Mobile workers accessing corporate applications and data from a range of personal and corporate devices is fast becoming the new normal. Month by month every survey confirms the inevitable—mixing personal and business data, devices, and apps. Companies are scrambling amidst a sea of new technologies to regain control of their IT infrastructure, and those thinking ahead are planning for more than just tolerance of personal data and scaling mobile access; they’re building the next evolution of application access, which is based on consistent policies for application and data across any access method or device. These architectures demand an integrated system that spans device, network, and application layers, and they demand policies for employee access based on much more than user name and password. Read More »
The RSA Conference is expected to be bigger and better than ever this year—more booths, more vendors, more technical sessions and keynotes.
But I have to ask the question: “Are we as IT practitioners better off now than we were 4 or 5 years ago?” There are a lot of people at the show who worry that the old approaches aren’t working and next generation solutions have not clearly come into focus. I do think, however, there are reasons to be cautiously optimistic.
Join me for a live broadcast from the RSA show floor on Wednesday, February 27 at 10:30 AM PT as I discuss what I’m seeing at the RSA conference and what it means for the IT Security industry. We’ll be taking your questions live via Twitter and Google Hangouts. Read More »
As the demand for next-generation data center services increases, organizations have embraced virtualization and cloud-computing technologies that require security architectures to be more dynamic, automated, and services-oriented. Most network security technologies have not kept pace, they are static and fail to protect against modern threats. Additionally, siloed security technologies are a networking and data center team’s worst nightmare—they often require that the network be “dumbed” or retrofitted to accommodate security approaches.
This is why Cisco has embraced security as part of an end-to-end architecture. Cisco builds in security functions as part of the network fabric to help ensure an automated and resilient infrastructure. Our latest Secure DC bundle pairs the industry-leading router (Nexus 7000) and firewall (ASA 5585) to provide the backbone for a dynamic network with which to accelerate the adoption of newer and more capable applications and services. Various mix-and-match configuration options make this bundle ideal for data centers or any size industry. Read More »
Lynn University is a 50-year old private, coeducational institution located in Boca Raton, Florida. So how was this fairly small and quiet school selected to host the final 2012 presidential debate? It’s booming with technological innovation.
The school has long held the belief that student collaboration and sharing of knowledge is vital to the learning process, but realized with time, they need to increase student support through technology. To move to a 1-to-1 program entailed giving each student an iPad and overhauling its network environment. In late 2011, as this transformation was underway, Lynn discovered that they would also soon be the youngest school to ever host a presidential debate.
This meant the school had less than a year to undergo a complete technical refresh, so Lynn turned to Cisco for help. University CIO Chris Boniforti summed up his decision to select Cisco by saying “All of our diverse technical requirements, for both the debate and the university, could be done under one umbrella, with one vendor, and that was Cisco.”
This umbrella of technology included Cisco wireless solutions, Cisco Unified Computing System and Cisco security, voice and IP communications. Cisco joined forces with longtime partner Modcomp to deliver a solution the university could use well beyond the presidential debate. The result: A successful implementation that resulted in a “technically smooth” debate.
It’s important to note this project didn’t shut down once the debate was over. Today, the school is committed to providing a mobile platform for its entire faculty and students by the time the newest crop of freshmen arrive in fall later this year. The addition of the new business school will include lecture capture and resources-sharing tools, including video. Now embedded in the teaching environment, this benefit would not have been possible without Lynn’s new Cisco network.
I’m personally impressed with the university’s commitment to technology. They are a great example for other small schools looking for cost-effective innovation. What do you think? Is your school ready for this kind of transformation?
Add this to your list of parties spoilt by the Internet revolution: national sovereignty.
We all know that the borderless nature of the Internet is stretching longstanding technical and legal definitions. But recently, my colleague Richard Aceves and I got to talking about the mish-mash that social media is making of culture, language, and national identity. It should come as no surprise that cultures and languages are being diluted by the global online discussion, in the same way that the advent of television and radio had a dampening effect on certain regional spoken colloquialisms and accents. Richard will examine some cultural questions in a forthcoming blog post, while I’ll be discussing the psychological impact on national sovereignty.
Judging by the proliferation of Internet policies and legislation, it is pretty clear that bureaucrats and politicians in capital cities around the world are worried that the Internet (with special thanks to social media) is simultaneously eroding both their authority and their national identity. Read More »