Ivy Bridge comes to UCS! As Paul Perez reminds us in his evolutionary metaphor for our industry, time marches on, and today brings another tick of the clock. Many of you may be familiar with the development cadence that Intel main...
On September 10th, 2013 Cisco introduced support for the Intel? Xeon? Processor E5-2600 v2 product family on the Cisco UCS B200 M3, C240 M3, and C220 M3 servers. On the same day as the Intel announcement Cisco captured ...
By Tony Shakib, Vice President of IoT Vertical Business, Cisco I've been in IT for a long time and I often hear that data is worth its weight in gold. Well, I recently spoke with Canadian-based Dundee Mi...
Visitors to the Cisco boothat this year's IBC will no doubt be curious to see our new Open UX Snowflake. https://www.youtube.com/watch?v=2IdZl31B69w Snowflake, the Videoscape Unity flagship UI, is now offered on HTML5, powered wit...
Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we f...
Detours is a library offered by Microsoft Research for interception of functions on x86 and x64 platforms. It is sold for commercial use to various vendors that build products ranging from security to gaming applications. Detours ...
It's a beautiful thing when you can hijack four not-quite random people off the VMworld show floor and get them to tackle a discussion on desktop virtualization. And that's exactly what we did a couple weeks back, when the o...
Image credit: imediaconnection.comIn an earlier blog, I discussed the incredible success behind the Cisco Unified Computing System (UCS) in Darwinian evolutionary terms. Since I wrote that blog three months ago, we've contin...
The Internet of Everything is delivering profound changes to the world. By 2017 there will be more than 19 billion networked devices globally -bringing a deluge of data on today's IT environments. Against this backdrop, we are wit...
Like most industries, security has gone through many different evolutions. Over the past 20 years, the industry has been largely product focused, with customers deploying point products across the network in an effort to "cover" a...
Have you ever felt like measuring social media was like a trying to crack a secret code? Sometimes it's difficult to figure out what data is important to measure out of all the information we are receiving. September 26th Let's C...
In the last article, we looked at the big picture of what is involved in creating a SAN distance extension. In this article, we're going to take a slightly closer look at the physical requirements and with luck we'll be able to cl...