It's a beautiful thing when you can hijack four not-quite random people off the VMworld show floor and get them to tackle a discussion on desktop virtualization. And that's exactly what we did a couple weeks back, when the o...
Image credit: imediaconnection.comIn an earlier blog, I discussed the incredible success behind the Cisco Unified Computing System (UCS) in Darwinian evolutionary terms. Since I wrote that blog three months ago, we've contin...
The Internet of Everything is delivering profound changes to the world. By 2017 there will be more than 19 billion networked devices globally -bringing a deluge of data on today's IT environments. Against this backdrop, we are wit...
Like most industries, security has gone through many different evolutions. Over the past 20 years, the industry has been largely product focused, with customers deploying point products across the network in an effort to "cover" a...
Have you ever felt like measuring social media was like a trying to crack a secret code? Sometimes it's difficult to figure out what data is important to measure out of all the information we are receiving. September 26th Let's C...
In the last article, we looked at the big picture of what is involved in creating a SAN distance extension. In this article, we're going to take a slightly closer look at the physical requirements and with luck we'll be able to cl...
At this years' 2013 High Performance Computing on Wall Street once again the greatest minds from the financial services industry gathered to discuss the latest technology trends that give financial firms a technology edge in acces...
#GameChanger is the one word we used to describe the new branch router: ISR 4451-X. We said it was designed from the ground up with rich services and application delivery in mind. How did we do that? Two words: S...
One critical factor to stay ahead in today's dynamic and competitive video market is the agility to deploy new services and hardware fast. But what do service providers really need in order to be agile? An open client software is ...
A long time ago I got asked to write about how to use Fibre Channel over Ethernet (FCoE) for distance. After all, we were getting the same question over and over: What is the distance limitation for FCoE? Now, theshortanswer fo...
The software defined network has become all the rage lately for reasons that seem to vary and are caught up in interesting perceptions. One view was that it allowed a single network to be controlled centrally and divided up ...
On August 15, 2013, Brian Krebs featured a screen shot of a fake Outlook webmail login page used by the Syrian Electronic Army in a phishing attack against the Washington Post. If you look carefully at the location bar, you will n...