When it comes to managing hyperconverged infrastructure, simplicity is the key. Unfortunately, for many solutions the underlying infrastructure is inflexible and complex and so is cluster management. We designed Cisco HyperFlex Connect with three goals: to make it super easy to use; unify the management so you don’t have to switch between platforms to mange multiple clusters; and to make the interface smart and intuitive.
Monday, 15 January 2018
Friday, 12 January 2018
Why Digital Success Depends on the Right Network
Many of us often gravitate to the “bargain”. We’re intrigued by one-day only deals. However, when it comes to long-term purchases, we’re typically guided by quality, brand, and safety. We don’t want to “go cheap” when building a house or buying a car. We recognize the importance of a strong foundation and company name. It’s the same with our networks. Making networking choices based on what initially appears cheapest inevitably leads to undesirable outcomes. And this is particularly important in today’s digital era.
Thursday, 11 January 2018
Bridging the gap between IT and Business through Big Data Analytics
The role of IT and networking specifically as we know it, is changing in the eyes of many Cisco stakeholders, primarily: (1) IT Experts and (2) Business Leaders. This combined with the changing expectations of the millennial generation will have a huge impact on the next market transition. Simplistically, network’s power to influence business outcomes cannot be underestimated. By combining network data with secondary sources of business critical information: cost, service management, user and compliance data and device diagnostics, companies like Cisco can empower businesses to optimize operations, profitability and decision-making. Concisely, using telemetry we can improve the productivity at any level of the organization.
Tuesday, 9 January 2018
Meltdown proves that the industry needs a better answer for protecting cloud content
Security researchers announced this week that they had discovered a significant vulnerability in almost every computer on the planet. This vulnerability – actually two related ones called Meltdown and Spectre – allow a malicious application running on a computer to peek into the memory of another application on the same computer and suck out its contents. This is most devastating in public cloud environments where applications from different customers often end up running on the same physical computer.
Friday, 5 January 2018
It’s time to move away from SNMP and CLI and use Model-Driven Telemetry
Traditional features such as SNMP, CLI, and Syslog, used for collecting operational statistics from a network, have several restrictions due to the growth of the objects like IoT devices and cloud based applications.
Thursday, 4 January 2018
Defending Against The $5B Cybersecurity Threat – Business Email Compromise
If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has the right technology in place to validate email senders so they can focus on doing their work. But this is why attackers succeed. Their target thinks the email is coming from someone they trust and consequently, their organization gets breached. This type of attack is called Business Email Compromise (BEC), email spoofing or spoof abuse. The FBI estimates it has cost companies $5.3B globally – far more than the $1B in 2016 for ransomware.
Tuesday, 2 January 2018
Cisco UCS Automation – Part 2: A Step-by-Step Guide to Connecting and Disconnecting using UCS PowerTool
Let’s Connect
What’s the hardest part about meeting someone new or going to another country or just interacting with something you are unfamiliar with? Typically, it’s how to start the interaction, how do you connect, stay connected, and reconnect. Sometimes the relationship or the place just doesn’t work out and then you have to leave or disconnect.