- Select some text
- open the Fonts window
- Use some maths such as +3 or *2 to scale all the selected text at one minor change.
- Be impressed that something thought of this.
The Cisco C6500 ASA module has * finally* been released. Let take a look and make some comments.
The performance list looks pretty good.
This has me wondering what the price point is going to be.
I’m also wondering how what the maximum performance per flow will be. For the FWSM, it can handle only 1Gbps flows due to the way that the backplane transfers data to the module. If the ASA SM handles up to 20Gbps, how does that connectivity work ?
Anything I’ve missed ?
Collection of useful, relevant or inane places on the the Internets for 30 Mar 11:
Provided the SSID is available on both bands, it will ignore or refuse requests to connect to the 2.4GHz radio as long as it knows the client will be able to connect with a good signal to the 5GHz radio.
The initial members (including founding companies) of ONF are: Broadcom, Brocade, Ciena, Cisco, Citrix, Dell, Deutsche Telekom, Ericsson, Facebook, Force10, Google, HP, IBM, Juniper Networks, Marvell, Microsoft, NEC, Netgear, NTT, Riverbed Technology, Verizon, VMware, and Yahoo!.
Who is involved to do something, and who is involved to “keep an eye on what happens”. If it’s a closed process, how do we know if companies are blocking progress because it suits them ?
At this point, I started to suspect my Spectrum Analyzer since I was using a non-Cisco branded Spectrum Analyzer card with the Cisco Spectrum Expert software (the card I was using had the Cognio components that Cisco purchased and re-branded as their own). So I grabbed a copy of the card manufacturers software to rule out in compatibility and I got the same results.
SpecAn tools can give unreliable results when using off list hardware.
Always test your tools and keep them in good working order
Donít assume that your tools are telling you the truth. If you see something suspect, dig into it and validate against another source
Learning about wireless networking is hard. Learning about tools is hard too, and the tools are the only way to ‘see’ wireless networks. Gotta have them.
The date the document that announces the end of sale and end of life of a product is distributed to the general public.
March 23, 2011
I didn’t know Cisco was still stilling these relics of a bygone age. Talk about extracting a profit from existing products. And lets not talk about customers silly enough to buy them.
Safari, however, doesnít directly use the CRL or OCSP systems mentioned above; settings to activate this feature are found in Keychain Access. To do this, open Keychain Access; it is in the Utilities Folder in the Applications folder on a Mac. Choose Keychain Access > Preferences, then click on the Certificates tab. Set the first two options, for OCSP and CRL, to Best Attempt, and leave priority set to OCSP. This will tell Safari, or any other program that uses the built-in certificates on Mac OS X, to check these servers before accepting any SSL certificate on a web site.
Meanwhile the British print and web news market ó the area which proved the biggest gap for Huffingtonís brand of news in the U.S. ó is radically more competitive than Americaís. Britainís biggest non-tabloid newspaper, the Daily Mail, sells more copies every day in a nation of 61 million than USA Today manages to shift across the entire 52 states. The rest of the market is similarly inflated by comparison: on a per capita basis, the New York Times is smaller than every single one of Britainís 11 nationally-available newspapers.
Surprising statistics. Also highlights that potentially the British IT market is probably very different from the US. Food for thought.
SecureX is supposedly “Context Aware Enforcement”. I also believe SecureX to be Cisco’s current security strategy ( is that three or four in the last three years ? ). So it’s something we should probably be aware of. Right ?
But I don’t know what, either specifically or generally, that means as a deliverable. And other than a couple of keynote †talks and some press releases, the strategy appears to have stopped before it even got serious.
I’ve been watching this webcast where Tom Gillis gave a presentation at RSA – here is the webcast – http://media.omediaweb.com/rsa2011/exclusive/webcast-launcher-2-4-cisco.htm
The presentation was very long on fancy and expensive looking graphics like this one:
Meaningful, eh ?
And there was any number of condescending platitudes:
07:05 – “Cool and easy will always win out over safe but clunky”
11:55 – “In a world where the network doesn’t have a beginning or an end”
12:43 – “Cisco…the most trusted infrastructure in the world”
…… yeah, I have given up about here
And I’ve been to Cisco web – Cisco SecureX Architecture and it’s effectively empty.
I also interviewed Tom Gillis at Cisco Live in London, and was deeply concerned about the lack of depth to SecureX. I played back the recording of the interview again, and still have the same problem that this strategy is hollow. It’s missing deliverables, actions, details, or indeed, anything that can be actioned.
Honestly, if this is the The Future of Network Security: Ciscoís SecureX Architecture I have no idea how that is going to work. How can you announce a new strategy, and then provide no details for a month or more after the announcement.
Cisco Security Business Unit has has any number of convulsions within the company as they kill off products such as CS-MARS, defocus on others e.g. NAC and finally deliver on long overdue upgrades ( CSM 4.0, ACS 5.x ). Importantly, they are still integrating the purchase of IronPort and ScanSafe with the SBU now headed by Tom Gillis who was previously CEO of IronPort . This lack of execution implies that there might all sorts of problems with getting agreement within the SBU on exactly what SecureX is or is not †? †Alternately, it’s just possible that SecureX is already dead due to internal politics since there is nothing happening.
Cisco Security Business Unit has been a reliable partner for many years and any more stumbles will start me thinking to re-evaluate my security products. The ASA is good product, but it’s only one part of an ecosystem.
Or am I missing something ? Is there any other information about Cisco’s SecureX that I haven’t seen ? Anyone from Cisco Security marketing want to reach out and let me know more ( because I can’t find you ) ?
“Google Technician” – A google tech is one who googles an issue and systematically tries every suggestion that is returned without understanding or regard for the validity of the response.
Yeah. I’ve met a few of those.