read about Deborah’s third day below:

Hi again, everyone. It’s my third day working with the NBA’s IT Team as a member of the Cisco Networking Academy Dream Team, which means I only have two more days left in New York City.

I really wish it wouldn’t end; it would be a dream-come-true to do this everyday.

pgIn6MOk1grpNnWqSa5V4QJRND_9To0MErZP-8Xkocc-550x412

Continue reading “Cisco Networking Academy Dream Team: Deborah Connects at NBA All-Star 2015”

Authors

Austin Belisle

No Longer with Cisco

Avatar

Last night, Cisco received the Corporate Service Award at the 12th-annual Friends of National Service Awards in Washington, DC. The event was hosted by the National Conference on Citizenship and Voices for National Service. Pat Finn, senior vice president for public sector, accepted the award on behalf of Cisco.

Cisco has been a strong supporter of the concept of national service for more than a decade. For instance, we provide cash and product grants to organizations like City Year and Teach for America, which place college graduates in underserved schools for one or two years. “National service is a win-win for our society,” said Tae Yoo, Senior Vice President for Corporate Affairs of Cisco. “In communities across the country, national service programs benefit both the individuals served and the individuals who step forward to serve. Cisco is proud to be a part of the national service movement, and looks forward to expanding service opportunities in America.”

Young people who participate in "national service" support communities and help people improve their lives while developing skills that prepare them to succeed in the workforce.
Young people who participate in “national service” support communities and help people improve their lives while developing skills that prepare them to succeed in the workforce.

Continue reading “Cisco Recognized for Support of National Service”

Authors

Alexis Raymond

Senior Manager

Chief Sustainability Office

Avatar

Today’s CIOs lead in a world where rapid innovation is the key to success and disruption is a constant threat. Now, more than ever, technology is one of the biggest drivers of achieving successful business outcomes. In this new era of Internet of Everything (IoE) computing, CIOs are being called upon to streamline and optimize complex infrastructures, transform their operating models to drive innovation, and, as importantly, leverage this innovation to capture their share of the IoE Value at Stake.  Not an easy task for even the most experienced CIO.

Traditional IT infrastructures are complex, manual, and non-programmable — they can’t quickly respond to the needs of a given business. Because of this, the bulk of IT resources are often consumed with “keeping the lights on”, leaving few resources to drive transformation or innovation. Unfortunately, competitive pressures are leaving lines of business owners unwilling to wait for IT resources.   It’s become patently clear that a fundamental shift is needed Continue reading “Fast IT: Capturing True Value for the Digital Enterprise”

Authors

Martin McPhee

Senior Vice President

Cisco Consulting Services

Avatar

feb 2015 midmarket blog image - guy walkingIn my last post I talked about the impact that low-effort experiences can have on customer satisfaction.  I singled out my home broadband provider for criticism, and so thought it only fair that I talk about a recent great experience I had with them.

Last month, my provider sent an email telling me that they’d proactively upgraded my home broadband service to 50Mbps.  All I had to do was replace my old cable modem/router.  The process couldn’t have been simpler.   The new modem was delivered with pre-configured settings. All I had to do was connect it, power up, and enter the network ID and password onto my devices.

Contrast this experience with lengthy and complicated installations that customers often face when installing multiple communications and collaboration solutions from multiple vendors.

For small and medium-sized businesses in particular, with smaller IT teams, it is critical that solutions are easy to deploy, manage, and use. So we’ve taken a different approach.

The Cisco Business Edition 6000 consolidates multiple virtualized collaboration applications into one server solution that is right-priced and right-sized for small to medium sized businesses.  IT departments can rapidly deploy voice, video, messaging, or presence solutions, starting with their highest-priority use cases — and add additional functionality later. Continue reading “Simplifying Midsize Collaboration Deployments”

Authors

Andy Johnston

Solutions Marketing Manager

Avatar

Tradeshows and events are practically synonymous with the technology industry – after all our industry produces some of the largest ones in the world. Whether it’s unveiling new products or participating in keynote sessions, today’s conference experience does not begin and end on the show room floor.

Rather, social media is the heartbeat of the event – shaping how attendees, partners, influencers and customers experience the show in real-time.

In my role at Cisco, I’ve seen first hand how the power of social media can drive the tradeshow experience. Whether it’s hosting a tradeshow, such as Cisco Live, or participating in an industry event, here are some social media best practices to consider as you prepare for your next show:

Social in Command

In 2013, we debuted the Cisco Live Social Media Hub – the first-of-its-kind social command center. The Social Media Hub not only monitors and reports on event and industry conversations, but also offers deep insights into how in-person attendees and external audience members engage before, during and after with the show.

laura p blog image 1

For example, since the Hub is staffed with social media engagement experts, graphic designers, analytics specialists and logistics personnel, we can capture real-time data trends and use the insights to guide the development of engaging content and socially shared graphics.

The results have been nothing short of astounding:

  • On average, the number of impressions generated per day during Cisco Live US 2014 (#CLUS) totaled nearly 59 million.
  • Comparing the use of #CLUS in 2013 vs. 2014: #CLUS was used 35,500 times in 2013 and 47,365 times in 2014; an increase of over 33% year-over-year.
  • Two Cisco executives Trended NATIONALLY on Twitter during their keynote with the high volume of social engagement; all organic – no paid.

Recently, we have begun rolling out localized versions of the Hub to support other Cisco Live events around the world, such as Cisco Live Melbourne (#CLMel) in March. Although smaller in scale, the localized versions pack a serious social punch – bringing participants closer to the action than ever before.

laura p blog image 2

Stealing the Social Show

It might be easy for Cisco to be front and center in social conversations at our own events, but how can we rise above the noise and make a social impact at some of the largest tech tradeshows around the globe, such as the Consumer Electronics Show (CES) and Mobile World Congress (MWC)?

Our teams have seen stellar results from engaging live-tweets, the development of real-time content creation, such as videos and graphics for social sharing and more.

For example, as a result of our social media efforts at this year’s Consumer Electronics Show (CES), Cisco received a total of 4,002 conversations, with an estimated 13.8 million impressions! These figures support the fact that strategic and insightful social content can help brands stay top-of-mind in a highly-competitive social environment.

Stay tuned as I share more social media best practices in future posts. In the meantime, be sure to leave a comment and share your thoughts about what makes social media a success at tradeshows and events.

Authors

Laura Powers

Former Lead, Global Social Media Marketing

No Longer with Cisco

Avatar

Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.

Continue reading “Cisco Annual Security Report 2015: Secure Access for Defending Against Threats”

Authors

Sanjay Raja

Director, Product and Solution Marketing

Secure Access and Mobility, Cisco Security Business Group

Avatar
We are all proud parents of our products as developers, much like our own children, we see them born, care and feed for them, watch them carefully as they are unstable during early years, we do not go out much, they become more stable over time, and then something happens – they grow up and there is a need to interact with others.  This could describe some of early customer experiences with first generation SDN LAN Emulation technologies.

Cisco Systems introduction and support of Multi-Protocol BGP eVPN control plane for VXLAN https://tools.ietf.org/html/draft-ietf-l2vpn-evpn-11 is an indication that the SDN industry is growing up, leveraging standards-track protocols, and enabling SDN to scale and interact with others.  This is far more significant to the SDN industry than one can read in a single press release and we will expand on its relevance in this blog.

Let’s start with some basic understanding and a bit of SDN history.

SDN encapsulation into overlays or tunnels are not new technologies and have been supported for many years https://tools.ietf.org/html/rfc1701 describes GRE encapsulation and was written in 1994.  Anyone who uses a VPN also uses encapsulation such as IPSEC, so nothing new.  What is new are the SDN controller applications, how they enable logical network functions, and support centralized automation of the infrastructure for data center networks.  I will not go into all of the use cases for SDN overlays as you can find those readily by speaking to your vendor or searching for them on the web.

There are multiple controller architectures available for SDN. I will simply characterize them in three buckets and two additional qualifiers; OpenFlow, Integrated, and Decoupled are the three buckets;  SDN LAN Emulation and Policy-based are two qualifiers.  Today much of the confusion for customers is that vendors are still debating about, and attempting to monetize, “their” method of SDN.

There are key distinctions between the two qualifiers SDN LAN Emulation and Policy-based.  SDN LAN Emulation controllers reproduce properties of the layer 2 and layer 3 networks in the overlay including address learning and distribution, leveraging x86 servers to emulate LAN functions, where the overlay termination end points map logical network destinations to physical next hop in the overlay.

Policy-based controllers use fewer x86 servers by just mapping policy at the physical or virtual switch, benefitting from the integration of the overlay into vSwitches, merchant, and custom ASIC switches in an an open and cooperative manner which eliminates the need for LAN Emulation x86 components, providing more scale and far fewer components than SDN LAN Emulation models.

Five to six years ago the SDN industry started with controller applications providing a software function described with an ability to reproduce network functions from the physical network into a logical network, and overlay that logical network on top of the physical infrastructure.  I refer to this reproduction as SDN LAN Emulation as it has similarities to ATM LAN Emulation https://www.broadband-forum.org/ftp/pub/approved-specs/af-lane-0021.000.pdf .  

Similar to how virtualization evolved in compute, starting with software only, followed by Intel introducing VT and AMD introducing -V, for the purpose that virtualization worked better when it was cooperative with hardware.  In the early days of SDN LAN Emulation controllers, none of the overlay or gateway functions existed in hardware, but today 70 to 90 percent of the SDN LAN Emulation controller use cases exist in every merchant ASIC from Broadcom.

SDN controllers do three basic operations, they run the SDN application, described often as a distributed computing application, they expose a northbound API for orchestration, and they expose a southbound API for programming physical and virtual overlay termination end points.  The overlay termination end points are referred to here as VTEP’s (VXLAN Tunnel End Point) for VXLAN, as it is the most common encapsulation and end point discussed for SDN today.

This is a basic, but fair characterization of SDN controllers, irrespective of whether they are coupled, decoupled, LAN Emulation, or Policy-based.  Integrated controllers provide the SDN controller running the application, the northbound API, the southbound API, and the VTEP.  Decoupled controllers do all of the items mentioned below, but they are meant to support the integration of separate components from third party vendors in each of the afore mentioned categories.

Examples of integrated controllers are VMware NSX and Cisco ACI.  In each of these implementations, the SDN controller application, the API’s north and south, and either a physical or virtual VTEP is provided by the same vendor.

VMware NSX is an SDN LAN Emulation controller that integrates with the NSX vSwitch VTEP provided by VMware for vSphere. Today VMware has a Multi-hypervisor product that enables the NSX Multi-hypervisor controller with a VMware supplied version of Open vSwtich to speak with Xen and KVM hypervisors (you must get VMware’s version of OVS).  VMware tightly controls the vSwitch API’s for VTEP’s in the kernel in vSphere, unlike that of RedHat, Xen Server, and Microsoft.  VMware leverages the informational RFC, OVSDB https://tools.ietf.org/html/rfc7047 to integrate with some vSwitches and third party hardware VTEP’s.

Cisco Systems Application Centric Infrastructure (ACI) is a policy-based controller architecture with the Application Policy Infrastructure Controller or APIC, API’s north and south, physical and virtual VTEP’s.  Cisco works with open hypervisor vswitches such as OVS from Xen and KVM, Hyper-V, VMware VDS, VMware VSS, Cisco Systems Application Virtual Switch (AVS), and the Cisco Nexus 1000v, third party hardware VTEP vendors, virtual and physical layer 4 – 7 appliance vendors, each integrating the OPFLEX control protocol (outside of VMware provided vSwitches) http://tools.ietf.org/id/draft-smith-opflex-01.txt for a southbound API and distributed control system leveraging a declarative policy model.  The northbound and southbound API’s are fully published from Cisco with ACI.  Cisco provided VTEP’s, both physical and virtual, also support or integrate directly with Multi-protocol BGP eVPN as a control plane for VXLAN.

Multi-protocol BGP eVPN as a Control Plane for VXLAN is a standards-track, distributed control plane offering a significant shift in customers ability to build and interconnect SDN overlay networks, while removing the need to run or configure multicast routing in the physical network.

A little more background is required to understand why Multi-protocol BGP eVPN as a control plane for VXLAN is so significant, so please bear with me a few more paragraphs, as the point is coming.

Various SDN controllers including VMware NSX, leverage the informational RFC OVSDB https://tools.ietf.org/html/rfc7047. OVSDB is a management protocol supporting programmability between an SDN controller a vSwitch or hardware VTEP, providing configuration such as termination of tunnels in an overlay network.  The OVSDB VTEP.5 schema is shown below:

Table — Purpose
Global — Top-level configuration
Manager — OVSDB management connection
Physical_Switch — A physical switch
Physical_Port — A port within a physical switch
Logical_Binding_Stats — Statistics for a VLAN on a physical port bound to a logical network
Logical_Switch — A layer−2 domain
Ucast_Macs_Local — Unicast MACs (local)
Ucast_Macs_Remote — Unicast MACs (remote)
Mcast_Macs_Local — Multicast MACs (local)
Mcast_Macs_Remote — Multicast MACs (remote)
Logical_Router — A logical L3 router.
Physical_Locator_Set — Physical_Locator_Set configuration
Physical_Locator — Physical_Locator configuration

Looking at the table above you quickly realize this represents a limited set of options that will require more interaction between the SDN controller and the VTEP being configured leveraging OVSDB than what is defined in the spec.  There are multiple elements in this table, but the primary element is to carry layer 2 reachability information in the overlay and communicate that between the controllers and VTEP’s.  An SDN LAN Emulation controller leveraging OVSDB is involved in address learning and distribution of addresses to the VTEP’s.  This means that the data path is dependent upon the capacity of the x86 platforms running the controller software, it’s ability to learn and distribute addresses to the VTEP’s, and the VTEP’s need to be tightly coupled to the OVSDB spec leveraging an imperative model.  Any feature must be conceptualized in the SDN LAN Emulation environment and then mapped to the data path at the VTEP’s doing the forwarding or gateway functions.

This is a major friction point in large SDN installations because the controller dictates the feature velocity and scale, the VTEP features must be tightly aligned with this model, and any feature changes are limited by the development of this specification which is an informational draft. VTEP’s are primarily ToR’s and vSwitches.  Any other configuration or innovation must be controlled through vendor integration outside of the specification and coordinated across the platforms – features such as VTEP or gateway HA, link management, or others as an example. This is where marketing open moves to the reality of vendor dependence and integration.

Vendors exclusively supporting OVSDB as a management protocol and schema for third party hardware VTEP’s and to integrate with vSwitches are limited by the scale and open or integration implications of this model.  Think back however, the basic function for OVSDB is to enable layer 2 reachability information in the overlay.

What happens if you want to extend your layer 2 and layer 3 information across a data center interconnect, to WAN routers, or across overlay networks that may have other SDN controllers, leveraging a standards-based protocol?

Enter eVPN MP-BGP EVPN control plane for VXLAN.

MP-BGP EVPN control plane for VXLAN offers the following key benefits:
Leveraging an industry standards-track control protocol it enables multi-vendor interoperability and the following benefits:
  • Control plane learning for end host Layer-2 and Layer-3 reachability information to build more robust and scalable VXLAN overlay networks.
  • Leverages the decade-long MP-BGP VPN technology to support scalable multi-tenant VXLAN overlay networks.
  • EVPN address family carries both Layer 2 and Layer 3 reachability information. This provides integrated bridging and routing in VXLAN overlay networks.
  • Minimizes network flooding through protocol-driven host MAC/IP route distribution and ARP suppression on the local VTEPs.
  • Provides optimal forwarding for east-west and north-south bound traffic with the distributed anycast function
  • Provides VTEP peer discovery and authentication which mitigates the risk of rouge VTEPs in the VXLAN overlay network.
Now you no longer have to be limited to one controller, one vSwitch, and one SDN domain.  Leveraging MP-BGP EVPN control plane for VXLAN can create independent exchanges of layer 2 and layer 3 reachability information across overlays, VXLAN gateways, DC or WAN devices, and dramatically improves scale as MP-BGP EVPN control plane for VXLAN is a distributed to control plane not limited to the scale implications or the lock-in control and development of one schema.  Cisco Nexus 9000 with NXOS, Cisco ACI, and vSwtiches all integrate or directly support MP-BGP EVPN control plane for VXLAN and is an expansion to the open choices customers have for SDN from Cisco.

So what should you be asking from your vendors?  Every VTEP in your network should have the ability to integrate or support MP-BGP EVPN control plane for VXLAN, and it should be in every RFP. You should ensure each API is fully published without 3rd party vendor’s being restricted from accessing or integrating with these API’s – this includes vSwitches inside of the hypervisor, top of rack switches, and layer 4 – 7 appliances.

In the transformation of traditional IT models to supporting DevOps and Cloud operations, vendor’s willingness to cooperate varies over time. Leveraging standards-track protocols such as MP-BGP EVPN control plane for VXLAN and keeping the API’s fully published, ensures the customer is no longer trapped by one vendor’s implementation and the customer can drive their own integration or automation by calling the URI objects delivered through open and published RESTful API’s.

Authors

Frank D'Agostino

No Longer with Cisco

Avatar

CiscoChampion2015200PX#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we’ll be talking with Cisco Technical Marketing Engineers Jeffrey Fultz and Shiva Shastri about Cisco VersaStack. Our Cisco Champion guest host is Enda Cahill.

Listen to the Podcast.

Learn about the Cisco Champions Program HERE.
See a list of all #CiscoChampion Radio podcasts HERE.

Cisco SMEs
Jeffrey Fultz, Cisco Technical Marketing Engineer
Shiva Shastri, Cisco Technical Marketing Engineer

Cisco Champion Guest Hosts
Enda Cahill, @Saineolai, Technical Director

Highlights
What is VersaStack?
VersaStack and UCS Director
What makes the VersaStack different?
Why the name VersaStack?
VersaStack and storage Continue reading “#CiscoChampion Radio S2|Ep 5. VersaStack”

Authors

Rachel Bakker

Social Media Advocacy Manager

Digital and Social