Avatar

Have you ever dreamed about a network where your users get exactly the experience they need? A world without frustrated people complaining about poorly performing applications or video calls? With the recent introduction of the Cisco Digital Network Architecture (or Cisco DNA, as we like to call it), those days are not as far off as they may have seemed.

The Cisco DNA platform delivers on Cisco’s commitment to innovative, flexible, and secure networks. Along with the announcement of DNA came the first wave of solutions that take advantage of it.  And that is just the beginning. There’s much more on the way that can help you realize the benefits of network programmability, analytics, and virtualization.

A perfect example: Our Collaboration engineering team has been working to leverage DNA’s controller-based automation and open APIs to deliver a better collaboration user experience.

A major benefit of DNA’s programmability is that things that were statically defined—configured once and usually left alone—can now become dynamic.  This provides capabilities that simply weren’t possible before. We’re leveraging this in Cisco Unified Communications Manager (CUCM) with a new feature called Dynamic QoS.

Before DNA, IT teams deploying desktop and mobile clients like Cisco Jabber had to make a decision:

  • Make things very secure by disabling QoS and living with the resulting poor audio and video quality
  • Trust and prioritize some or all client traffic, leaving an opening to potential abuse of the QoS policies and the risk of degraded network performance for business-critical apps

With DNA, CUCM can program the network by means of the APIC-EM controller to dynamically set up QoS for calls at the time they are placed. This is an elegant solution that gives IT and users the best of both worlds:

  • The proper QoS marking and treatment policy is applied end-to-end in the network, specifically for the audio and video traffic from the soft client.
  • Trust established on the back end, between CUCM and APIC-EM, requires nothing special on the client device. When the call is over, the policy is automatically removed from the network.

You can get a good view of how this works by watching the recent Cisco TechWiseTV on DNA. (Start at 11:00 minutes into the session for the specifics on Dynamic QoS.)

https://www.youtube.com/watch?v=314-NyizsCA

collab DNA blog image 4_2016Troubleshooting problems is another area in which DNA helps Collaboration. It can be extremely tedious to find the root cause of poor video quality across a complex network. It’s a bit like looking for needle in a haystack:

  • Is there a misconfigured switch port?
  • An overloaded link?
  • An SP not meeting the SLA?

Finding the device or link at the source of the problem can take the majority of the time spent resolving it.  Prime Collaboration Assurance integrates with a DNA network to provide a visualization of the layer 2 and layer 3 network devices along the media path and speed up the identification of the root cause.

These are just two examples of the power of DNA.  We’re already working on several other areas of integration, enabling Cisco Collaboration to leverage DNA. Creating these integrations is relatively easy and sustainable using DNA’s open, model-driven RESTful APIs. In fact, these same APIs simplify the ability of IT organizations to create their own integrations for their specific business needs.

Cisco DNA can give you the control to support your organization’s digital ambitions — faster, easier, and more securely than ever before. Here’s to the new exciting chapter in software-driven networking.

Authors

Jon Snyder

Product Manager

Collaboration Technology Group

Avatar

2016 is shaping up to be one of the most exciting times for higher education in Australia, with universities taking an active and important role in digitizing not only campuses but the wider Australian economy. If Australia is to be a genuine force in the digital economy, then universities will need to play several roles as sources of innovation and IP, talent managers and hubs of collaboration.

From a talent perspective, universities must educate our future workforce to be prepared to innovate and thrive in a digital world, not just to be domain specialists. Universities also have an important role to help the industry navigate the digital transformation by bringing a broad range of knowledge and IP to the table.

With this context in mind, and wearing my dual hats as both the Vice President, Australia New Zealand for Cisco and President of B/HERT (Business & Higher Education Roundtable), it was my great pleasure to partner with the University of Queensland in February to host the Presidents’ Conversation in Brisbane.

This was Cisco’s second time convening a Presidents’ Conversation, following the first event which was held in San Jose, California in 2013. The Chatham House rules-style conference brought together 12 university presidents and vice-chancellors from around the world to discuss what digitization means for the economy, and the role and opportunity for universities.

The teaching and learning function of universities has been particularly transformed by digitization. According to a recent McKinsey report, there is still a disconnect between what educational providers and employers perceive to be necessary in terms of skills for the workforce. 72 percent of educational providers think graduates have the necessary skills needed for employment, versus 39 percent of employers. This creates another collaboration opportunity, where business employers need to do more to identify what skills are needed long-term, and for universities to evolve the curriculum accordingly.

So what are the challenges that universities face today in getting students ready for jobs that perhaps don’t even exist yet? And how can they offer an educational experience that is synonymous with the world that “digital natives” have been born into?

The idea that we’re living in an “attention economy” brings with it a range of challenges, given that lecture halls have been the de-facto areas for knowledge transfer in universities, whereas human attention drops off sharply after seven minutes of concentration.

In addition to the formal aspects of education for an agile, innovative, and resilient workforce and society, universities have an important role as ‘ideal connectors,’ within the digital eco-system. One recent and clear example of this type of collaborative behavior is Cisco’s partnership with both Curtin University in Perth as the site of the first Cisco Innovation Centre in Australia, and our partnership with the University of New South Wales in Sydney for the second Australian site for Cisco’s Innovation Centre, which was formally launched last month.

The Presidents’ Conversation was an excellent forum for global higher education leaders to discuss changes in education and it’s pleasing that this conversation was held on Australian turf, as Australia has the capacity to innovate at scale, and capture the benefits of digitization as a prime exporter of higher education.

Key insights from the Presidents’ Conversation:

  • Universities must shift the paradigm that rather than being standalone institutions, they are active and important participants within a digital ecosystem. This requires a mind-set of collaboration and open partnerships so that universities can help to co-create the future and act as advocates for new theories and technologies as they come to life.
  • As educators, universities have the capability, and therefore the onus to put frameworks in place for a new, exciting and at times challenging workforce proposition. To help create a citizenry that has been educated to enable change, cope with change, be resilient, innovate and thrive.
  • Overcome internal bureaucracy to be an important part of the innovation eco-system – creating and fostering innovation within, so that universities are changing and adapting at the same rate as the society, government and enterprise.
  • All universities have a massive incentive and need to develop and grow their own digital capabilities (including infrastructure, people & programs), as a platform for innovation.

Authors

Ken Boal

Vice President

Cisco Australia & New Zealand

Avatar

When we launched our District Court and International Trade Commission (ITC) actions in 2014, we promised to provide ongoing updates on their progress.

On February 2, Judge Shaw issued a ruling in the first ITC case (‘944) that Arista had violated three of five Cisco patents. Despite a large number of redactions, the reasons for the judge’s decisions are clear in the remedies or recommended determination document and the initial determination document. To aid transparency, Cisco asked for just six lines to be redacted from the nearly 300 page document. Both Cisco and Arista asked that the full Commission review the determination.

Today the Commission determined to undertake the review. You can read the public version of their determination here. Time for the review was included in our previously-communicated timelines, so we do not expect any change of schedule. We welcome this additional review by the full Commission, and believe it is an important step in the comprehensive investigation and review of evidence by the ITC.

The second ITC case (‘945) is still ongoing and was recently extended due to resource challenges at the ITC. We appreciate the work of Judge McNamara and her staff under extenuating circumstances. The extension is not a comment on the facts in the investigation, which we believe will show further infringement of Cisco technology by Arista.

Arista must still face two District Court juries in the “Networking Features” and “Operating System and Interface Features” cases. The first case has been stayed pending the outcome of the ITC investigations. The trial for the second case is scheduled to begin on November 28, 2016.

 

Edited to correct date for opening arguments in second District Court trial

Authors

Mark Chandler

Retired | Executive Vice President

Chief Legal and Compliance Officer

Avatar

pratap_picture[1]Guest Blogger: Pratap Pereira, Distinguished Engineer, Enterprise Networking Group.

Pratap sets the long-term engineering direction for IOS and IOS-XE at Cisco. He was a founding engineer of IOS-XE and has seen it grow from the first commits of a new foundational infrastructure for routing platforms into a comprehensive software stack for the entire enterprise portfolio. He was directly responsible for large parts of the implementation of infrastructure components including domain-specific languages, in-memory databases, in-service software-upgrades, compilers, state distribution systems at the heart of networking products and has been instrumental in maintaining the conceptual integrity of the overall software. He has a Ph.D. in Electrical Engineering from The Ohio State University.

The networking industry has always been about producing products and solutions that revolutionize distributed computing. The ability of routing protocols to disseminate information effectively at a dramatic scale and with tremendous resilience is the foundation on which the Internet runs. The natural counterpart to this is the functionality of being able to sling packets at astounding scale in software and in hardware. Network-level resilience to faults is considered table stakes today. These characteristics and abilities are aspects that Cisco has been front-and-center in making possible.

As you may have read in Suresh Sangiah’s recent blog, we set about a couple of years ago to reimagine how the engineering team develops software at Cisco to better enable an infrastructure attuned to the digital era, as an integral part of our new Digital Network Architecture strategy. We chose to base it on our strengths and pivoted completely to an internal canonical distributed database model for all state dissemination. In IOS-XE, the precursor to our current work, we built a mixed mode system with a pragmatic split between message-passing parts of the system and in-memory databases to store state. We have been pushing the boundaries on high performance in-memory databases, which have been running at route scale for the last six years, in currently shipping products. We are now generalizing our databases expertise to form the core of the latest evolved IOS-XE foundation. What this facilitates is an inherent ability to be flexible in the location of processing. The ability to be location-independent in processing is a phenomenal capability when extended to the complete portfolio of enterprise products. We have solved the general problem of having relative ease with which different types of products can be synthesized to meet diverse customer requirements. These capabilities deliver major advantages for customers existing networks and we expect will also drive an entirely new generation of category-defying products.

AR85019In the internal development environment, I am proud to say that for the entire routing, switching and wireless control plane to data plane interface we have completely converted to a formal model-driven software interface. This is an internal model, which gives us an independent foundation on which to rapidly develop functionality with zero impedance mismatch or translation layers. The distinction between internal interfaces and external interfaces is an important one. The internal models are the essence of the core competency of Cisco as a software organization. It has to progress at the pace of internal innovation and must withstand the test of time. Setting the expectation for a large development organization to have a simple, single mental model for how software is developed paves the way for excellence. Equally, introducing capricious wanton changes that chase after every shiny new object would not do well when setting expectations with a large group of engineers. The ability to change our very foundation is a deeply deliberative task, which we successfully accomplished with evolved IOS-XE. The expectation is that evolved IOS-XE will be our stable foundation for a period of time until the next substantial software stack upgrade. We will speak more, in subsequent blog posts, about how the complete software stack at Cisco lines up.

The design points for internal and external software interfaces are very different, necessitating a split in the way we design and implement them. We are also automating the conversion from our internal model to higher levels of abstraction to and from standards-based interfaces, which we have always supported and will continue to support. This allows us to support new external interfaces and operating models as they evolve with relative ease, very rapidly. Furthermore it allows for overall system efficiency by only performing a single transformation/translation step to and from the external representation. The normalization into this internal canonical representation also permits huge leaps to be taken in the consistent way in which issues can be triaged and fixed. The comprehensive ability to support telemetry, deep visibility, event/trace analytics is inherent within our software stack and is applied automatically across all the software we develop in the new environment.

For us working on evolved IOS-XE, we started out wanting to reseat the entire application logic layer sitting on top of a new software stack, which was built upon a new foundation, all while ensuring that our products continue to function well. Folks internally likened it to changing the engines on a large airplane that was in mid-flight. The changes implemented are deep and substantial and have set us up for the long haul. Over the next set of software releases more capabilities of the new software stack will be exploited to produce transformative user experiences. If we don’t produce a jaw-dropping experience across every instance of interaction and have our customers remarking, “How did they do that,” I would not have done my job!

Authors

Anand Oswal

No Longer with Cisco

Avatar

Hello from the open road! The Civil Rights Museum on Wheels and I are currently en route to Atlanta, Georgia. It’s been an exciting trip so far – here’s what we’ve been up to:

Day 1:

DDpic1
Me, Van, at the first stop — Washington, DC!

The bus and I arrived at the Martin Luther King Jr. Memorial in Washington, DC on Wednesday. Our special guests were three attorneys from the U.S. Department of Education’s Office for Civil Rights, who joined me on the bus for our Digital Civil Rights class. Students from Hillsborough and Rochester joined via TelePresence for a lively discussion on what civil rights mean in today’s world.

DDpic2
Attorneys from the U.S. Department of Education’s Office for Civil Rights speaking to students.

Day 2:

Day two of our journey began with a “detour” – not a bad one though. Folks were so impressed with the Destination Diversity tour that they asked us to share it with students and staff at a local DC public high school. So off we went to McKinley Technology STEM Campus for a great visit!

DDpic3
The Destination Diversity bus parked outside of McKinley Technology STEM Campus.

Shortly after we left, we were confronted with another kind of detour – this one not so good. The bus wouldn’t start!

Thank goodness I found some friends who helped me get the bus up and running and on its way again.

DDpic4
The bus had some mechanical difficulties along the way.

Day 3:

On Day three, we encountered yet another problem. The 55-inch TelePresence monitor wasn’t on the bus any longer as my road partner, Pat Monaghan, had taken the monitor to Greensboro to get it set up in advance. So there I was, stuck in D.C. without any means to participate in the conversation. But then I remembered a recent conversation that I had with someone from Cisco about the WebEx smart phone app, so I decided to give it a try. It worked like a charm. Within minutes of downloading the app I was able to participate in a three-way conversation, video and all, with the students from New York and Florida.

Students in Rochester listening to the DC speakers.
Students in Rochester listening to the DC speakers.

You know we could have just as easily called this experience “Destination Digital” rather than Destination Diversity. Seriously – perhaps more than anything else, this most recent experience has convinced me that next-generation technology is the key to our children’s educational success. Perhaps as a result of Destination Diversity we’ll convince others of the importance of this type of learning. In fact, Education Week just featured a story about our journey in search of diversity and digital excellence.

Our next stop is the King Center in Atlanta, where we’ll talk to civil rights activist Clarence Ford. If you’d like to join our class, you can! It will take place at 10:30 AM EDT on Tuesday, April 12, and you can follow along on the livestream right here. After that, I’ll be taking the bus to its last stop – Florida! There, I’ll be able to meet the Hillsborough students in person, and they’ll get a chance to see the Civil Rights Museum on Wheels with their own eyes. Hopefully there won’t be any detours along the way!

I’ll be back with a post to wrap up the Destination Diversity tour next week, but in the meantime, follow along with @RCSDDigiClassrm and #DestinationDiversity on Twitter and Destination Diversity on Facebook for more updates from the road!

Authors

Van Henri White

School Board President

Rochester City School District

Avatar

We live in a world of choices and so do our customers. (Ask a bunch of folks which beer they like to drink and you will realize what I am talking about 🙂 ).  I have met a lot of customers who are using different orchestration agents in their environments.   After hearing about Cisco ONE Enterprise Cloud Suite , one of their common questions tends to be, can I use Cisco ONE Enterprise Cloud Suite with my (“existing”) orchestration agent?

Before I answer the question, let me give you a very brief introduction of Cisco ONE Enterprise Cloud Suite (just in case you are not already familiar with it). Cisco ONE Enterprise Cloud Suite is a complete hybrid cloud management solution by Cisco. As the name suggests, it’s a suite of products (including Cisco UCS Director, Cisco Intercloud fabric, Cisco Virtual Application Cloud Segmentation, Prime Services Catalog) that integrate well with each other and manage all aspects (security, compute, network, storage) of your hybrid cloud.

Coming back to the question “can a customer use Cisco ONE Enterprise Cloud Suite with their existing orchestration agent”?

Both UCS Director and Prime services catalog provide great GUIs to manage and orchestrate hybrid cloud.  But if you want to use your own orchestration tool, you can use any tool which can call REST APIs. Cisco ONE Enterprise Cloud Suite products expose REST APIs. I am not saying that the integration (between Cisco ONE Enterprise Cloud Suite and your orchestration tool) is available out of the box. There is definitely some work involved, but it can be done if you are familiar with your orchestration tool and how it can call REST APIs.

In this blog, I have shown how Ansible Tower can be used to deploy Virtual machines (in both private and public cloud) using Cisco ONE Enterprise Cloud Suite.  In Ansible Tower, you  can create job templates (as shown in Figure 1) to do things like “get all catalogs present in UCS director”  or “instantiate a VM  in private or public cloud” using UCS Director or Intercloud Fabric.  The user can simply select a job and launch it from Ansible Tower.

job3

Figure 1: List of Job templates created in Ansible Tower

As seen below, the user launched “Instantiate_VM_in_private_cloud_UCSD” job from Ansible Tower and was shown the pre-populated variables. User can choose to modify or keep the same variables. Once the job is launched, UCS director received a service request to create VM.

ucsd-final

Similarly a user can launch a job (from Ansible Tower) which wills instantiate VMs in public cloud (using Cisco Intercloud Fabric in the background).

icfd-final

I have uploaded the Ansible playbooks used in above examples on github. Please note, these playbooks are only to help you understand how to write an Ansible playbook to call Cisco ONE Enterprise Cloud Suite REST APIs. They are not tested/validated by Cisco.

To summarize, Cisco ONE Enterprise Cloud Suite provides great GUIs (out of the box) to manage your hybrid cloud. But if you want to continue using your “own” orchestrator with Cisco ONE Enterprise Cloud Suite, you can do so using Cisco One Enterprise Cloud Suite’s REST APIs.  The above example shows how to integrate a well-known configuration management tool called Ansible with Cisco ONE Enterprise Cloud Suite.

Hope you learned something new from this blog 🙂 .

 

Authors

Chhavi Nijhawan

Technical Marketing Engineer

Cloud and Virtualization

Avatar

Anyone remember The Jetsons or Jetson’s reruns?  I loved Rosie, the Jetson’s robot assistant.  I dreamed of having Rosie clean my room and bring me snacks.    While I don’t have Rosie yet as my personal assistant, it is clear that electronic robots (“bots”) are playing a bigger role in how we collaborate, work and play.  My question for this post is – how should we use Spark and Spark bots to provide better customer care?

Personal collaboration tools and social media have significantly influenced the way we socialize. They’re also transforming how we collaborate at work and interact with businesses. To keep pace, product and service providers need to adapt how they deliver customer care to match or exceed the ways we interact in our personal lives as these worlds become more and more blended.

At Enterprise Connect last month, Cisco announced availability of Cisco Spark service–the industry’s first integrated, cloud-based collaboration service. Spark brings social collaboration to the workplace. It also allows you to reimagine how you deliver customer care to a population that is increasingly digital.

Cisco Spark already offers customer care voice features:

  • Hunt Groups, which determine how to route inbound calls to contact center agents
  • Auto Attendant, which can provide an automated “front end” to a business

But Spark can also augment team collaboration in the contact center by allowing agents and back-office experts to discuss topics, share news, and solve customer issues.

And there’s more. Cisco’s announcement mentioned how new Spark bots can help simplify work life. Have a question and don’t know who can answer? Imagine a Spark bot that will either answer directly or connect you with a human who can help you. Spark provides the mechanism for identifying communities of experts. Cisco’s Customer Care team is leveraging that structure to enable a support model that works within Spark.

And, if you loved the Jetsons like me, see this article for more ways the shows predictions came true.

We have lots of ideas about how Cisco Spark can enable customer care. But we’d like to hear from you. Have something you would like to see? What capabilities can you imagine? Use the comments to let us know.

Authors

Carmen Logue

Product Manager

Cisco Customer Care Business Unit

Avatar

Hackers today make it their job to understand your security technologies and how to exploit the gaps between them. And that’s the problem – there are a lot of gaps.

In our own discussions with IT security pros, it isn’t unusual to find organizations that have deployed a patchwork of 40 to 60+ different security tools. Typically, organizations see a security problem that needs solving… and then buy a box. Slowly but surely they continue to add to this mixed bag of security tools that don’t—and can’t—work together. Not all of these tools will perform tasks that are complimentary to each other. Most (if not all) of these tools will not be able to share threat intelligence, security events, or indicators of compromise amongst them. With so many tools performing overlapping functions or not communicating with each other, this introduces complexity—complexity in management of all these tools and complexity in how your security team deciphers data from all these tools to make good security decisions. As Marty Roesch said at this year’s RSA, “complexity is the enemy of security.”

Naturally, this creates a lot of gaps in defense. And the trend continues: each new type of cyberattack spurs a new security tool to defend against it, and security spending continues to rise. Research by Gartner finds that worldwide spending on information security will reach nearly $77 billion by the end of the year, climbing eight percent for the last two years in a row. Meanwhile, respondents to the 2015 CISO Survey by Citi Research, a division of Citigroup Global Markets Inc., say they are willing to increase the number of security vendors in areas like network security, vulnerability scanning, and SIEM.

Fragmented offerings across multiple vendors create headaches in three key areas:

  1. Overall performance – Most organizations have deployed security technologies across some combination of networks, endpoints, web and email gateways, virtual systems, mobile devices, and the cloud. But there is limited communication, if any, between components. Users have to manually correlate information and piece together clues to identify a potential advanced threat.
  2. Time to detection – Because of this lack of communication between technologies, there’s a lag in finding threats. Based on current research in the 2016 Cisco Annual Security Report, the current industry standard for time to detection is 100 – 200 days. That’s far too long. By the time a breach is discovered, valuable assets have been compromised and a significant volume of data has been exfiltrated.
  3. Cost – Doing integration in-house, managing multiple technologies, and manually correlating and analyzing data drive technology and talent costs up. In fact, CISOs in the Citi survey complain of the global talent shortage resulting in “salary wars” for trained and experienced IT security personnel—if they can even find them.

But what if these security technologies could work together and share information? What if you could get better communication and integration to know what devices, operating systems, and applications are running on the network; how they are configured; who is using the devices and systems; what they are doing; and how data is moving across the environment. With this visibility you can add context based on local and global threat intelligence for faster time to detection. From there, you can apply controls using analysis and automation for a more systematic response to threats. Integration and automation also reduce operating expenses and make this approach to security much easier to manage with existing staff. Cisco Advanced Malware Protection (AMP) provides this.

Cisco AMP is an integrated system that provides protection across all attack vectors. It’s not a collection of stand-alone point products. AMP is a technology that spans a multitude of attack vectors, from endpoint to network, NGIPS, firewall, email, web, servers, and mobile devices. AMP capabilities are available at the endpoint, integrated into the Cisco ASA firewall, the Cisco Firepower NGIPS, Cisco ESA, Cisco WSA, Cisco CWS… the list goes on. Each deployment can communicate and share information between them. Furthermore, built into every AMP deployment is the power of Threat Grid sandboxing, providing static and dynamic analysis of unknown files to help security teams uncover the stealthiest of threats.

With one technology that is devoted to finding advanced threats and implemented across the Cisco security architecture, communicating and sharing information, organizations can avoid the gaps that a patchwork of disparate security products from multiple vendors inevitably creates.

Learn more about AMP here or watch this video to see how the Cisco IT Security Group uses the power of AMP’s integrated approach to increase their security effectiveness.

Authors

John Dominguez

Product Marketing

Cisco Security Business Group

Avatar

The rise of ransomware over the past year is an ever growing problem. Business often believe that paying the ransom is the most cost effective way of getting their data back – and this may also be the reality. The problem we face is that every single business that pays to recover their files, is directly funding the development of the next generation of ransomware. As a result of this we’re seeing ransomware evolve at an alarming rate.

In this blog post we explore traits of highly effective strains of self-propagating malware of the past, as well as advances in tools to facilitate lateral movement. This research is important as we expect adversaries to begin utilizing these capabilities in ransomware going forward. This blog post focuses on two avenues of thought – that our past is chock full of successful malware, and that successful cyber extortionists will look to the past to create new and evolving threats going forward.

Ransomware as we know it today has a sort of ‘spray and pray’ mentality; they hit as many individual targets as they can as quickly as possible. Typically, payloads are delivered via exploit kits or mass phishing campaigns. Recently a number of scattered ransomware campaigns deliberately targeting enterprise networks, have come to light. We believe that this is a harbinger of what’s to come — a portent for the future of ransomware.

Traditionally, malware was never terribly concerned with the destruction of data or denial of access to its contents; With few notable exceptions, data loss was mostly a side-effect of malware campaigns. Most actors were concerned with sustained access to data or the resources a system provided to meet their objectives. Ransomware is a change to this paradigm from subversion of systems to outright extortion; actors are now denying access to data, and demanding money to restore access to that data. This paper will discuss the latest ransomware trends as well as how to defend your enterprise against this threat.

 

Read more >>

Authors

Talos Group

Talos Security Intelligence & Research Group