WoltersWaites59
出典: くみこみックス
Cisco's newest Carrier Quality Internet Protocol Edition six (CGv6) Solution accelerates the migration of wireline and wireless customers to Web Protocol version six (IPv6), manages the continuing proliferation in IP-enabled devices, and prepares service provider networks for services expansion.
With assist from IPv6 fast deployment technology, also known as 6rd, the Cisco IP Next-Generation Internet (IP NGI) answer deployed by ATT is primarily based on the Cisco Carrier-Quality Services Motor (CGSE) for the Cisco Carrier Routing System (CRS) family. Cisco's solutions have been useful in controlling the transition from an all IPv4 community to availability of IPv6 support. ATT can simultaneously serve new and current clients with IPv4 or IPv6 solutions. In addition, ATT can support tens of gigabits of throughput and hundreds of thousands of customers whilst growing incrementally, as needed, for new revenue-generating services. To address the rapid growth of IP traffic and devices, ATT is successfully controlling the impending exhaustion of IPv4 deal with.
According to the Cisco Visible Networking Index: Forecast and Methodology, 2011-2016, there will be nearly 19 billion devices connected to the community in 2016 an typical of more than 2.five networked devices for each capita for every person on earth.
The Cisco Carrier-Grade IPv6 (CGv6) answer outlines a methodical blueprint for services providers creating the transition to IPv6. The Cisco CGv6 solution functions technology improvements in the CRS family members and Cisco Aggregation Services Router (ASR) Series, prevalent IPv6 support across the whole portfolio and customizable migration solutions to ease the transition. Driven by a multi-core central processing device, each Cisco CGSE scales to tens of millions of deal with translations and gateway functionality with tens of gigabits of throughput for hundreds of 1000's of customers or usersoffering an integrated answer with the industry's greatest performance and scale. IPv6 was created by the Web Engineering Task Power (IETF) to offer with this lengthy-predicted IPv4 deal with exhaustion, which is likely to occur in North America someday in 2013 according to RIPE.
Surya Panditi, Senior Vice President and General Supervisor, Service Provider Networking Team, Cisco We are happy to function with ATT on Cisco's Web Protocol Subsequent-Era Community solutions, which have been instrumental in the Web build-out because its inception. The implementation of this technology enhances our IPv6 solution portfolio, helping services companies address instant issues as they protect and put together their networks for long-phrase achievement, prosperity and company growth.
A twenty-individual oil and gas exploration business lately confronted a dilemma when a senior-level government left, using his personal Blackberry with him. "He experienced pictures of his children, alongside with emails about deals they were renegotiating and all sorts of corporate contacts," states Smith LWC, who runs Genuine-Time Pc Services Buy Cisco in Ardsley, NY, and worked with the firm.
But, the company had only recently started permitting employees to use their own mobile gadgets for work and had small expertise dealing with the make a difference. Ought to they wipe out every thing on the gadget, including photos of vacations and weddings, or let it all stay with an assurance from the executive that he would delete corporate data on his personal?
In the end, in accordance to Rosenbaum, the company decided not to wipe out the data. Instead, the owners would consider the executive, a long-time and trusted worker, at his word that he would get rid of delicate company date from his Blackberry.
BYOD: It's an inexorable wave you can't ignore. An acronym for Bring Your Own Device, the phrase, of program, refers to the expanding pattern for workers to use their personal, personal iPhones, Androids, iPads or other gear rather of business-owned and provided gizmos.
It's also by no indicates just a big business phenomenon. In fact, 70% of little companies recently surveyed said that BYOD was inevitability at their companies, because so numerous employees had been demanding it, in accordance to Austin-primarily based marketplace research firm iGR.
But, as Rosenbaum's client found, turning your small business into a BYOD office isn't as easy as it might appear at initial glance. There's a broad variety of safety and administration problems you need to think about. And, for small businesses that might lack the resources or employees to oversee and assistance all these different devices, it can be a especially delicate make a difference. "BYOD can deliver enormous productivity gains," states Herve Danzelaud, vice president of business development for Great Technology, Buy Cisco, a mobile security consulting company in Sunnyvale, Cal. "But it is not always simple to implement."
The answer is to believe through all the potential issues beforehand and, when suitable, include them in a written company coverage. With that in thoughts, here's a look at four major considerations and the very best way to approach them.
When workers shed their deviceor leave the company
One large problem is the 1 that faced Rosenbaum's consumer: what to do if, say, an worker forgets an Iphone in the airportor just plain quits? Because the gadget unquestionably was connected to your server, you have the capability to wipe out all those emails about, for example, confidential ideas. But that also means eradicating the personal pictures, songs and other applications probably sitting on the device, as well.
Your very best move: This is an problem where getting a created policy is of utmost importance. The central matter: Who owns the information residing on employees' devices? With that in thoughts, your coverage should consist of that, when workers leave your company, the data on their gadgets will be wiped out. Same thing goes for, say, an iPad neglected on a suburban commuter train. An additional method: separate corporate and individual information, requiring different passwords to get in. "Employees would require a extremely powerful password to entry business information and a different one for individual data," states Danzelaud. In addition, you ought to inform employees to the require to back up their personal photos, contacts and the like, and, maybe, provide guidance on how to do that.
Or, you can consider an additional tack. State you won't wipe out information but, at the same time, employees are obligated not to use confidential info once they depart the company.
One exception may be if you're in an business, like health care, exactly where you deal with highly controlled, delicate info. In that situation, according to Rosenbaum, you may not want to chance it at all. He recalls one client, a doctor's office, that lately made the decision not to allow BYOD because of to concerns about patient data confidentiality,
How to support all those gadgets
Most likely, you have a small IT employees, or maybe none at all. How, then, can you support the extra devices your employees will be utilizing without hiring more individuals or including to your already over-labored staff?
Your best transfer: It all is dependent on your resources. The fewer you have, the less responsibility you'll be able to presume. Rosenbaum factors to a client, a 14-individual accounting firm that lately allowed employees to use their iPhones. With just an office manager handling support, business owners produced it clear that employees were responsible for dealing with technical issues. "I took care of connecting the telephone to the server, but after that, it wasn't part of the workplace manager's responsibilities," says Rosenbaum.
One helpful move is to restrict the devices you permit. An additional is to produce a checklist of steps workers should consider, anything from turning on spell verify to utilizing a regular signature block at the end of every e-mail.
Buy Cisco Sell Cisco Cisco Routers Cisco Switches Cisco Security Cisco Wireless Cisco Asset Recovery