Cisco Blogs

Cisco Blog > Education

Checking in from EDUCAUSE 2015

Hello from EDUCAUSE 2015! I’m checking in from Indianapolis to share a little bit about what has been discussed so far. Yesterday, I heard an excellent general session from Daniel Pink, had the chance to attend multiple sessions on everything from the affordability of course materials to the personalization of the student experience, and spoke to multiple educators and IT professionals about trends they’re seeing in the education technology space.

One of the biggest things that everyone is talking about this year is online learning. EDUCAUSE named e-learning and online education one of its top 10 information technology (IT) issues, and multiple sessions discussed how to best approach the trend. One key takeaway is how e-learning will help engage a new type of student, but presenters stressed that online learning is much more than simply putting your regular course material online—it is a new way of reaching students. I also heard in one session that online education must be both scalable and well-sourced to be successful. It is this insight from technology companies and educational institutions that make EDUCAUSE such a great show!

Building off of the concept of online learning was the much-buzzed-about topic of mobile device management. Data shows that students are on their phones more than ever, and educators are trying to figure out how to best harness mobile devices for use in their classrooms and how to integrate them into the curriculum.

And the undercurrent to both of these ideas is something that we’re passionate about here at Cisco: security. When EDUCAUSE presented their top 10 IT issues for 2016, information security was number one on the list. And for good reason – while the benefits from connected classrooms and e-learning are huge, this interconnectedness also greatly increases the risk of security breaches. Hacks of information in the education world often start from phishing scams, and schools need holistic and agile solutions to help secure their networks and protect their data.

That’s just scratching the surface of what’s being talked about here at EDUCAUSE. Other sessions covered everything from women in higher education IT to envisioning the future of the CIO to how the CIO can collaborate with faculty and administrators to optimize education technology. The Cisco team and I are looking forward to another full day of learning here in Indiana, and will be sharing much more about our key takeaways in a wrap-up blog post after the event concludes. If you’re at EDUCAUSE this year, stop by booth #1302 to say hello to our Cisco team, and make sure to follow along on social media using #EDU2015 and #CiscoEDUCAUSE!

Tags: , , , , ,

Let’s Talk: Tackling the Shadow IT Tsunami @ #CIOsynergy San Francisco

Did you know it pays to optimize your cloud strategy? (Literally)

A recent IDC/Cisco report shows that key business indicators (top-line revenues, strategic IT budget allocations, greater IT asset flexibility) all increased with a better cloud strategy.

You see this in the results. On average, companies who optimized their cloud experienced:

  • 4% increase in revenue growth
  • 200% improvement in strategic allocation of IT budgets
  • 99% faster time to provision IT services
  • 77% IT cost reduction

On the flip side, the same report noted that only a whopping 75% of companies have only an opportunistic, ad-hoc, or no cloud strategy at all. None! So what are they waiting for?

Read More »

Tags: , , , ,

Do You Know the Way to Ballylickey? Shadow IT and the CIO Dilemma

I was once on a driving holiday in southern Ireland. As anybody who has been to that beautiful part of the world will know, the scenery is magnificent, but the road signs can be very confusing. Totally lost I pulled over to ask directions to Ballylickey and a local farmer uttered the immortal phrase: “Well, if I was going there the first thing I would do is not start from here!” Amused by the response and the clarity of his logic, I drove off and tried again at the local pub. But when I think about it that guy was right – starting off from the right place is hugely important. And when we apply that homespun logic to IT most CIOs are not starting in the right place when it comes to their cloud strategy.

Read More »

Tags: , , , , ,

Unicorns and Global Digital Disruption: Part II

In my last blog, we talked about the current age of digital disruption and how unicorns are changing the tech landscape.

What Does This Mean For You Though?

As a result, IT and LoBs are under more competitive pressure than ever before. A new wave of disruption faces them – hence, businesses need to react fast, innovate and release. This is where Shadow or Rogue IT comes into place – LoBs want to fail fast, and fail often. You can’t do that if it takes 2-4 weeks for a VM, never mind with access control restraints. At Cisco, our Cloud Consumption Service helps find on average 5-10 times more cloud services than the CIO was aware of. Shadow IT or Rogue IT is just the business trying to react to the market: the path of least resistance wins.

Developers and Decision Makers

Read More »

Tags: , , , , , , ,

Traditional ISVs – Transform your Business into the World of Cloud Computing

If you’re a traditional on-premises software company, you’re in the right place. Today, I will talk about how cloud computing can transform your business. In a subsequent Cisco Blog, I’ll discuss the implication this move will have on your sales and distribution strategy.

Model One Business Model

Traditional software companies have operated in a Model One Business Model. In this on-premises model, the customer buys a perpetual license for software and then pays annual support and maintenance fees, which turn out to be another kind of subscription revenue stream.  While that might seem to be the end of the cost to the customer, it’s not. The customer is going to have to spend money managing the software – and it’s not cheap.

Read More »

Tags: , , , ,