“The Mighty Middle.” That’s what we call the world’s midmarket companies. According to National Center for Middle Market, if the U.S. middle market were an independent economy, it would be the fifth largest in the world. The middle market produced 2.2 million new jobs between 2007 and 2010. Midmarket companies create one in three jobs.
But emerging trends could impede that growth for midmarket organizations with their limited resources, shrinking budgets and aggressive timelines, unless the challenges they pose—Mobility, Security, Cloud, Social and Big Data—can be addressed. Today, we look at three midmarket technology trends, the hurdles they pose, and what midmarket companies can do. These trends are also presented in greater detail in our new Webinar with Gartner called “Midmarket Trends and Opportunities -- Positioning Your Company for Success”
Mobility: Don’t Let BYOD Become an SOS
According to a recent IDC report, smartphones and tablets will dominate IT growth in 2014. And they’ll account for over 60% of IT spending. In fact, analysts predict that 2015 will be the first year in which more consumers access the Internet with mobile devices than with PCs. BYOD has evolved from a trend, to a reality, and now to a necessity. Read More »
Not only was this a great opportunity for them to upgrade their network to meet the state and national testing standards, but also to lay the foundation for any future requirements as technological advances are rapidly changing the education landscape.
Meet the computer-based testing requirements under PARCC
Provide a borderless learning environment through mobile and online learning
A stable infrastructure that can meet the dynamic network demand
Prepare for the growing importance of technology in classrooms, wired and wireless, with trends such as BYOT (Bring Your Own Technology) as well as an increased use of district-owned devices.
Doctors at Carilion Clinic, a hospital in southwest Virginia, are getting a productivity boost with their medical applications. They can complete their cardiology study a lot faster than before because they can review real-time diagnostic imaging files much faster and more reliably.
You see, real-time data is getting a lot of attention in the industry lately. Using analytics and real-time data effectively, people can discover hidden patterns and new clues for better and more timely decisions. This is very exciting. But first thing first. People often have to answer this challenging question: is the captured data, which is often complex and huge in size, dependable enough to begin with?
As an example, imagine that you were having a critical video conversation with a business partner. You were going to make a major decision based on the outcome of this conversation. Would you be confident enough with your decision if the voice and the image stream were messed up as seen below on the left? And would your confidence level be hugely boosted when the voice was clear and the image was sharp as seen on the right?
Current wired and wireless networks will be inadequate as traffic is forecast to triple over next five years as per Cisco VNI. Business Internet video traffic is expected to grow at 39%, mobile data traffic at 59% & Internet of Things M2M traffic at 113% per year through 2017-2018. Even when users are not actively using the apps on their mobile devices, the mobile devices create up to 1GB of background traffic (OS, App updates & backups) per month per device. With BYOD, there are 3x more devices per user according to a Cisco IBSG study of 600 IT & business leaders. Internet of Things (IoT) connects sensors, cameras and plenty of other previously unconnected devices to the network.
This trend in combination with growth in traffic from each device results in an explosion of traffic.
Higher connectivity speed is adding fuel to the fire. Wi-Fi is now the de facto primary network access in workplace. Wi-Fi standards have continuously provided more radio bandwidth to the users. 802.11ac (also called the Gigabit wireless) standard enables a network that is 3 times faster due to its 1.3 Gbps capacity. 802.11ac wave 2 is capable of up to 6 Gbps. The latent unmet demand from wireless devices will take full advantage of 802.11ac.
Therefore, the choke point in the network has moved up from wireless AP to the access and access uplinks. The access switch ports are moving to 1G. The access switch uplinks and backbone switch ports will need to move to 10G. Read More »
In my last blog I talked about the value of Pfr to the IWAN solution. This week I wanted to talk about DMVPN and why it is going to be a critical component of your IWAN deployment.
Your IWAN topology will most likely consist of one or more internet connections which means that your data will be traveling over untrusted connections and shared environments so security is going to be top of mind. So how do you secure your data over the internet and other untrusted or shared environments? Well DMVPN (Dynamic Multi-point Virtual Private Network) is based on VPN the same technology that many of you use today to securely connect back to your office when you are traveling or working from home. A VPN will create a tunnel between two end-points and then encrypt all data traveling over the tunnel. VPN’s can connect users to a remote site, client-to-site VPN, or connect two remote sites, site-to-site VPN. Unlike VPN, DMVPN can securely connect multiple points together dynamically.
So how does DMVPN work and what is the benefit to IWAN? DMVPN works on top of your WAN infrastructure which means that DMVPN tunnels will be established between branch sites as traffic flow demands. In a common hub and spoke topology example, when data needs to be sent from the spoke to the hub site, the spoke will establish a VPN tunnel to the hub by registering first with the hub. In order for each tunnel to function a new dynamic IP address is created at the branch since the hub site will initiate the connection. In order for data to be routed between sites over the DMVPN tunnels, routing information will need to be exchanged. As more tunnels are created there will be more dynamically created IP addresses and traditional routing protocols like BGP or EIGRP are used to efficiently share routing information so all sites can talk to each other. Lastly QoS is applied to each tunnel to ensure that the hub site does not oversubscribe the spoke sites.