Cisco Blogs


Cisco Blog > Mobility

Beyond Today’s Productivity and Efficiency: Enterprise Mobility Enables Long-Term Growth

One of the basic tenants of enterprise mobility is its direct influence on “now”.

When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enterprise mobility is not short-lived.sixsteps

Recently, we counted down the “Six Essential Steps for Unleashing the Power of Enterprise Mobility.”  Throughout the series, we provided a guide for enterprises to follow to implement broader mobility. We discussed how businesses could benefit now by untethering their global workforce and increasing productivity. The series highlighted a tactical approach to mobility, yet we would be amiss not to discuss the long-term transformational impact mobility can have on businesses. How can mobility be a catalyst for organizational growth and innovation?

Last week, I read an IT Web article by Johannesburg-based Lebo Mashiloane that discussed how BYOD and mobility are fueling enterprise growth. The article brought up a concept that is always important to keep top-of-mind: How today’s technology solutions are changing the landscape of tomorrow. Read More »

Tags: , , , , , , , , , , ,

Wearable Tech: At the Nexus of IoE, with a Sense of Style

Science fiction writers have often mused about the merger of humans and machines. But while RoboCops and bionic superheroes aren’t likely to fight evil anytime soon, some exciting wearable smart technologies are already here. They may not match Tony Stark’s Iron Man suit, but they are enabling ordinary people to interact with the wider world — and the Internet of Everything (IoE) — in intriguing (and sometimes stylish!) ways.

So, if you think your smart device is generating and processing a lot of data today, get ready for an even closer connection with your personal technology in the near future. Wearables are infusing sensors into bands, watches, shoes, shirts, bras, glasses, earrings, necklaces, and helmets. And these technologies are ready to generate reams of data — as well as real-time insights — about the ways in which we live, play, learn, work, exercise, maintain health, you name it.

I expect wearables to be a core topic of conversation at the Internet of Things World Forum in Barcelona later this month. As a further evolution of IoT, IoE is all about connecting people, processes, data, and things in amazing new ways. And while we often hear about IoE’s potential to transform supply chains, factories, retailers, and assorted megaprojects, wearables are a good reminder that the people element of connecting the unconnected is paramount. Armed with these new technologies — and the ability to connect via the key pillars of IoE, such as cloud, mobility, video, and analytics —individuals will be able to monitor and quantify their lives like never before. Wearables add another dimension to the Quantified Self movement, which I covered in a previous blog.

Read More »

Tags: , , , , , , , , , , , ,

Mobility: No Longer a Risky Business?

Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss.CiscoSecurity

In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate data and applications, have challenged how we define security. And with recent news reports citing the rise of mobile hacking and network threats, the security of mobile technology and the data it carries seems to be at risk.

Fortunately, all is not lost.

Mobility gives employees and providers options for the workplace and creating a mobile experience that is efficient and innovative. It is also helping businesses save and make money. Today, employees in any place on any device can access any application across any network in any cloud. As a result, there are challenges associated with implementing a comprehensive BYOD policy that encompasses a proliferation of devices connecting to a network.

Even though mobility can cut costs and increase productivity, 60 percent of IT professionals recently surveyed believe mobile devices in 2013 present more of a risk to their organization than they did in 2012. And even with the growing concerns over mobile security, it still appears that only 60 percent of organizations require security technology for mobility plans. Why isn’t that number higher? After all Android Malware grew 2,577 percent in 2012 alone.

Read More »

Tags: , , , , , , , , , ,

A Generation X Perspective: Collaboration My Way?

I was recently digging through a closet at home and happened upon some boxes with old tech gadgets from years past.  As a Gen Xer who grew up with a Commodore 64 and whose first personal workplace productivity tool was a US Robotics Palm Pilot in 1997, it made me come to two realizations.  First, technology has really changed – and for the better.  And second, I need to start parting with things that no longer work in the current state of the working world.

My generation is described as highly individualistic.  We’re supposed to be technologically adept, flexible and value work/life balance.  And I can assure you I am all of those things.  But when I think about my career and how my generation’s cultural values have translated into the technological culture of the places I’ve worked in years past, it hasn’t always been rosy.  I used to be tethered to a cubicle with a desktop computer and telephone.  Things got slightly better with laptops, but there were no Apple products or personal devices allowed on the network.  One supported choice for a smartphone?  Not so smart, really.  But as new generations are entering the workforce after me, I’m seeing a dramatic shift occurring in thinking and approach.

I’m noticing that both organizations and technology providers alike are recognizing the need for change and designing for a new way of working – giving employees access to technology like never before. Whereas I used to have difficulty getting collaboration tools to do the job, now there is a plethora of them at my disposal.  But be careful what you wish for. Read More »

Tags: , , , , ,

Cisco’s onePK Part 2: Reaching out to a Network Element

Exordium

In the previous installment of the onePK series, you received a crash course on Cisco’s onePK. In this article, you’ll take the next step with a fun little exposé on onePK’s C API. You will learn how to write a simple program to reach out and connect to a network element. This is staple onePK functionality and is the foundation upon which most onePK applications are built.

Preambling Details

The following short program “ophw” (onePK Hello World), is a fully functional onePK application that will connect to a network element, query its system description, and then disconnect. It doesn’t do anything beyond that, but it does highlight some lynchpin onePK code: network element connection and session handle instantiation. This is the foundational stuff every onePK application needs before useful work can get done. Read More »

Tags: , , , , , , , , , , ,