We could debate whether certain technologies are or are not a commodity, but the fact of the matter is when many enterprises evaluate their technology spend they consider two points: function and cost. This viewpoint yields initial cost savings when technology investements are awarded solely based on price. Unfortunately, a major consideration has been left out when evaluating enterprise technology investments mainly on price. The business risk and increased operating costs associated with multivendor environments, which in the long run may mitigate any initial cost savings.
This message is not new, but what is new is a research paper from Deloitte that details the value of a single-vendor architecture in mitigating business risk and those investing in technology need to consider these risks at the time of evaluation. This paper is a great lead in for the business architecture discussion that will translate to the technical architecture. This paper does two things: Read More »
For nearly everything that I do in college, I need access to the Internet: classes, studying, meetings, and, discussions. In class, I access lecture documents on Blackboard. In meetings, I review and send emails. Studying, I research topics online and download information from the library. Essentially, I’m connected to the network constantly, and to be successful, I have to have the ability to connect any time, from anywhere, on any one of my several devices.
As most CIO’s and IT professionals would agree, building a scalable and robust network is a thankless and daunting task. It’s even more difficult in colleges and universities, where enabling tens of thousands of students to quickly and safely access the network is a critical imperative. And if the equipment is unreliable, access is compromised. When this happens, the institution faces difficultly in implementing online teaching initiatives, costs can increase and ultimately, there may be a productivity decrease. Additionally, faculty and students can become disgruntled and unmotivated as a result of network complications.
In the words of Morley Safer from the American news program 60 Minutes, “Stand back all bosses, a new breed of American worker is about to attack everything you hold sacred.” What a nice way to put it Mr. Safer, but to be honest, it sounds a little biased.
Why has there been controversy between Generation Y and the current workforce? It may be due to our abnormal perspectives or the fact that we appreciate when others want our input – whatever it is, the media has enjoyed writing about our “non-traditional” ways of working. The truth is other generations are now embracing some of our methods: such as communicating through social media and “Bring Your Own Device” (BYOD) because of its convenience and efficiency.
Yes, we may be viewed as discourteous to what the current workforce offers, but considering we represent some of the earliest adopters of new technology, we believe there is always “a next best thing”. Read More »
I know BYOD is hitting close to home when I’m receiving notices from the local middle and high schools requiring students to bring their own tablets to class. It is efforts like these that show BYOD (Bring Your Own Device) as more than simply a marketing term being thrown around by various network vendors—it’s undeniably real and it’s all around us.
With that in mind, the promise of BYOD will come with its challenges—the deployment and management risks involved threaten to be a major headache for IT managers if they are not properly prepared for it. When it comes to wireless networks, preparing and planning for potential future technological trends is always a best practice. We know our customers will be faced with the challenge of preparing for BYOD, and we want to help. That’s why we are hosting a webinar called Pervasive Wireless for BYOD.
We plan to discuss how to best prepare your network for the challenges and management risks inherent to a BYOD deployment:
New user expectations in an evolving workplace landscape.
The enterprise no longer owns the mobile devices accessing the network.
IT has lost visibility and control of user devices and applications.
With BYOD, anywhere, anytime, any device usage is expected from the user, and the workplace is now globally dispersed with users touting mixed wireless devices. This paradigm shift calls for dramatic changes in how IT controls and manages users, devices, and applications. It is critical to be aware of these challenges when planning, deploying and managing your network for BYOD.
To give you a taste of what is included in the webinar; here are four steps we will be discussing:
With younger generations increasingly adept at technology, classrooms are adopting a tech-driven approach to teaching. Interestingly, what we see in response is the same as what we see in the workplace: a push toward BYOD, or Bring Your Own Device.
And as it turns out, students’ preferences for using their own devices over available library or computer lab resources carries over to their professional lives, as well. According to a recent Cisco study, “Two of five […] would accept a lower-paying job that had more flexibility with regard to device choice, social media access, and mobility, than a higher-paying job with less flexibility.”