Millions consumers around the globe are buying smartphones, tablets, and other advanced mobile devices loaded with features and apps that can be used for business as well as for their own personal communication and entertainment needs. Many of these people have started taking these devices to work and integrating them into their daily workflow. This trend is often called “bring your own device,” or BYOD.
Cisco’s Internet Business Solutions Group (IBSG) wanted to know how prevalent BYOD is, and how corporate IT departments are handling these new devices in terms of support, network access, and security. In the spring of 2012, we surveyed 600 IT decision makers in U.S. enterprises, and then expanded our study in the summer of 2012 to include 4,900 IT decision makers in midsize companies and enterprises – in a total of nine countries.
Read More »
Tags: bring your own device, byod, Cisco, desktop virtualization, employee-owned devices, IBSG, innovation, mobile devices, policy, Smartphones, survey, Tablets
A large part of my job is explaining things to people. You can have the greatest technology in the world, but if you can’t explain to people why it is important, and how it will make a difference in their life or their business, then you have only done half the job.
That is why I am interested in different learning styles. One of the more widely-known models to describe different learning styles is Neil Fleming’s VAK/VARK model. Fleming postulates that there are three different types of learners: visual, auditory and kinesthetic. To vastly over-simplify Fleming’s work, some people learn best by seeing, others by listening and still others by touching and doing. While this might seem self-evident, understanding a student’s learning style can be a vital tool for teachers. Moreover, knowing your own learning style can significantly increase the amount you can learn and retain.
Read More »
Tags: byod, education, mobility, unified workspace, video, vxi
The consumerization of information technology has been a boon to innovations in the workspace. With mobile phones and tablets, today’s employees and consumers carry a significant amount of technologies on them. Retailers can leverage these technologies to enable employee productivity and improve customer experience if it can be managed effectively an securely.
Please join us on Thursday October 11th, 2012 for our live webcast titled “Retail Your Way: Supporting Multiple Devices with BYOD and Virtualization”
In this live webcast you will learn how to:
Read More »
Tags: byod, Cisco, mobility, retailing, retal, virtualization
- 100% IT is struggling to keep up with mobility trends
- Mobile threats have doubled from 2010 to 2011
- Around four in ten American users are likely to click on an unsafe link
And with all of these changing dynamics, user expectations continue to rise while the risk of security vulnerabilities rises. Yet, one of the expectations is a demand for safe access to essential business productivity and collaboration applications from anywhere, on any device (personal or organization acquisition), along with a consistent experience across multiple device types. This is the new workspace.
So, how do recent data center security enhancements play an important role in an ever more mobile and Bring-Your-Own-Device (BYOD) reality? The reality of the ever-increasing proliferation of devices for each user gives rise to a need for increased scalability and security in the data center even more evident. Users who bring their own device expect a good experience accessing the applications that reside in the data center. IT wants to ensure that applications delivered from the data center or internally are appropriately accessed and protected from any malicious actions. Securing a mobile and BYOD environment does not simply start at the endpoint; it must take an architectural approach from endpoint traffic traversing through the network to the data center. Cisco takes a comprehensive approach to securing applications, content, and devices delivered to any workspace, in any location, based on type and posture, location and time, and user’s role—ensuring an uncompromised user experience and giving your employees the freedom to be highly productive.
Read More »
Tags: bring your own device, byod, ISE, mobile threats, policy
Tomorrow, I’m heading to Washington D.C. for the Telework Exchange Town Hall.
The Town Hall Meeting “Mobility in the Fast Lane” will focus on mobile IT and the mobile workforce with 30 government and industry leaders keyotes and panel discussions on what it takes to build and manage a secure, mobile workforce.
We will be capturing the highlights from each of the sessions in a blog series and sharing video interviews with keynote speakers and panelists.
Read More »
Tags: bring your own device, byod, Mobile Government, telework, VXI for Government