The role of IT and networking specifically as we know it, is changing in the eyes of many Cisco stakeholders, primarily: (1) IT Experts and (2) Business Leaders. This combined with the changing expectations of the millennial generation will have a huge impact on the next market transition. Simplistically, network’s power to influence business outcomes cannot be underestimated. By combining network data with secondary sources of business critical information: cost, service management, user and compliance data and device diagnostics, companies like Cisco can empower businesses to optimize operations, profitability and decision-making. Concisely, using telemetry we can improve the productivity at any level of the organization.
Thursday, 11 January 2018
Tuesday, 9 January 2018
Meltdown proves that the industry needs a better answer for protecting cloud content
Security researchers announced this week that they had discovered a significant vulnerability in almost every computer on the planet. This vulnerability – actually two related ones called Meltdown and Spectre – allow a malicious application running on a computer to peek into the memory of another application on the same computer and suck out its contents. This is most devastating in public cloud environments where applications from different customers often end up running on the same physical computer.
Friday, 5 January 2018
It’s time to move away from SNMP and CLI and use Model-Driven Telemetry
Traditional features such as SNMP, CLI, and Syslog, used for collecting operational statistics from a network, have several restrictions due to the growth of the objects like IoT devices and cloud based applications.
Thursday, 4 January 2018
Defending Against The $5B Cybersecurity Threat – Business Email Compromise
If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has the right technology in place to validate email senders so they can focus on doing their work. But this is why attackers succeed. Their target thinks the email is coming from someone they trust and consequently, their organization gets breached. This type of attack is called Business Email Compromise (BEC), email spoofing or spoof abuse. The FBI estimates it has cost companies $5.3B globally – far more than the $1B in 2016 for ransomware.
Tuesday, 2 January 2018
Cisco UCS Automation – Part 2: A Step-by-Step Guide to Connecting and Disconnecting using UCS PowerTool
Let’s Connect
What’s the hardest part about meeting someone new or going to another country or just interacting with something you are unfamiliar with? Typically, it’s how to start the interaction, how do you connect, stay connected, and reconnect. Sometimes the relationship or the place just doesn’t work out and then you have to leave or disconnect.
Friday, 29 December 2017
Cisco UCS Automation Series, Part I – Getting Started with UCS PowerTool
You WANT to Automate! But Where to Start?
You want to automate but not sure where to start or what tools to use or even what processes can be automated and if the thing you want to automate is even automatable. Does it offer an API? If it does, is there an SDK? Are there samples of what can be done? What has been done? How much can be done? A lot of questions typically bog down the process, mire you in indecision and eventually you give up!
Wednesday, 27 December 2017
Thank You Cisco ISR G2 2900 and 3900 Series Routers
Over the past 9 years, the Integrated Services Router (ISR) G2 router portfolio has helped tens of thousands of Enterprise and Service Provider customers build, secure, grow, and transform their businesses. It has been the most successful router product line in the history of branch networking.