利用者:PaynterFazio475
出典: くみこみックス
M (新しいページ: 'Cisco's latest Carrier Quality Internet Protocol Version 6 (CGv6) Answer accelerates the migration of wireline and wireless customers to Internet Protocol edition six (IPv6), m...') |
M (新しいページ: 'Cisco's latest Carrier Quality Internet Protocol Version 6 (CGv6) Answer accelerates the migration of wireline and wireless customers to Internet Protocol edition six (IPv6), m...') |
最新版
Cisco's latest Carrier Quality Internet Protocol Version 6 (CGv6) Answer accelerates the migration of wireline and wireless customers to Internet Protocol edition six (IPv6), manages the continuing proliferation in IP-enabled devices, and prepares services provider networks for services growth.
With help from IPv6 rapid deployment technologies, also recognized as 6rd, the Cisco IP Subsequent-Era Web (IP NGI) solution deployed by ATT is based on the Cisco Carrier-Grade Services Engine (CGSE) for the Cisco Carrier Routing Method (CRS) family members. Cisco's options have been helpful in managing the changeover from an all IPv4 community to availability of IPv6 assistance. ATT can simultaneously serve new and current clients with IPv4 or IPv6 solutions. Additionally, ATT can support tens of gigabits of throughput and hundreds of 1000's of customers whilst growing incrementally, as required, for new revenue-producing services. To address the rapid growth of IP traffic and devices, ATT is effectively managing the impending exhaustion of IPv4 address.
In accordance to the Cisco Visual Networking Index: Forecast and Methodology, 2011-2016, there will be nearly 19 billion gadgets connected to the network in 2016 an typical of much more than 2.five networked devices for each capita for every individual on earth.
The Cisco Carrier-Grade IPv6 (CGv6) solution outlines a methodical blueprint for service companies creating the changeover to IPv6. The Cisco CGv6 answer features technologies improvements in the CRS family and Cisco Aggregation Services Router (ASR) Series, prevalent IPv6 support across the entire portfolio and customizable migration solutions to ease the changeover. Driven by a multi-core central processing unit, every Cisco CGSE scales to tens of millions of address translations and gateway functionality with tens of gigabits of throughput for hundreds of 1000's of clients or usersoffering an built-in answer with the industry's greatest overall performance and scale. IPv6 was developed by the Web Engineering Job Power (IETF) to deal with this long-predicted IPv4 address exhaustion, which is likely to happen in North America someday in 2013 according to RIPE.
Surya Panditi, Senior Vice President and General Supervisor, Service Supplier Networking Team, Cisco We are pleased to function with ATT on Cisco's Internet Protocol Next-Generation Community options, which have been instrumental in the Web build-out since its inception. The implementation of this technologies enhances our IPv6 solution portfolio, helping services companies address instant issues as they protect and prepare their networks for long-phrase achievement, prosperity and company development.
A 20-person oil and gas exploration business recently confronted a dilemma when a senior-level executive left, taking his personal Blackberry with him. "He experienced photos of his children, along with email messages about deals they had been renegotiating and all sorts of corporate contacts," says Smith LWC, who runs Genuine-Time Pc Services Buy Cisco in Ardsley, NY, and worked with the company.
But, the business had only lately began allowing employees to use their personal mobile gadgets for work and had little expertise dealing with the matter. Ought to they wipe out every thing on the gadget, such as pictures of vacations and weddings, or allow it all stay with an assurance from the executive that he would delete corporate information on his personal?
In the end, according to Rosenbaum, the company made the decision not to wipe out the data. Instead, the owners would consider the government, a long-time and trusted employee, at his phrase that he would get rid of sensitive company date from his Blackberry.
BYOD: It's an inexorable wave you can't ignore. An acronym for Deliver Your Personal Device, the term, of course, refers to the growing trend for workers to use their own, individual iPhones, Androids, iPads or other gear rather of business-owned and supplied gizmos.
It is also by no means just a large company phenomenon. In fact, 70% of little companies lately surveyed said that BYOD was inevitability at their companies, simply because so many employees were demanding it, according to Austin-based market study firm iGR.
But, as Rosenbaum's consumer found, turning your little company into a BYOD office isn't as easy as it might seem at first look. There's a wide variety of security and administration issues you need to consider. And, for small businesses that might lack the sources or staff to oversee and assistance all those various gadgets, it can be a especially sensitive matter. "BYOD can bring huge productiveness gains," says Herve Danzelaud, vice president of business development for Great Technology, Purchase Cisco, a mobile safety consulting firm in Sunnyvale, Cal. "But it's not usually easy to implement."
The solution is to believe through all the potential issues beforehand and, when appropriate, include them in a written company policy. With that in thoughts, here's a look at four significant concerns and the best way to method them.
When employees shed their deviceor depart the business
One large problem is the one that faced Rosenbaum's consumer: what to do if, say, an worker forgets an Apple iphone in the airportor just plain quits? Since the gadget undoubtedly was linked to your server, you have the ability to wipe out all those email messages about, for instance, confidential plans. But that also indicates eradicating the individual photos, music and other programs most likely sitting down on the gadget, as nicely.
Your very best move: This is an problem where having a created coverage is of utmost significance. The central make a difference: Who owns the data residing on employees' gadgets? With that in thoughts, your coverage should consist of that, when workers leave your company, the information on their gadgets will be wiped out. Exact same thing goes for, say, an iPad forgotten on a suburban commuter prepare. An additional method: separate corporate and individual information, requiring various passwords to get in. "Employees would require a very strong password to access business data and a various 1 for personal data," states Danzelaud. In addition, you ought to inform employees to the need to back again up their individual pictures, contacts and the like, and, perhaps, offer guidance on how to do that.
Or, you can take another tack. State you won't wipe out information but, at the exact same time, employees are obligated not to use confidential info once they depart the company.
1 exception might be if you're in an business, like health care, exactly where you deal with highly controlled, sensitive info. In that case, according to Rosenbaum, you may not want to opportunity it at all. He recalls one consumer, a doctor's workplace, that recently made the decision not to permit BYOD because of to issues about patient data confidentiality,
How to assistance all those gadgets
Most likely, you have a small IT staff, or maybe none at all. How, then, can you support the extra devices your workers will be using without employing more people or including to your currently more than-labored staff?
Your best move: It all is dependent on your sources. The less you have, the much less responsibility you'll be able to presume. Rosenbaum factors to a client, a 14-individual accounting company that recently permitted employees to use their iPhones. With just an workplace manager handling assistance, company owners made it clear that employees were responsible for dealing with technical problems. "I took care of connecting the phone to the server, but after that, it wasn't part of the workplace manager's duties," states Rosenbaum.
1 helpful move is to limit the devices you permit. An additional is to produce a checklist of actions workers should consider, something from turning on spell check to using a standard signature block at the end of each e-mail.
Buy Cisco Sell Cisco Cisco Routers Cisco Switches Cisco Security Cisco Wireless Cisco Asset Recovery