Avatar

Customers frequently comment that IT simply isn’t keeping pace with their needs.  Provisioning new data center resources can take weeks.  To be fair, IT professionals are doing the best they can but manual processes and organizational silos can make the process equivalent to trying to play a symphony without a conductor.

https://www.youtube.com/watch?v=abc7U3VQIsk

Cisco UCS Director’s advanced automation acts as the orchestra conductor for your data center.  Your data center is the power source of your business — if it is slow, your business is slow.  Cisco UCS Director’s advanced automation is exactly what you need to deliver speed and efficiency allowing IT to move in concert with your business. Continue reading “Cisco UCS Director: Your Data Center Conductor”

Authors

Joann Starke

No Longer with Cisco

Avatar

Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer’s networks by means of advanced statistical analysis, machine learning and global correlation in Cisco security cloud. Attached to Cloud Web Security (CWS) and Web Security Appliances (WSA), it is also capable of integrating the non-Cisco data sources in order to help the broadest possible set of clients.

Our team discovers tens of thousands of ongoing malware infections (aka breaches) per day. These findings are delivered in a customer-specific report or directly into customer’s SIEM system. The customers can easily identify and re-mediate breaches, get to the root cause and apply policy changes that minimize the risk of further infections in the future. Continue reading “Cognitive Threat Analytics – Transparency in Advanced Threat Research”

Authors

Martin Rehak

Principal Engineer

Cognitive Threat Analytics

Avatar

 

I was recently talking to an industry colleague about how incredibly focused we are, as a company, on the video marketplace. I meant it, so I was surprised to see the eyebrow-spiked reaction and their response: “How can you say that, when you just unloaded your CPE including set-top boxes, modems, etc.?”

It kind of floored me, because to me it was obvious. But I realize this is a question many may be asking. My response is this: The decision to sell our set-top, gateway, and overall CPE line to Technicolor wasn’t a separation from video. It was Cisco recognizing that for that part of our business to be at its healthiest and most productive, it was better off in an environment focused on building CPE hardware at scale – which is what Technicolor does.

Watching Video

 

Cisco is laser focused on three core tenets: Continue reading “Trust Me: Cisco Hearts Video”

Authors

Yvette Kanouff

Senior Vice President/General Manager

Service Provider Business

Avatar

Cisco Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. It is a hardware based multi-terabit layer 4 load-balancing, traffic steering and clustering solution on the Nexus 5k/6k/7k/9k series of switches.

It allows customers to deploy servers and appliances from any vendor with no network or topology changes. With a few simple configuration steps on a Cisco Nexus switch, customers can create an appliance or server cluster and deploy multiple devices to scale service capacity with ease. The servers or appliances do not have to be directly connected to the Cisco Nexus switch.

ITD won the Best of Interop 2015 in Data Center Category.

With our patent pending innovative algorithms, ITD (Intelligent Traffic Director) supports IP-stickiness, resiliency, consistent hash, exclude access-list, NAT (EFT), VIP, health monitoring, sophisticated failure handling policies, N+M redundancy, IPv4, IPv6, VRF, weighted load-balancing, bi-directional flow-coherency, and IPSLA probes including DNS. There is no service module or external appliance needed. ITD provides order of magnitude CAPEX and OPEX savings for the customers. ITD is much superior than legacy solutions like PBR, WCCP, ECMP, port-channel, layer-4 load-balancer appliances.

ITD provides :

  1. Hardware based multi-terabit/s L3/L4 load-balancing at wire-speed.
  2. Zero latency load-balancing.
  3. CAPEX savings : No service module or external L3/L4 load-balancer needed. Every Nexus port can be used as load-balancer.
  4. Redirect line-rate traffic to any devices, for example web cache engines, Web Accelerator Engines (WAE), video-caches, etc.
  5. Capability to create clusters of devices, for example, Firewalls, Intrusion Prevention System (IPS), or Web Application Firewall (WAF), Hadoop cluster
  6. IP-stickiness
  7. Resilient (like resilient ECMP), Consistent hash
  8. VIP based L4 load-balancing
  9. NAT (available for EFT/PoC). Allows non-DSR deployments.
  10. Weighted load-balancing
  11. Load-balances to large number of devices/servers
  12. ACL along with redirection and load balancing simultaneously.
  13. Bi-directional flow-coherency. Traffic from A–>B and B–>A goes to same node.
  14. Order of magnitude OPEX savings : reduction in configuration, and ease of deployment
  15. Order of magnitude CAPEX savings : Wiring, Power, Rackspace and Cost savings
  16. The servers/appliances don’t have to be directly connected to Nexus switch
  17. Monitoring the health of servers/appliances.
  18. N + M redundancy.
  19. Automatic failure handling of servers/appliances.
  20. VRF support, vPC support, VDC support
  21. Supported on all linecards of Nexus 9k/7k/6k/5k series.
  22. Supports both IPv4 and IPv6
  23. Cisco Prime DCNM Support
  24. exclude access-list
  25. No certification, integration, or qualification needed between the devices and the Cisco NX-OS switch.
  26. The feature does not add any load to the supervisor CPU.
  27. ITD uses orders of magnitude less hardware TCAM resources than WCCP.
  28. Handles unlimited number of flows.

For example,

  • Load-balance traffic to 256 servers of 10Gbps each.
  • Load-balance to cluster of Firewalls. ITD is much superior than PBR.
  • Scale IPS, IDS and WAF by load-balancing to standalone devices.
  • Scale the NFV solution by load-balancing to low cost VM/container based NFV.
  • Scale the WAAS / WAE solution.
  • Scale the VDS-TC (video-caching) solution.
  • Scale the Layer-7 load-balancer, by distributing traffic to L7 LBs.
  • ECMP/Port-channel cause re-hashing of flows. ITD is resilient, and doesn’t cause re-hashing on node add/delete/failure.

Documentation, slides, videos:

Email Query or feedback:ask-itd@external.cisco.com

Please note that ITD is not a replacement for Layer-7 load-balancer (URL, cookies, SSL, etc). Please email: ask-itd@external.cisco.com for further questions.

Connect on twitter: @samar4

Authors

Samar Sharma

Intelligent Traffic Director for Nexus 9k/7k/6k/5k

Avatar

“Why Cisco?” I was asked repeatedly after speaking on a panel about drones. “Why not Cisco?” was my passionate response.

Drone 1The occasion was the recent NASA UTM Convention at Silicon Valley’s historic Moffett Field to explore creative traffic management solutions for Unmanned Aircraft Systems (UAS), popularly known as drones. At Cisco, we see a full spectrum of public, enterprise and consumer opportunities, as well as an amazing ecosystem of partners evolving around “connected” drones. This isn’t just buzz, but a real business opportunity.

After all, drones capture and transmit “ungodly amounts of data,” as Cisco’s Helder Antunes noted during his keynote session and CNBC interview. Cisco’s network backbone, solutions and applications enable the Internet of Everything (IoE) – the connection of people, processes, data and things – and drones represent important, mobile, data-rich nodes on the network. Please also read Helder’s blog on drones and the IoE here.

drone 2When it comes to drones and many other remotely connected and mobile devices, it’s really all about Collaboration, Cloud, Fog Computing – and Analytics, whether at the edge, across the network or in the cloud. To seamlessly transform raw data from sensors and images into actionable insights, an end-to-end platform is needed to optimally capture, store, share and process data most anywhere.

For example, one of the biggest challenges for drone operations today is to efficiently collect and effectively transfer colossal amounts of data over weak or non-existent network links in remote areas. Many times, these processes take days or weeks before the collected data can be processed and meaningful insights can be derived.

Continue reading “Drones: Just Buzz or Real Business?”

Authors

Biren Gandhi

Head of Drone Business & Distinguished Strategist

Corporate Strategy Office

Avatar

Growing up, my grandfather and I were very close.  As a boy and young man, I learned a lot about the world from the stories he would tell me on his porch in Chicago about his life growing up black in the segregated south, the lessons he learned trying to fit in when he moved to the north, and his hopes for his sons and daughters—and their children—to have opportunities that he did not have.  I knew from the way he told his stories, that he was sharing special and life changing knowledge.  I would do my best to sit still and listen hard so I would remember every word.

Last week a group of 650 women from Cisco and our customers, came together in person and via Telepresence to take part in an exciting and meaningful event called the CSO Professional Women’s Day.  This gathering is a great example of the power of sharing special and life changing knowledge. The event was started three years ago by Padmasree Warrior and the women on her team as a way to share inspiring stories of personal and professional experiences – extending that “porch” in my mind.

This year the theme was Presence & Bravery and I have to tell you, all of us were doing our best to sit very still and listen hard so we would remember every word.

  • Two-star Michelin Chef Dominique Crenn energetically urged us to embrace diversity in all its forms and help connect the world by creating the platform for conversation, which is what she aspires to do every day through her food.
  • Jacqueline Novogratz, the CEO and Founder of Acumen, took us from Wall Street to Rwanda where combined her banking expertise with a passion for equality to help victims of poverty through microfunding. Her wisdom was clear in all her stories, “Courage is taking on the status quo and speaking your truth, even if it’s through trembling lips.”
  • Our Ted Talk-style panel offered us new points of view from a rock-star millennial to a pharma executive (Laura Hamill) to a woman who re-invented her career (Karine Allouche Salanon).  Winning the prize for presence was Isabella Panisci, our rock-star millennial, whose wisdom was as profound as it was fundamental, “Don’t raise quitters.”
  • Finally, leader, author, gospel singer and 20-year Wall Street veteran Carla Harris brought her leadership wisdom to life with dynamic, humorous and insightful stories that convinced us that it is always worth taking a risk because “if you don’t ask, you don’t get” and failure brings the gift of experience.

These amazing women inspired us all and demonstrated the importance and power of inclusion, diversity and “porch” wisdom. I am committed to sponsoring this event next year and I’m looking forward to driving more great forums like the CSO Professional Women’s Day in the future. Let’s keep on moving together.

Authors

Hilton Romanski

No Longer with Cisco

Avatar

Earlier this summer I was privileged to be the closing keynote speaker at the UTM Convention, sponsored by the Association for Unmanned Vehicle Systems International’s Silicon Valley chapter. The convention took place at the NASA Ames Research Center in California, and focused on the unmanned-vehicle traffic management (UTM) aspect of drones.

Helder Antunes spoke about the Internet of Everything and drones at the UTM Convention in July.  Photo Credit: NASA Ames Research Center
Helder Antunes spoke about the Internet of Everything and drones at the UTM Convention in July. Photo Credit: NASA Ames Research Center

You might be thinking, “Cisco is a networking company, why would you be involved in a drone conference?” Well, drones have to be connected, and that’s what Cisco does. They transmit massive amounts of data that must be collected, sorted, and analyzed. This is exactly where Cisco should be playing. Continue reading “Drones and the Internet of Everything: Where Does Cisco Fit?”

Authors

Helder Antunes

Senior Director

Corporate Strategic Innovations Group

Avatar

The Cisco Research Triangle Park (RTP), North Carolina campus, normally quiet over the weekend, will be alive and buzzing with activity this Saturday, September 12, as hundreds of students, robots, coaches, and volunteers gather for a day of STEM (science, technology, engineering, and mathematics) learning.

For the second year, Cisco RTP is hosting the FIRST Tech Challenge (FTC) Kick-Off in partnership with North Carolina A&T State University (North Carolina FIRST Affiliate Partner for FTC) and NC FIRST Robotics. The centerpiece of the day: Congressman David Price will present the “Game Reveal”—when wide-eyed students learn the rules and guidelines for this year’s robotics competition, and are able to see the field of battle for the first time.

U.S. Congressman David Price attended the "Game and Field Reveal" during the First Tech Challenge Kick-Off event at the Cisco Research Triangle Park campus on September 12, 2015
U.S. Congressman David Price attended the “Game and Field Reveal” during the First Tech Challenge Kick-Off event at the Cisco Research Triangle Park campus on September 12, 2015

Continue reading “Robots Invade Cisco RTP Campus this Weekend”

Authors

Ed Paradise

Cisco RTP Site Executive and Vice President of Engineering

Avatar

Shadow IT is far from a new phenomenon; but the truth is that most IT leaders have little visibility in to the full costs of these services and the risk they represent. And with this gap comes the absence of a proactive strategy for addressing the issue.

Cisco Chat - Shadow ITCompanies are using up to 15 to 22 times more cloud services to capture and store critical data than CIOs and other IT leaders are aware of – or have authorized. This phenomenon, known as Shadow IT, is a growing concern for IT leaders. So much so, that our next #CiscoChat on Tuesday, September 22 at 10:00 a.m. PST will bring together a team of experts to discuss the extent of Shadow IT challenges and the solutions leaders can use to address them.

On average, IT departments estimate their companies are using an average of 51 cloud services, when it’s more like 730 cloud services that are being used. And with this increased use of cloud services comes increased security concerns. Sensitive customer data, private company information – you name it – are all potentially at risk when employees step out on their own cloud service adventures. Risks to brands, compliance measures, business continuity and finances are also very real possibilities.

Shadow IT is growing. So what are the answers to this ever-growing concern – and how can IT align better align itself with other departments to minimize the risk? This #CiscoChat led by @CiscoCloud and joined by Ray Wang (@rwang0), principle analyst from Constellation Research, Bob Dimicco (@robertdimicco), leader of Cisco’s Cloud Consumption Service Practice, along with Ken Hankoff (@khankoff), leader of Cisco IT’s Cloud Application and Service Provider Remediation (CASPR) Group, will attempt to answer these questions and field responses from our online community. Join us on Twitter for the #CiscoChat on  #ShadowIT on Tuesday, September 22 at 10:00 a.m. PST.

 

 

 

Authors

Tina Shakour

Social Media Strategy Lead