Friday 12 January 2018

Why Digital Success Depends on the Right Network

Many of us often gravitate to the “bargain”.  We’re intrigued by one-day only deals.  However, when it comes to long-term purchases, we’re typically guided by quality, brand, and safety.  We don’t want to “go cheap” when building a house or buying a car.  We recognize the importance of a strong foundation and company name.  It’s the same with our networks. Making networking choices based on what initially appears cheapest inevitably leads to undesirable outcomes. And this is particularly important in today’s digital era.

Thursday 11 January 2018

Bridging the gap between IT and Business through Big Data Analytics

The role of IT and networking specifically as we know it, is changing in the eyes of many Cisco stakeholders, primarily: (1) IT Experts and (2) Business Leaders. This combined with the changing expectations of the millennial generation will have a huge impact on the next market transition. Simplistically, network’s power to influence business outcomes cannot be underestimated. By combining network data with secondary sources of business critical information: cost, service management, user and compliance data and device diagnostics, companies like Cisco can empower businesses to optimize operations, profitability and decision-making. Concisely, using telemetry we can improve the productivity at any level of the organization.

Tuesday 9 January 2018

Meltdown proves that the industry needs a better answer for protecting cloud content

Security researchers announced this week that they had discovered a significant vulnerability in almost every computer on the planet. This vulnerability – actually two related ones called Meltdown and Spectre – allow a malicious application running on a computer to peek into the memory of another application on the same computer and suck out its contents. This is most devastating in public cloud environments where applications from different customers often end up running on the same physical computer.

Friday 5 January 2018

It’s time to move away from SNMP and CLI and use Model-Driven Telemetry

Traditional features such as SNMP, CLI, and Syslog, used for collecting operational statistics from a network, have several restrictions due to the growth of the objects like IoT devices and cloud based applications.

Thursday 4 January 2018

Defending Against The $5B Cybersecurity Threat – Business Email Compromise

If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has the right technology in place to validate email senders so they can focus on doing their work. But this is why attackers succeed. Their target thinks the email is coming from someone they trust and consequently, their organization gets breached. This type of attack is called Business Email Compromise (BEC), email spoofing or spoof abuse. The FBI estimates it has cost companies $5.3B globally – far more than the $1B in 2016 for ransomware.

Tuesday 2 January 2018

Cisco UCS Automation – Part 2: A Step-by-Step Guide to Connecting and Disconnecting using UCS PowerTool

Let’s Connect


What’s the hardest part about meeting someone new or going to another country or just interacting with something you are unfamiliar with? Typically, it’s how to start the interaction, how do you connect, stay connected, and reconnect. Sometimes the relationship or the place just doesn’t work out and then you have to leave or disconnect.

Friday 29 December 2017

Cisco UCS Automation Series, Part I – Getting Started with UCS PowerTool

You WANT to Automate! But Where to Start?


You want to automate but not sure where to start or what tools to use or even what processes can be automated and if the thing you want to automate is even automatable. Does it offer an API? If it does, is there an SDK? Are there samples of what can be done? What has been done? How much can be done? A lot of questions typically bog down the process, mire you in indecision and eventually you give up!