Do you believe in magic? You do if you have a Mac or an iPad. [Apple]

 

Two years ago this month Apple introduced what Steve Jobs called a “magical” device. But if you let go if it in mid-air, will it magically float? (Don’t try this without one of these cases)

I’m more of a Penn & Teller fan myself, I’m interested in what REALLY happens behind the scenes of  “magic” show. After all, any sufficiently advanced technology is indistinguishable from magic. So let’s look at the hidden wires and plexi-glass holding the iPad up in mid-air.

Wifi and Networking – of course there are no actual wires attached to an iPad (unless to charge or sync) as it’s designed to be the ultimate mobile and portable device. Wifi Networks are crucial in enabling the magic experience, and secure ones at that. Sure, you may have Wifi in your workplace, but in the past you just needed Wifi in the boardrooms and the odd exec office to support laptops. Now people want to use their iPads everywhere – do you have wall to wall coverage? Can the network itself handle all these new always-connected devices? Is your network secure inside and outside the company walls? Do you have a robust VPN in place that’s supported by iOS out of the box (Cisco or Juniper)? Perhaps it’s time for a Softchoice Network Assessment to ensure that your network is ready[Read more…]

A mass of data center cables is soooo last season. [Cisco]

Meet the unified infrastructure behind the new virtual reality.

While virtualization may sound like the uber-buzzword du jour, the fact is there are real reasons for all the buzz – enterprises are relying on the proven benefits of virtualization to make the implementation of on demand desktops, applications and a whole host of cloud-based technologies work securely, quickly, flexibly, all without breaking the bank.

The challenge – an perhaps irony – is that making a cloud-based virtual world work still depends more than anything on the nuts and bolts of an efficient and very real data center environment.

Right now, though, IT administrators spend too much time manually accomplishing basic integration tasks related to their data center’s individual components and rigid, inflexible platforms rather than focusing on the more strategic, proactive initiatives they ought to.

That’s where the Cisco Unified Computing System™ comes in. UCS is a next-generation data center platform that unites compute, network, storage access and (yes) virtualization into a flexible, integrated cohesive system designed to reduce total cost of ownership and increase IT efficiency and business agility.

What does that mean?

Managed as a single system – whether it has one server or hundreds with thousands of virtual machines – UCS decouples scale from complexity, accelerating the delivery of new services simply, reliably and securely and solving key challenges in the data center. The results can’t help but grab your attention:

  • 20% lower cost for compute and network infrastructure
  • 60% greater virtual desktop density – with no effect on performance
  • Simple operation – start in minutes, scale in seconds
  • Massive scalability
  • Extended memory and I/O avoiding desktop virtualization bottlenecks.

How does UCS do it?

UCS is made up of a rich set of technical innovations that stand it apart from competitive products including [Read more…]

Secure your journey to the cloud [ Trend Micro & VMware ]

Secure the cloudConsider this: in spite of the proven benefits of virtualization in terms of consolidation, increased availability, up-time, ease of management and cost savings, organizations are still only virtualizing about 20% of their environment.

What’s holding them back from realizing the full benefits of virtualization?

According to Gartner,1 security and privacy are by far the foremost concern – more than performance, immaturity and regulatory compliance. In fact, 74% of decision makers say security concerns are the number one reason they’re most hesitant about moving to the cloud.

In the traditional data center, perimeter security controls like Firewalls, DMZs, network segmentation and monitoring tools were enough. But the inability of physical segregation and hardware-based security to deal with attacks between virtual machines on the same server is cause for concern. So too is the fact that, as virtual machines extend to public clouds, the enterprise network security perimeter is all but evaporating.

There are whole host of other concerns for organizations on the security front: [Read more…]