Several years ago, I had a conversation with an IT manager about his company’s network security that I still remember today. He said: “We’re losing our battle over internal network security. We cannot keep up with our vendors and contractors who bring in all kinds of devices to our network. We may turn our internal network into a DMZ.” Turning an internal network into a DMZ was probably an extreme case at that time but it showed the underlying problem: if you don’t have control over what’s happening on your network, you’ll have an uphill battle in your hands.
Today, the challenge has intensified due to the bring-your-own-device (BYOD) trend. There are speculations that corporate networks may eventually turn out to be the equivalent of college networks where users routinely bring their own personal devices. Because personal devices generally do not have the same level of security as IT-owned assets, they tend to have more vulnerabilities and it’s harder to protect sensitive information and intellectual property on these devices. The adage, “security risks walk in the door with employees” is quickly becoming a reality that organizations must address.
Read More »
Tags: 802.11ac, Bring your Own Device (BYOD), byod, DMZ, enterprise network, MDM, Mobile Device Management, UA, unified access
After a well deserved break and perhaps a bit of indulgence over the holidays, we are now back to the books and looking ahead at what 2013 has in store for education.
Last year we watched as school districts embraced mobile learning and universities relied more on collaborative technologies. Those that took the leap and accepted new tools and educational models were rewarded with improved student performance, accelerated partnerships and more.
With a landmark year for education technology behind us, now is the time to harness the momentum and drive innovation forward in 2013. So as we slither into the year of the snake, here are four high impact trends worth watching:
- Perfecting the Flipped Classroom: As more teachers do the flip, they will reconsider how to empower students and hone in on the most effective ways to use class time. In 2013, we’ll be sure to see more innovation around this technology-enabled classroom model.
- Transition to hybrid learning: With online courses on the rise, educators will experiment how to best integrate them with traditional teaching methods. This year schools and universities will hone in on the most effective formats for learning in the digital age.
- Read More »
Tags: blended learning, byod, BYOE, cloud, edchat, edreform, edtech, Flipped Learning, FLN, hybrid learning, mlearning, mobility, TelePresence
Virtual Desktop Infrastructure or VDI is getting a lot of attention these days. It allows companies to replace high-cost laptops with a lower-cost, secure device. It also allows employees to access a secure, cloud-based desktop from any device across the Internet.
Desktop virtualization has been popular among the Cisco salespeople who are ACE users because they can access the same centrally stored applications and content wherever they have an Internet connection and whether they are using a laptop or tablet. The faster startup time for the tablet client compared to booting-up a laptop may be one reason for this popularity, because it helps salespeople get information quickly, especially when they are talking with a customer.
Read More »
Tags: ACE, byod, coc-collaboration, vdi, video, Voice, vxi
Takeaway: The Cisco Enterprise Wireless group helps networking and IT professionals stay informed and get the most out of Cisco’s products and solutions, while displaying thought leadership on major technological trends. For 2012, there were 10 posts that stood out from the rest.
Cisco Enterprise Wireless products and solutions continue to grow in the enterprise space, providing best-in-class wireless infrastructure for many businesses and organizations. Out of our blogs this year, including detailed case studies of how enterprises utilize Cisco products and solutions, best practices from successful deployments, overviews of thought leadership webinars, and more, ten posts stood out from the rest.
Ten Most Popular
1. Get your Wi-Fi Network Ready for Windows 8
Jeevan Patil discusses 802.11w and Windows 8 compatibility, workarounds, why you should care and how to ensure that your network is ready.
2. 802.11ac: The Fifth Generation of Wi-Fi Technology
802.11ac is coming. Let Bill Rubino walk you through the in’s and out’s of IEEE’s latest standard, aided by trusty Techwise TV Fundamentals.
Read More »
Tags: .11, 802., 802.11ac, byod, Enterprise, iphone5, LAN, mobility, network, wi-fi, wifi, Windows 8, wireless, wlan
In this blog, let us take a look at how Catalyst access switches profile the various connected devices and make the information available to various network services.
Many devices like laptops, IP phones, cameras etc. are connected to the network and need to be managed by IT for asset management, device onboarding, switch configuration, policy management & device energy management. Traditionally, IT administrators manually added each device for each service. This consumes unnecessary overhead and is an inefficient use of IT’s time. Read More »
Tags: Access Switches, byod, catalyst, Connecting IP Phones, Demystifying the Catalyst, Identity Services Engine, IOS, IOS Device Sensor, ISE, QoS, switch