There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?
Just recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.
Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.
Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »
Remember: we have more Partner Summit discussion still to come, so check back next week for deeper dives into our services and technology strategies as well as Cisco's unique value proposition for customers.
If you’ve met Edison Peres, SVP, worldwide channels or heard him address the audience at Cisco Partner Summit before, you know he’s all about partner evolution -- specifically, how Cisco can help partners grapple with a unique period of technology and business model changes in the IT industry, and transform their businesses to meet those changes.
During his General Session discussion on Day 1 of last week’s Partner Summit, Edison urged partners to focus on three priorities: making hybrid IT a foundation of your value proposition, leading with solutions and professional services, and transitioning your sales teams to address new buying centers. Business transformation, Edison said, in one of the most repeated (and re-tweeted) quotes of the week, “is kind of like remodeling an airplane while it’s flying and there are people on it. We know it’s not easy. But if you focus on these three areas today, you will be well on your way to a successful tomorrow.”
Let’s hear a bit more from Edison on how Cisco wants partners to think about these changes:
When I was in London recently for Cisco Live, I got a lot of questions about how organizations can drive the most value out of collaboration. As expectations for seamless collaboration between devices and applications increase, I can practically see light bulbs appear over many customers’ heads as we talk about how collaboration technologies can transform a business and drive tremendous value.
Many of the conversations I have with customers surround how to best integrate collaboration technologies into business process and other applications to drive the highest value. Many customers are uncertain about how to move forward with taking a business and technology architecture approach to accelerate and simplify business processes.
There are a couple of ways to think about this. The first deals with integrating your collaborative processes into your business process, what we call Collaboration Enabled Business Transformation (CEBT). The second deals with integrating your collaborative capabilities and apps so they work together. This is particularly important since most companies have multi-vendor environments for voice and video, hardware and software, and desktop and network. It is an understatement to say that interoperability is critical with collaboration tools so users have a seamless experience when using them to communicate, do business, and maximize results.
Cisco SVP, Chris Dedicoat, presented CEBT at a keynote held during the Cisco Live London activities and appeared to drive a positive response. The CEBT approach to integrating your collaboration capabilities into your business applications processes such as salesforce.com or SAP, can Read More »
Analysts estimate that by 2013, more than 50 percent of all video surveillance deployments will be managed by IT on the IP network in order to support the coming deluge of bandwidth-heavy video data.
Similar to the evolution of telephony, physical security is becoming an IP-based solution to optimize scalability and reduce complexity and costs.
To support this evolution, Cisco has announced Video Surveillance Manager 7.0, the industry’s first solution built from the ground-up and certified to run in virtualized computing environments, making it possible for customers in healthcare, public sector and retail to move beyond traditional basic safety and security surveillance deployments and use video to transform the way they run their businesses through hyper-scalability and ease of configuration.