What do these three things have in common? For Lone Star College System (LSCS), the fastest growing community college in the U.S., these items helped build a whole new technology foundation.
While at a higher-education conference, CIO of LSCS, Link Alander, and former VP of data center virtualization at Presidio, Steve Kaplan, began hashing out what it would take to deliver the best computing experience—on a napkin. They jotted down all the ways technology could deliver a customizable, optimal, and educational platform to students and faculty.
The vision was a toolbox, not just any one tool: an entire resource pool for professors to contribute to -- and students to pull from -- anytime, on any device, from anywhere.
Click here to read full story.
Tags: any device, cloud, data security, desktop virutualization, higher education, mobility, network, UCS, unified computing, unified computing system, Unleashing IT, virtualization
Mobility enables the extension of IT resources and application availability to anytime, anyplace, any way. Initially people thought that the “mobility movement” was just hype; however, it is definitely a reality, as it has become ubiquitous with efficiency. All of these new devices and social applications are bringing potential security risks to the enterprise and public sector organizations. The threat landscape ranges from potential data leakage to lost and stolen devices that may contain corporate and private information.
The question now is how can we address the customers’ challenge of enhancing productivity without compromising network security. Cisco’s AnyConnect Secure Mobility Client and the Cisco ASA 5500 Series Adaptive Security Appliances enable desktop and mobile users to connect to the corporate network, giving access to the network from any device based on comprehensive secure access policies. Cisco AnyConnect Secure Mobility Client works in conjunction with Cisco’s IronPort Web security appliance, the Cisco ASA appliance, and also provides integration with ScanSafe, an in-the-cloud Web security solution.
Read More »
Tags: Adaptive Security Appliance, any device, anyconnect, ASA, byod, byod security, Cisco ASA, cisco live, Cisco Live 2012, Cisco Security, cisco security lab, lab, mobility, mobility security, networkers, ScanSafe, secure mobility, security, security lab
CIOs around the world are at the center of technology trends such as cloud, social media, consumerization of IT, and mobility. This is the second blog in a four-part series (Read Part I) exploring and sharing how CIOs around the world are responding to these trends and creating new ways to innovate, grow, and deliver superior customer experience.
Many of us are used to having a pretty formal relationship with our bank – after all, it’s about our money, isn’t it? It’s hard to get more serious than that.
However, times are changing. The Intuit 2020 Report: The Future of Financial Services identifies four areas of rapid transformation in today’s financial services industry: Read More »
Tags: allianz, any device, Borderless Networks, Bring your Own Device (BYOD), byod, Carrie Krinock, CIO, Cisco, cloud, customer experience, Europe, Executive ViewPoints, Financial Services, Germany, innovation, operational excellence, social media
CIOs around the world are at the center of technology trends such as cloud, social media, consumerization of IT, and mobility. This is the first blog in a four-part series exploring and sharing how CIOs around the world are responding to these trends and creating new ways to innovate, grow, and deliver superior customer experience.
The manufacturing industry has been hit harder than most as a result of the global recession. As the market recovers, however, manufacturers are finding that IT has also changed. Consumers are more demanding, and expect new products faster. Read More »
Tags: akzo nobel, AkzoNobel, any device, Borderless Networks, Bring your Own Device (BYOD), byod, Carrie Krinock, CIO, Cisco, cloud, customer experience, data center, Europe, Executive ViewPoints, innovation, Manufacturing, netherlands, operational excellenc, supply chain, supply chain excellence, virtualization
Remember the old days when work meant sitting at your desk, typing away at your desktop computer, at the office? There was no such thing as a smart phone or even a laptop or a tweet – you just sat at your desk and waited for the network, which was probably running at 56k dial-up speeds or slower. (Now I probably sound like my father who told me he had to walk uphill to school in the snow every day.)
These days, we don’t need to be tied to a desk, but we also expect much more of our networks: they need to be fast, secure, run the applications we need, and allow employees to work anywhere, anytime, and on any device.
So how to design an enterprise network with enough flexibility and security to address users’ needs without CIOs and IT managers having coronaries in the process? And how can enterprise networks live harmoniously (and securely) with our many devices, from smart phones to iPads to laptops?
As we continue the Seven Myths of the Good-Enough Network series over on Silicon Angle, Cisco’s Mike Rau--Vice President, CTO for the Borderless Network Architecture--tackles those questions and more as he dispels the second myth: bolt-on security.
What exactly is bolt-on security anyway? Read More »
Tags: any device, bolt, bolt-on, borderless, Cisco, customer, debunk, iPad, iphone, mike rau, myths, network, partner, security, sevenmyths, silicon angle