Avatar

Over the course of the past decade, expectations of the network have changed dramatically. Customers are insisting on simpler, more agile networking. They’re also less interested in the performance of the pieces that make up the network than they are in the outcomes – the business results – the network helps them achieve.

To meet these demands, Cisco is on a multi-year journey to transform the way we monetize software. Many people have asked me for my perspective on how our approach has evolved over time and where we’re headed.  I describe this as the three phases of Cisco’s software monetization journey:

Phase 1:  Device-based “features on boxes”

For most of Cisco’s history, we monetized our innovation by selling devices – routers, switches, etc.  New device models would be released every three to four years, featuring new hardware capabilities (e.g., faster speeds) and new software features (e.g., performance-based routing).  This approach worked well for decades, as customers frequently refreshed their devices, which gave them access to new capabilities, including both hardware and software based innovation.

Over time, the relative value that customers realized shifted from hardware to software.  Mirroring what we saw in the evolution of the personal computer, improvements in hardware grew less noticeable to the end customer over time.  For example, a user could access high quality video and corporate applications just fine with either a 100 MB/sec or 10,000 MB/sec connection.

At the same time, customers were placing increasingly higher value on new software-based capabilities, like policy-based automation, enhanced security, and network analytics.  Cisco engineering had pivoted to develop these capabilities, but for many customers, having access to the latest advances only at the time of new hardware purchases was not ideal.  Our monetization approach had to change to better deliver this innovation to customers.

Phase 2:  Software Suites (Perpetual Licenses)

In January 2015 we launched Cisco ONE Software, which was a radically different monetization model for infrastructure software.  Instead of requiring customers to purchase an assortment of features with each device, they could now purchase a single software suite pre-packaged for a particular use case.  When we separated the software commercially from the underlying hardware, customers benefited from license portability – the right to transfer software licenses from one device to the next, instead of having to repurchase the licenses with replacement devices.  Finally, we simplified customer licensing for Cisco ONE Software across their environment through the Cisco Enterprise Agreement.  The market responded favorably, and over the past two-and-a-half years over 20,000 companies, including 95% of the Fortune 100, have purchased Cisco ONE Software.

Phase 3:  Software Subscriptions

While the Software Suite approach has been successful, we felt the model could be further improved by transitioning from perpetually licensed software into software subscriptions, for several reasons.

  • Faster access to innovation: a subscription model creates the right alignment with product engineering to deliver new innovation to customers on a more frequent basis
  • Better financial planning: linear and predictable budget spend, with the ability to leverage operating budgets instead of having to capitalize the software investment
  • IT agility: shorter planning cycles because of the lower cost associated with ramping software capabilities up/down

Subscription models also force vendors to “stay on their toes” and constantly delight customers or risk not having their subscription renewed.  This creates a good business dynamic and engagement model between product engineering teams and their customers.

Hence, we are continuing to rotate Cisco’s infrastructure portfolio to the subscription model.  As part of the Intuitive Network launch, we released a new way to license our core infrastructure software, through a subscription based model.  This was made available on the Catalyst and Wireless platforms.  We’ve also released subscription offers within our Data Center portfolio (e.g., Tetration, Enterprise Cloud Suite, InterSight).  Over time, we’ll transition more of the infrastructure portfolio to this model to help customers more broadly realize its benefits.

I hope this was helpful in explaining the transformation underway.  I’d appreciate your thoughts and comments below.

Authors

Dan Lohmeyer

Vice President

Product Management

Avatar

This blog post was authored by Edmund BrumaghinEarl Carter and Emmanuel Tacheau.

Summary

It has become common for users to use Google to find information that they do not know. In a quick Google search you can find practically anything you need to know. Links returned by a Google search, however, are not guaranteed to be safe. In this situation, the threat actors decided to take advantage of this behavior by using Search Engine Optimization (SEO) to make their malicious links more prevalent in the search results, enabling them to target users with the Zeus Panda banking Trojan. By poisoning the search results for specific banking related keywords, the attackers were able to effectively target specific users in a novel fashion.

By targeting primarily financial-related keyword searches and ensuring that their malicious results are displayed, the attacker can attempt to maximize the conversion rate of their infections as they can be confident that infected users will be regularly using various financial platforms and thus will enable the attacker to quickly obtain credentials, banking and credit card information, etc. The overall configuration and operation of the infrastructure used to distribute this malware was interesting as it did not rely on distribution methods that Talos regularly sees being used for the distribution of malware. This is another example of how attackers regularly refine and change their techniques and illustrates why ongoing consumption of threat intelligence is essential for ensuring that organizations remain protected against new threats over time.

Read More >>

 

Authors

Talos Group

Talos Security Intelligence & Research Group

Avatar

Digital transformation is driving explosive growth in unstructured data from IoT, video, mobility, collaboration, and analytics. Emerging applications are bringing data closer to compute, demanding a marriage of capacity and performance in infrastructure. Software Defined Storage and object storage platforms on x86 compute are becoming a destination for a lot of this data. So now is a good time to brush up on new and exciting development from Cisco and Commvault by visiting the Cisco booth at Commvault Go, November 6-8 in Washington D.C.

Commvault GO

With topics spanning your digital transformation, optimizing your cloud strategy, GDPR and your regulatory compliance needs and much more, Commvault GO is the industry event where you’ll get innovative yet practical advice to help you solve for today and plan for tomorrow.

Cisco at Commvault GO

Cisco is a Diamond sponsor of the event. Find us at booth 18 in the exhibit hall.

Catch Cynthia Johnson, Cisco VP worldwide data center solution sales, during Wednesday’s keynote.

In addition to Cynthia’s talk we have three separate sessions planned throughout the event:

  • Tuesday, November 7 at 1:00 pm; Breakout Session Area 5 – Run Simple at Scale: Commvault ScaleProtect with Cisco UCS
  • Tuesday November 7 at 3:00 pm at the Commvault booth – Cisco HyperFlex and Commvault
  • Wednesday, November 8 at 1:00 pm; Breakout Session Area 2- Commvault, Pure Storage, and Cisco: Delivering on the Promise of Operational Simplicity

 

We will be showcasing Cisco UCS S3260 storage server in our booth along with demos around our converged and hyperconverged solutions with Commvault.

Also, if you want to find out more about the recent Commvault ScaleProtect with Cisco UCS announcement, we will have technical experts on hand to discuss how this new solution can address the growing concerns of unprecedented data growth and secondary-but-critical workloads such as analytics, compliance, business intelligence, archiving, and more.

And in case you can’t make it to Commvault GO, catch our webinar: Protect, Manage, and Activate Your Data – Wherever it is Stored: Introducing ScaleProtect with Cisco UCS, on November 14 at 11am ET.

 

So make sure to catch our sessions and stop by Cisco booth #18 to learn how Cisco and Commvault work together to provide comprehensive protection across all workloads, environments and use cases. And in case you’re wondering, we have some cool giveaways to hand out if you catch a demo.

@FrancoiseBRees

Authors

Francoise Rees

Marketing Manager

Customer Solution Marketing, Cisco Intersight

Avatar

It’s now been over 6 months since Cisco announced that it had joined the Open Air Interface (OAI) software alliance, with the aim of accelerating open, multi-vendor, RAN splits and the first week of November marks a milestone in that co-operation.

If you recall, back in February, Cisco open-sourced a set of libraries and simulators that implement the Small Cell Forum’s (SCF) nFAPI MAC/PHY split base station architecture, and in May we went on to describe our intent to use our OAI membership to demonstrate how to integrate the open-nFAPI libraries into an existing LTE RAN stack. The rationale for this is clear, Cisco’s enterprise customers are increasingly expecting indoor cellular systems to provide multi-operator service. If the RAN is going to split, then the Physical Network Function, akin to 5G’s gNB-Distributed Unit, needs to support multi-operator sharing over a multi-vendor interface.

 

 

Now, 6 months later, we are pleased to announce that this week, during the OAI’s Fall Workshop in Paris, Cisco will be demonstrating an open-nFAPI enabled Software Defined Radio implementing the OAI PHY layers, communicating over the SCF’s multi-vendor defined nFAPI fronthaul interface to a Virtual Network Function implementing the OAI’s RRC/PDCP/RLC/MAC functionality. We have seen quite a number of vendors demonstrating their vendor proprietary approach to splits and virtualization, but we think this is the first time a split defined for multi-vendor operation has been realized.

Appreciating that in the same timeframe we have seen progress in terms of 5G split architectures. 3GPP has defined the F1 split between the gNB-Centralized Unit implementing RRC/PDCP and the gNB-Distrubuted Unit implementing RLC/MAC/PHY layers. This split, together with a separate OAM management approach for the gNB-DU “PNF”, are both aimed at supporting multi-vendor interoperability. Importantly, we can now see some top level architectural alignment between these different approaches, with both nFAPI and F1 splits looking able to support neutral host deployment.

 

 

We are convinced that 5G will need to focus on lowering the barriers for deploying active sharing in order to support multi-operator deployments. This naturally means addressing the thorny issue of multi-vendor interoperability of internal RAN interfaces. This week’s demonstration, showcasing the results of the co-operation between Cisco, the Open Air Interface and the open-nFAPI open-source project is a testament to that vision of 5G RAN realization. Irrespective of specific splits, we hope that being able to demonstrate how open source complements the standardization of RAN splits will improve market adoption and multi-vendor interoperability into the future.

What do you think?

Is multi-operator support going to be essential for 5G’s success?

Do you agree with GSMA when they describe 5G hetnets and the likely emergence of neutral hosting and “bring your own cell” propositions?

Will 3GPP deliver a multi-vendor F1 RAN interface able to support neutral host deployments?

 

Authors

Mark Grayson

Cisco Fellow

Cisco’s Emerging Technologies & Innovation Group

Avatar

As I prepare to head to EDUCAUSE 2017, I look to debate the impact of digitization in higher education. EDUCAUSE is attended by a wide spectrum of people from universities and colleges across North America and even around the world. Many represent IT departments and university facilities and support organizations, but an equal number serve in leadership and academic positions. Digitization has become crucial to so many parts of higher education, and it is a significant keystone of each organization’s mission. Notably, this includes the need of every institution to deliver student success.

As a dyslexic child, I failed the mainstream subjects I needed for a successful college and career path. I felt as though other students had better genes; they were born clever, with an ability to test well or to understand things more quickly. It was not until I left school that I discovered that with a word processor, a spell checker and more time, I could conquer my learning disabilities and get the qualifications society required of me.

Today, however, my focus has changed: what about all those students with similar difficulties attending school now? If student success is so crucial, I wonder if we are using the power of technology to help every student be successful. Are we adopting digital pedagogy correctly to accommodate all student needs? Are we creating next-generation learning environments that give every type of student the best platform for success?

What about all those students with similar difficulties attending school now? Are we using the power of technology to help every student be successful? Are we adopting digital pedagogy correctly to accommodate all student needs? Are we creating next-generation learning environments that give every type of student the best platform for success?

Of course, no one is born a genius. The idea that IQ is passed on in genes has been a much-debated topic over the history of education and society, and a recent article in About Intelligence argues that social and environmental factors play a critically important role in determining intelligence. (Unfortunately, dyslexia is hereditary, which means that in some cases, the development of intelligence can be hampered from birth.) The combination of factors that contribute to intelligence and learning confirm that we can’t deliver information in the same way to everyone.

What if technology could augment a learner’s genetic, social, and environmental make-up, help a student’s ability to translate information, and deliver a better opportunity to learn? This is where the concept of adopting collaborative visual notes as part of higher education becomes important; with visual notes, an educator can illustrate a student’s understanding in real time for a dramatic effect on student success. In fact, a recent article in Education Week  highlighted the use of visual notes during lessons to help students with learning disabilities become successful.

As a dyslexic student, I used visual notes to help conquer my learning obstacles, and when I first began my career in IT, I started to perfect mind mapping, which helped me mask my dyslexia disadvantage with colleagues who learned and understood new concepts more quickly. Over time, this approach has heightened my ability to absorb information and to develop a deeper understanding of information so that I can better innovate. I now create these memory maps instinctively as I listen to someone speak or read a passage. As I began to utilize whiteboards and schematics in my professional life, I was catapulted to a better IT career, one that has been very rewarding.

This approach has implications in both K-12 and higher education, as well as in the workplace, and technology exists today that can help us make life so much easier for students with learning difficulties and for the educators who teach them. For example, I recently took part in a series of higher education meetings at Gartner ITxpo in Orlando. Using a Cisco Spark Board, a graphic illustrator, I created live visual notes of each discussion using the whiteboard function.

After each session, the visual notes were available in the Cisco Spark space, and snapshots were provided to document different steps in the conversation to give context. In some cases, we needed expert advice and were able to add these remote resources right away to offer input on the whiteboards. This allowed us to show the visual notes in chronological order so anyone could see and understand the development of the content.

A couple of weeks later, I was meeting with a different group of people from the same university and walked through the visual notes, step by step. I remembered every second, in perfect clarity. The power of this visual note was incredible for the new attendees too. (For this reason, every teacher needs this for every student, on every topic… okay, I am getting too passionate.)

If we couple visual notes and collaborative teaching in a classroom, not only are we using digital education properly, but we are also facilitating inclusion for all students who need learning accommodations in real time. Collaborative platforms like Cisco Spark create the ability to do this, to enable the student and educator to collaborate on those visual notes that are never lost, and that allow continual collaboration. In addition, thanks to the fact that visual notes enable an active learning experience by offering an asynchronous teaching method that can also be used synchronously, many students with learning difficulties will be able to augment their learning in real time.

More and more academic technology leaders are coming to grips with digital pedagogy and how that impacts the digitization strategy within teaching and learning institutions. I will be excited to show them at our booth how utilizing collaborative technologies can be part of any student success program today. Combining teaching techniques and collaborative technology can deliver a platform for students with learning difficulties to exceed their goals, not just in higher education, but in their careers ahead of them.

People wonder if Cisco—and indeed, technology itself—can really make an impact on student success. Can the choice of infrastructure really make a difference with student retention? Does the adoption of digital learning techniques within the classroom really improve the graduation rate, and enhance future career prospects of students? Cisco Spark and Cisco Spark Board provide a compelling example of how technology can influence these key metrics—and an important reason why Cisco is an education company.

 

 

 

Authors

Neal Tilley

Cisco Education Advisor

Avatar

Many people call the company they work for “great” – it’s something that they feel they are supposed to do, and so they do it.

For me, it’s different.  I feel I can be my true self here at Cisco – and because of that I don’t feel I have to say anything. I say it because I want to say it, and that’s how I know Cisco is a great place to work.

I joined Cisco right out of college, 11 years ago, and I am now Cisco’s World-Wide Sales Director for Software Defined Access & Assurance. I am also African American and Mexican American with a beautiful wife of 12 years and two young boys.

To me, there are three elements of the workplace that are critical to it being “great.”

IMPACT

From student body president to basketball captain, if I could help when I was growing up to make an impact on the larger community, I was in.

It was no different when I got to Cisco.

I started as a Territory Market Manager, a new role to Cisco, not the account manager role I thought I wanted in order to be an organizational leader. I loved the role and a year later, I was asked to be an account manager in a crucial territory.

Advice: Trust your gut and things tend to work out. Your career path is one that is constantly in motion. Know where you want to go, but know that it may take many different paths to get there.

FAMILY

There are many powerful stories I could share with you here, but I want to start with the moment that solidified to me that I was more than just an employee here at Cisco – I was family.

Five years ago, I lost my sister to health complications.  At the time, I was a GEO account manager with a big sales number to hit. I was concerned about the time away from work, but my leadership was not. It’s times like these when you see the true colors of your company (and colleagues.)

My family was supported with thoughts, prayers and gifts of care – never once was I rushed back to work. This meant the world to me and I credit this act as a reason I remain with the organization today.

I also treat my team as a family.

As a leader or future leader, this is important. You are sometimes required to make a business decision that will affect your Cisco family. But as a family, we must face it head on, treat them the way you’d want to be treated, and help them the right way.

Sometimes, it’s about taking that “parent” role and encouraging your amazing team into new roles to help them get ready to “go and grow” – even when you’ll be just like those “empty nesters.”

Advice: As a leader, be supportive of your team, and you’ll have a strong business partner, and friend, for life.

CULTURE

Culture matters. And Cisco’s culture is why I can say #LoveWhereYouWork.

That culture starts with you as an individual, and if you’re a leader of a team, even more so. There is a HUGE difference in a leader and a manager.  The one that you choose to be will help develop the culture you will have.

Advice: A culture is not meant to be fun OR accountable, it is meant to be both. 

As you read this, you notice that I did not specifically talk about my race or my age in those three elements and pieces of advice. I did that on purpose.

Yes, it has shaped me.

But this message is to you, a future leader at Cisco – or wherever your career takes you.  In order to grow and elevate yourself and others at any organization, you must create environments that people thrive in regardless of race, age, gender or other characteristics; for me, that revolves around IMPACT, FAMILY & CULTURE!


Want to work at Cisco too? We’re hiring! Apply now!

 

Authors

Jason Pernell

WW Sales Director, Software Defined Access

Enterprise Networking Sales

Avatar

Introducing the Cisco Cloud Security Assessment Service

On a recent trip with my kids, one of them remarked how differently the clouds looked from the plane and how passing through them you couldn’t see theoutline that seems so clear when viewing clouds from the ground. I explained to her that when you’re looking at a cloud, what you’re really looking at is the collection of millions of tiny water droplets, not a single object.

There are certainly parallels in the natural world as in the IT world of clouds. Treating cloud security as a single object overlooks the complexity of all the moving parts. Applications you host, applications hosted elsewhere, applications you’ve sanctioned for your organization, unsanctioned applications being used in your organization, protecting the data wherever it goes, accounting for where that data goes for compliance purposes, the list goes on. And it’s no wonder cloud security continues to challenge organizations of all sizes and in all geographies.

We consistently hear from customers how they’ve spent years developing and managing a security program and how they simply want to extend that existing IT security posture to their multicloud environments. Cisco is excited to announce a new Cloud Security Assessment Service offering to assist our customers in doing just that. No matter where you are in your cloud security journey, we can help.

The Cisco Cloud Security Assessment Service offers a flexible suite of service options, including the cloud security strategy workshop and the cloud data protection, user entity behavior, and cloud security architecture assessments. We will work with you to gather data on your existing cloud usage and security risks, outline your current risk posture and define programs and activities to help you close any gaps.

When looking at a partner to assist with cloud security, it’s important to work with a vendor who not only knows business strategy or cloud services but one who understands the impact to security operations. This is where Cisco shines. As the world’s leading security provider, Cisco draws on expertise in many disciplines including security architecture design, threat intelligence, and best practices protecting data, applications, and cloud and network infrastructure utilizing sophisticated security technologies.

Our Cloud Security Assessment Service puts this expertise into practice to establish a strategic security model to help you manage risk based on your specific privacy, security, and business needs. Contact us and let us show you how we can help you extend your security to the cloud with confidence.

Authors

Player Pate

Senior Director, Product Marketing

Security

Avatar

There is a tremendous amount of emotional tension in every industry right now as women come forward and reveal their struggles with sexual harassment, and even sexual assault, in the workplace through the recent viral #MeToo campaign. It is heartbreaking to read these accounts, but necessary to open the dialogue on how we ALL want and deserve to be treated in the workplace.

I have been in the Information Technology industry for about 18 years. Having been the only female in the room for so many years, I just don’t notice it anymore. In this male-dominated industry, I have heard and seen a lot of things, but I can honestly say I have never been the victim of sexual harassment, unlike many of the brave women sharing their stories with #MeToo. I have never been offered a quid pro quo promotion, and have never been fired or demoted for speaking up about topics or situations that, as a woman, made me uncomfortable. I am lucky I haven’t had to deal with this issue much in my career. That isn’t to say I haven’t been subjected to some bad behavior, but none of it has been damaging to my career, and almost all of it has had a swift resolution.

But the real story here is the number of men who have helped me thrive as a woman in this industry. These are the men who are part of my Cisco family. At Cisco, we always think of our teams, our peers, and our co-workers as our family. We make conscious efforts to see each other as equals. We surround each other in times of need. Simply put, we’re kind to each other. As one of the relatively few females in this industry (although the number of sisters is growing quickly!), I am surrounded by some wonderful brothers who have helped me thrive in this environment. My Cisco brothers have spoken up on my behalf in meetings when they noticed inequities or heard derogatory comments about women. My brothers have literally stepped up when I faced difficult situations where I was made uncomfortable by the behavior of customers or partners. They identified these potentially bad scenarios before I was even aware, and helped prevent them from happening. My brothers at Cisco also prevent me from walking back to my car or hotel alone, no matter how much I argue that I’m a grown woman and capable of defending myself. They do this because they’re my brothers, they care, and they take care of family. I’m grateful for my brothers, and want to thank them for all their support.

Most of the negative behavior I’ve seen in my career has been a lack of awareness or education on what is and is not acceptable. My brothers and sisters at Cisco have it figured out. We are family, and we want the best for each other, so we treat each other that way. People from every industry can learn from my Cisco brothers. Let’s all ask ourselves, “How do you want others to treat your sister, your daughter, your mother in her work environment? How do you want others to think of them and speak to them?” It’s time for us all to be positive examples — to influence others to be respectful and kind.

 

 

Authors

Cindy Goodwin-Sak

Vice President

Global Security Sales - Engineering

Avatar

Industry standards enable fair competition and provide an objective “truth” to the customers. No one buys a car without first inquiring about its miles per gallon and vehicle safety ratings. Prior to the advent of standards, developed and administered by neutral parties, there was no way to compare different systems as each vendor would showcase their best performance in a contrived environment. Standards level the playing field, so to speak, bringing everyone to the same starting position and then based on their capabilities see who will finish first.

The Transaction Processing Performance Council (TPC) and the Standard Performance Evaluation Corporation (SPEC) have defined several standards for benchmarking computing systems. In recent years, the TPC has developed standards in the big data analytics and Internet of Things space: the TPCx-HS, TPCx-BB and TPC-DS V2 are standards for big data systems; while the TPCx-IoT is the industry’s first standard for IoT gateway systems.

These standards are widely used by customers in their key purchasing decisions; and they also influence technology enhancement with newer versions of products performing at higher levels with better energy efficiency at lower cost than previous versions. As pioneered by Jim Gray, et al. (in their early attempts at civilized competition) the TPC doesn’t just create the benchmarks, it also implements a process to review and monitor those benchmarks, and this lays the foundation for a fair competition.

Continuing with their charter, today, the TPC announced the industry’s first standard for benchmarking Hyper-Converged Infrastructure clusters under a database workload, TPC express benchmark HCI (TPCx-HCI). A Hyper-Converged Infrastructure is a software-defined IT architecture that virtualizes all of the compute, storage and networking resources. It enables you to make more effective use of the underlying hardware by providing flexibility and agility for workload placement.

Until now, the only available benchmarks for the hyper-converged infrastructure market have been the simple micro-benchmarks that measure IOPS. TPCx-HCI measures the performance of a complex application at the system level, and was crafted in direct response to demand from the user community.

The TPCx-HCI benchmark is designed to stress this hyper-converged platform under a demanding database workload. The standard has two unique characteristics:

  • Workload Elasticity. The benchmark features an elastic workload that varies the load delivered to each of the virtual machines by as much as 16 times, while maintaining a constant load at the cluster level. Sustaining optimal throughput for this workload on a multi-node HCI cluster would typically benefit from frequent migrations of virtual machines to rebalance the load across nodes. This property measures the efficiency of virtual machine migration as well as the uniformity of access to data from all the nodes.
  • Data Accessibility. In the Data Accessibility test, a node is powered down ungracefully, and tested for continues application uptime. The test sponsor is required to include a throughput graph for this test, demonstrating the impact on performance, as well as report the recovery time to establish the resilience of the infrastructure.

Cisco has worked closely with our industry peers, Reza Taheri, Chair (VMware), Eric Wendel (DataCore), Ncholas Wakou (Dell), Paul Cao (HPE), Da-Qi Ren (Huawei), Jamie Reding (Microsoft), Bhavik Desai & Gary Little (Nutanix), Mike Brey (Oracle), Andy Bond (Red Hat), Greg Kopczynski (VMware) in developing this benchmark. We believe that the TPCx-HCI standard will be a useful tool for buyers considering different Hyper-Converged Infrastructure offerings. The specification and kit are publicly available for download via the TPC website at: http://www.tpc.org/tpcx-hci/default.asp

Sincerely
Raghu Nambiar, Chair – TPC IoT/AI/PR

 

Authors

Raghunath Nambiar

No Longer with Cisco