Cisco Blogs


Cisco Blog > Mobility

Enterprise Apps: The Next Wave in Mobile Transactions

Earlier this year, I was having a business dinner with an important client in London when I received an IM on my iPhone. The message was from a Cisco colleague, and it said, “I need you to approve a purchase order. Right now.”

So I stepped away from the table, launched an app on my iPhone, read the purchase order, and clicked “approve.” Then I returned to my seat and went back to our dinner without missing a beat. The whole process took maybe two minutes.

Just a few years ago, this transaction would have required a laptop tethered to the network in a hotel or office, and it would have completely disrupted the dinner.  This pace of change, leveraging mobility solutions, across IT is unprecedented.

Why are so many businesses turning to mobile enterprise apps? According to Gartner, more than 25 percent of enterprises will have an app store by 2017. Mobile apps are making the promise of BYOD a reality. People love their apps and the highly personalized experience they deliver. By bringing their own devices to work, people can enjoy their work more, use the devices they choose, and do their jobs better and faster—from anywhere. According to Cisco’s latest study, the Financial Impact of BYOD, they can also be more innovative and productive.  At Cisco we firmly believe that work is a thing you do, not a place you go.  Read More »

Tags: , , , , , , , ,

[Cartoon Catalyst Blog Series] Why deploy Pervasive Wireless for K-12. Who’s doing it and how.

With so many schools looking to integrate various technologies for things like blended & distance learning, increased staff and student collaboration, and mobility options, many are asking “are we sure we have the necessary infrastructure?”. And if they answer yes, will it support the newest technologies, and will it work all the time, every time?

We all know technology-enabled classrooms are becoming necessary for students and teachers living in a network-connected, mobile world.  Luckily, schools can actually reduce operating costs at the same time they are enabling these technologies by providing a wireless network infrastructure. Read More »

Tags: , , , , , , , , , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

[Cartoon Catalyst Blog Series] The New Age Textbook – Implications of BYOD on K12 Education

Today’s education landscape is rapidly changing. We’ve entered an era where technology dictates the way things get done and education is at the forefront of this shift. One might ask, “How will technology affect education?” Consider the schools of past, when the only educational resources offered to students were textbooks. What if we could positively impact the way we educate our future generations, while creating a more efficient way of learning that inspires fun and creativity?

Read More »

Tags: , , , , , , , , , ,