Sunday, 4 February 2018

Cisco Container Platform – Kubernetes for the Enterprise

Developed by Google to shepherd their in-house container clusters, Kubernetes has been vying for the attention and adoption of cloud architects. For the past several years, Docker Swarm, Mesos and Kubernetes have engaged in the duel to bring orchestration nirvana to containerized applications. While there are other participants in the fray and while Mesos has had a longer showing, Kubernetes seems to be capturing the pole position according to this research. This assertion is reinforced by the recent addition of support for Kubernetes to Apache Mesos, to Pivotal Container Service and to Cloud Foundry. The most recent admission of market realities is Docker’s seamless integration of Kubernetes into their Enterprise Edition offering. Whichever container orchestrator eventually arises as the de facto standard, it is clear that enterprises are looking for more and more infrastructure abstraction so they can laser focus on core business objectives.

Friday, 2 February 2018

Network Visibility for Mergers and Acquisitions

Mergers and acquisitions bring major challenges to nearly every aspect of a business, but integrating two different networks while maintaining enterprise security is perhaps one of the most demanding trials an organization can undergo.

Every organization has their own security policies, and applying new ones to hundreds or even thousands of new machines and users can be a logistical nightmare. On top of that, increasing the size of a network also increases its threat surface, potentially giving attackers new avenues to gain access and compromise sensitive data.

Wednesday, 31 January 2018

Cisco and IBM: Partnering for Better Security

Considering the spate of cyber threats faced by customers, the need to more easily prioritize these threats, understand the scope and veracity of the attacks, and subsequently automate the responses, has never been more critical. While many security vendors exist to address some challenges, no single technology or vendor provides the complete security customers require. Therefore, providing this extended protection often requires a collaborative ecosystem of security vendors.

Monday, 29 January 2018

Cisco Operational Insights: A New Way of Seeing Operations

Businesses thrive when they create value for their shareholder and stakeholders by maximizing revenues and minimizing costs. Technology, especially wireless and IoT, can be invaluable tools to achieve these goals. But, when it comes to operating costs, these IT pillars, while incredibly valuable, only address part of the challenge.

Friday, 26 January 2018

Flexible Algorithm makes Segment Routing Traffic Engineering even more agile

As more and more Service Providers and Enterprises operate a single network infrastructure to support an ever-increasing number of services, the ability to custom fit transport to application needs is critically important.

In that respect, network operators have been exploring Traffic Engineering techniques for some years now but have obviously run into many scaling issues preventing them from having an end-to-end, fine-grained control over the myriad services they offer.

Thursday, 25 January 2018

IoT Edge Compute Part 1 – Apps and Deployment on Cisco IoT Gateways

Why We Need Edge Compute


We have been hearing about the increasing need for compute at the edge of our network for IoT devices.  In case you are not familiar with this concept, edge compute is ncecessary due to the amount of information that is and will be generated from IoT devices.  The problem to be addressed is typically one of three things:

Monday, 22 January 2018

Why Our Partnership With Cisco is Crucial on the Road to Cloud

In Logicalis we see the cloud as the future. With our “Application Anywhere” vision we are following exactly what our customers require – putting more focus on the application, and providing the flexible infrastructure in accordance with cutting-edge hybrid cloud methodologies.

We are able to build a flexible underlay for our customers, so that they can build their applications however they like and wherever they like, using Virtual Machines or Microservices, in secure, single or multicloud environments, and give them the choice of the economic and end-to-end technical model of their preference.