Cloud Ahoy! Cisco Style: The Cloud-Connected Solution

Cloud Ahoy! Cisco Style: The Cloud-Connected Solution

Cisco has lived up to its promise – the promise to come up with a dedicated release intrinsically centered around cloud-based products and services. Cisco flaunted the release teaser for the first time at the Cisco Partner Summit held during April. This Tuesday marked the networking giant’s avowal of the said novel, cloud-centric routing modules and service packages under an altogether fresh brand label, the Cisco Cloud-Connected Solution.

A number of fascinating products were revealed Tuesday at the Cisco Live in San Diego event. Amongst the lot was what Cisco refers to as Cloud Connectors – a class of cutting–edge, custom-designed software fused into Cisco’s Integrated Service Router, which is aimed at providing round-the-clock, streamlined access and unparalleled security of cloud-based applications. The Connectors are set to be deployed by Cisco for its Hosted Collaboration Services Architecture, ScanSafe Web security services and the CTERA Cloud Storage facility, which are all available for use on the E-series Cisco UCS platforms.

In addition, Cisco service suppliers and channel collaborators can develop their indigenous cloud connectors by virtue of Cisco’s unlocked framework as a means to modify the ever critical user-experience design.

Cisco demonstrated its novel Cloud Services Router model 1000v – a virtual router for extending Virtual Private Networks via the cloud. On top of that, a fresh ASR router, the 1002-X, presenting up to 36 Gbps of performance, was also revealed. All the above is in addition to the UCS E-series server elements on the ISR G2, designed to extend the offered hosted services towards division and remote offices.

In an effort to optimize the dynamics of cloud application delivery across the network, Cisco is bringing to the table application visibility and control technology (AVC). Cisco believes that adding the said functionality to its Inter Services Routers andASRrouting platforms is guaranteed to improve cloud application delivery. Cisco is also determined to update its physical WAAS and virtual WAN tools with the aid of sophisticated clustering methodologies. This translates to the slightly complicated yet immensely effective scale-as-per-growth operational model (AppNav). AppNav can be obtained as dedicated hardware on Cisco’s Wide Area Virtualization Engine devices or as software add-ons on the Cloud Services Router.

Officials at Cisco pointed out that customer endorsement of cloud-based services needs next-level intelligent routing policies and enhanced WAN accentuation gear.

Praveen Akkiraju, senior vice president and general manager of Cisco’s Services Routing Technology Group, is quoted as saying that the “Cisco Cloud-Connected Solution redefines the WAN architecture with key innovations that leverage network intelligence as a critical link in cloud deployments by putting more functionality into traditional enterprise routing, allowing customers to connect to the cloud with an optimal user experience”.

The Cloud-Connected Solution concentrates upon two core domains of interest for Cisco: firstly, its sprouting cloud-computing strategy which already encompasses (1) Cisco channel associate programs, (2) relevant marketing material and (3) related CloudVerse framework; and, secondly, a significant revamp of numerous crucial Cisco routing lines, specifically the ISRs.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…