Public safety organizations worldwide are increasingly adopting and using secure broadband networks, supporting open standards and multivendor technologies, and using new public safety applications, while adopting new policies for bring your own device (BYOD) using Apple iOS and Google Android smartphones and tablets for their personnel.
The rate of adoption is continuing to accelerate because of the next technology trend, called the Internet of Things (IoT), which empowers public safety to make its communities and cities safer. In fact, according to recent research by Cisco Consulting Services, this represents more than $4.6 trillion in Internet of Everything (IoE) value at stake for the public sector.
First responders rely on mission critical communications and sensors to fulfill public safety needs, further empowered by the Internet of Things
The IoT is the next technology transition in which devices will allow us to sense and control the physical world by making objects smarter and connecting them through an intelligent network. IoT is about connecting the unconnected.
At APCO, Cisco and partners will demonstrate next-generation public safety solutions based on open standards, secure networks, and Internet of Things technologies and solutions providing important benefits:
- Enhanced reliability: Cisco’s IP infrastructure keeps the mission-critical network running at the most critical times.
- Cost savings: Cisco’s software solutions allow less expensive endpoints to communicate with user groups.
- Improved operations: Agencies can now communicate with voice, video, and data in open collaborative ways.
- Multiple-vendor solutions: Cisco’s software allows customers to choose between many best-in-class vendors for an entire solution.
- Solution support: Cisco offers support for the entire system, including third-party components, with a single support call.
We will showcase new solutions for next-generation instant communications using private and public networks that are now available to government and enterprise customers. Cisco’s IoT solutions support public safety, utilities, and industrial customer needs with multivendor, interoperable broadband technologies for mobility: BYOD, bring your own application (BYOA), and bring your own interface (BYOI). Cisco’s technology gives system integrators the ability to connect different systems that unify P25, LTE, and public safety broadband technologies easily and affordably.
In the Cisco booth we will be demonstrating our newest IPICS software solution, which includes a software development kit (SDK) that enables application developers to embed Cisco’s push-to-talk technology into their applications. Cisco will highlight the Quantum Virtualized Packet Core is a software application that routes data over LTE networks. The Cisco Quantum™ Virtualized Packet Core (QvPC) is one of the industry’s first commercial virtualized evolved packet cores, the new Cisco Quantum Virtualized Packet Core (vPC ) solution redefines the paradigm of agility for service providers.
Read More »
Tags: 4.6 Trillion Internet of Everything Public Sector value at stake, 911 Wifi Indoor Location Tracking, APCO 2014, byod, Cisco, Cisco Instant Connect, Cisco IP Interoperability and Collaboration System, Cisco IPICS, Cisco Mobility Services Engine, Cisco Qantum™ Virtualized Packet Core, Etherstack, internet of things, Public Safety Communications, QvPC, raytheon, Tait Communications, Telecommunications Systems
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:
- By 2018, over half of all devices connected to the mobile network will be “smart” devices
- Tablets will exceed 15 percent of global mobile data traffic by 2016
- By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita
With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.
What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.
Read More »
Tags: byod, Cisco, data security, future of mobility, malware, mobility, security, vni
In just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.
Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:
How do beacons work?
Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags. These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.
I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mobility services engine, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan
ISTE 2014 marks the launch of summertime for many educators as they come together to connect and share ideas about technology and innovation. Unsurprisingly, the theme of “connectedness” continues with this year’s show in Atlanta. The ability for schools to connect to the Internet and help make access to technology ubiquitous is changing learning in ways we probably never imagined: students can now take virtual field trips; they can access almost any information any time with the touch of a button, and traditional textbooks are going digital. Rapid advances in technology are accelerating change.
In 2015, 25 billion devices will be connected to the Internet. More things are connected to the Internet than there are people in the world. By 2020, that number will double to 50 billion devices, and each person will have an average 6.58 devices. We know that Internet of Things (IoT) connections will grow from two billion to six billion in the next five years, producing an enormous amount of information. Read More »
Tags: byod, Cisco Education, edtech, education, IoE, ISTE, ISTE2014, IVC, mlearning, renee patton, VTC
We’ve been hearing from some of our customers that they are interested in using Cisco Meraki in their branches alongside their Cisco infrastructure in their main offices, but were worried about having to deal with too many segregated policy management systems.
Good news: Interoperability between Cisco Meraki and ISE is here. Administrators can now define a single user access policy across on-premise and cloud-managed networks.With this interoperability, Cisco infrastructure customers can now deploy Cisco Meraki in their branches in the same network as other Cisco equipment, with all devices across the network managed under ISE for unified access policy management.
Read more about the Cisco Meraki and ISE interoperability in the blog post: Got ISE?
To get a free Meraki wireless access point and learn more about the solution, join one of our online webinars. See the complete schedule and choose from a range of webinars featuring Meraki customers, product and solution overviews, and topics like BYOD.
Tags: access, branch, byod, Cisco, cloud-managed, customer, interoperability, interoperable, ISE, main office, Manage, management, meraki, network, on-premise, policy, product, security, segregated policy management, single user, solution, webinar, wi-fi, wired, wireless