Making ACI Configurations Consistent
There are many ways to improve your home. You can add on to your house, giving you more functionality or space to grow into. You can remodel your house, changing key components or the layout to suit your evolving needs. You can completely raze your house and build a new one that has everything you want.
Of course, each of these comes with downsides that must be taken into consideration. When adding on to your house, for example, there is impact not only to the living space, but also to the outside of the house where the addition will sit. Your yard may be torn up for months, inviting dirt and mud to be tracked all through the house.
When remodeling your house, you may experience seemingly endless noise, dust, and strangers in your home. When razing your home, you must find somewhere else to live during demolition and construction.
Considering these downsides, there is another way to improve your house, and it also applies to your IT infrastructure: You can refresh your house in place.
We find that there are many reasons to refresh your IT infrastructure, but the most pressing include:
In this post, we’ll spend a bit of time on each of these ways to refresh your IT infrastructure without adding on to it, remodeling it, or razing it.
Security is one of the fastest growing IT focus areas for most organizations. There are an ever-growing number of security vendors who all claim to have the right product to make sure your infrastructure is secure. What we have learned about security is that bolting on technologies is the wrong approach. Building protective measures into the complete design of your IT infrastructure is the best way to ensure its security. And then, developing an orchestration capability that manages the alerting, analysis, and reporting of the overall security architecture is key. There are many technologies available. Navigating them all takes experience and capabilities that are not always present in organizations.
Cloud and hybrid cloud readiness is a hot topic in today’s business world. Being cloud ready means lots of different things to many people. At NetCraftsmen, we believe that being cloud ready means that you have a strategy to connect with and implement cloud technology; that you have addressed outstanding issues with your current IT infrastructure that may prevent you from successfully implementing a cloud solution such as DNS; and that you have evaluated all the costs required to enable your IT infrastructure to take advantage of cloud technologies.
Business transformation is one of the hottest buzz words in the industry today, and the phrase reflects what is happening across many industries. We have all read about the Uberization of the taxi industry or the Amazoning of the retail industry. There are many, many examples of disruption caused by new business models. We believe that organizations need to plan to disrupt themselves; that there are ways to drive capabilities and technologies into your organization to change how you do business; that you can build new and better relationship with your customers; and that you can leverage technology to accomplish all of this — when you start with a business strategy.
Network rationalization efforts are fundamental to refreshing your IT infrastructure, rather than continuing to add on to your network, remodeling it, or razing it to build a new one. We believe that a rational approach to leveraging technologies and capabilities, such as Software Defined Networking (SDN), is a better approach than extending or redesigning your existing network. And, we don’t know many organizations that could survive razing their current network to build a new one.
These areas are all complex. And, they often overlap each other from a technology and capability perspective. Having the right partner who can help you navigate your way through all the choices is key. To learn more about improving your IT infrastructure, reach out.
Making ACI Configurations Consistent
Six Tips to Help with Your Next Configuration Audit
Does Security Belong Near Endpoints?
Nick has over 20 years of experience in Security Operations and Security Sales. He is an avid student of cybersecurity and regularly engages with the Infosec community at events like BSides, RVASec, Derbycon and more. The son of an FBI forensics director, Nick holds a B.S. in Criminal Justice and is one of Cisco’s Fire Jumper Elite members. When he’s not working, he writes cyberpunk and punches aliens on his Playstation.
Virgilio “Bong” has sixteen years of professional experience in IT industry from academe, technical and customer support, pre-sales, post sales, project management, training and enablement. He has worked in Cisco Technical Assistance Center (TAC) as a member of the WAN and LAN Switching team. Bong now works for Tech Data as the Field Solutions Architect with a focus on Cisco Security and holds a few Cisco certifications including Fire Jumper Elite.
John is our CTO and the practice lead for a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/Chief Architect for Global Network Services at JPMorgan Chase. In that capacity, he led a team managing network architecture and services. Prior to his role at JPMorgan Chase, John was a Distinguished Engineer at Cisco working across a number of verticals including Higher Education, Finance, Retail, Government, and Health Care.
He is an expert in working with groups to identify business needs, and align technology strategies to enable business strategies, building in agility and scalability to allow for future changes. John is experienced in the architecture and design of highly available, secure, network infrastructure and data centers, and has worked on projects worldwide. He has worked in both the business and regulatory environments for the design and deployment of complex IT infrastructures.