Gadgets, gadgets and more gadgets. They are coming like mushrooms after a soaking spring shower. More than 80 tablets were launched at the Consumer Electronics Show (CES) in early Jan. On top of that, Microsoft announced that a future version of its Windows OS will run on ARM-based chips that power mobile phones and tables, in addition to the x86 chips used for PCs. A 4G wireless version of Cisco’s mobile business tablet Cius made news with a joint announcement with Verizon Wireless. It’s a sign of the times that the buzzword “app” was voted the 2010 “Word of the Year” by the American Dialect Society. And one more thing: IDC predicts that in 2012, the number of mobile devices is likely to reach 462 million, exceeding PC shipments.
Today, almost one in five (18%) employees is not allowed to use their iPods at wok, based on Part II of Cisco’s Connected World Report. But this trend is unlikely to continue. Employees expect to have more flexible work options including mobility. So how do you prepare your organization’s mobile computing strategy, to help achieve best employee productivity and user experience?
Read More »
Tags: anyconnect, ASA, BandSelect, DTSL, mobile computing
As I type this from my Virtual Office in Sydney, the Cisco Summit has finished Day 1 in Singapore. And while I regret not being able to make the event this year, it did get me thinking again about the idea of the Borderless Experience.
The borderless concept of “anytime, anywhere from any device” enables me to become location agnostic. Still, we cannot escape the fact that sometimes physical presence still matters. As I often joke when setting up TelePresence calls between Australia, the U.S. and Europe, the one problem it cannot yet solve is time zones.
With this thought in mind, Collaboration over the network becomes less about replacing face to face communication, and more about extending the ways in which I can interact when physical presence is not possible. And so while I may not be presenting in Singapore today, through this medium and I can still communicate. Now these musings, are not limited to those attending my session, or even just those at the Summit. And feedback on these thoughts can come from… well… anytime and anywhere.
Read More »
Tags: borderless, cloud, collaboration, data center, virtualization
Enterprises have reported upward increases in bandwidth requirements due to video applications which stem from several sources:
- Video applications move from standard to high definition resolutions.
- New applications are coming online.
- Number of video endpoints is increasing.
- Utilization of video is increasing due to improved quality and easier user experience.
- More video applications are moving to the converged IP network.
All of these are driving increases in bandwidth requirements. As video is deployed on your network, evaluate your bandwidth, but do not stop there. Other important topics are management tools and services in the network for ease of configuration and quality of service guarantees for applications. Read More »
Tags: business video, enterprise networks, medianet, rich media applications, video
When I talk about the Borderless Network to customers and partners, one aspect I try to articulate is that of the Borderless Experience—the idea that access and security should be transparent to the user. The security department will care about whether I am securely connected to the network, with policies applied to my device irrespective of how I connect. The finance department will care about whether I am using the cheapest method for data access, staying under my broadband quota, and minimising my international data roaming charges.
But all I care about is getting my work done, without having to fight technology to do so.
And this is what the Borderless Network is all about: seamless and secure connectivity, anytime, anywhere and from any device.
Read More »
Tags: borderless, mobility, security
In my previous post on virtualization, I discussed the potential to make greater use of this technology beyond just better server utilization. If you have already done a lot of virtualization projects, you would likely agree that eventually virtualization alone is not enough. Read this interesting story to see how a tech company reached this conclusion based on their multi-year experience with virtualization. The next stage, from an IT architectural perspective, is to incorporate automation, elasticity and governing to deliver on-demand and pay-per-use computing services. As you guessed it, we are talking about cloud computing here.
Much has been written to describe the business advantages, various service types (SaaS, PaaS and IaaS, to name a few common ones) and deployment models (public, private and hybrid) about cloud computing. But, where do you start to plan for cloud?
Read More »
Tags: cloud security, virtualization