Cisco Blogs


Cisco Blog > Video

Delivering True Interop – The Difference Between Standards and Interoperability

In today’s business world IT professionals have to manage multiple collaboration applications in order to support an increasingly mobile workforce, flexible desktop solutions as well as collaboration and video rooms within their organizations. The collaboration environment is multi-endpoint and multi-vendor and reaches beyond enterprise boundaries – both B2B and B2C.

Compounding this IT challenge is the maturity of the collaboration market.  To date, companies have typically made significant investments and want to protect these investments as they move forward.  In particular, companies want to protect the quality of experience as they move to integrate across department, company and consumer boundaries, and as they look to expand their deployments.  This challenge grows more acute as the market rapidly evolves towards innovations such as H.265 and WebRTC.

Companies are looking for true interoperability with a seamless user experience that:

–         Allows them to benefit from new innovations

–         Interoperates with existing and future investments

–         And, works across company boundaries and functions in a diverse environment

Read More »

Tags: , , , , , , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

Summary: BYOD and Collaboration Don’t Have to be Next National Security Threat

In a world where people are always on the go, it’s only natural that employees will use their own mobile platforms more often for collaboration.  However, the increase in the Bring Your Own Device (BYOD) trend for collaboration purposes brings about a number of security concerns in the workplace.

There are multiple capabilities that go into delivering an enterprise-class BYOD solution. The recent attention around the National Security Agency (NSA) surveillance leak may have organizations across the globe reevaluating their strategies when it comes to BYOD security, but there are tools to minimize threats, such as: user authentication, network access control, and remote data wipe

We understand the need for an emphasis on security and have developed the tools to minimize the threat when it comes to your organizations’ BYOD strategy. Please take a look at our CTO of Collaboration, Laurent Philonenko’s recent No Jitter article about the many options and factors to consider when planning your BYOD security strategy.

Tags: , , , ,

A Six-Part Series: Transforming Higher Education in the US – Recommendations – Part 6

Education Telepresence

This six-part series focuses on transformation of the traditional higher education system in the United States.  Read parts 1 through 5 on the Cisco Education Blog.

Part 1: The Need for Change

Part 2: Shared Challenges

Part 3: Navigating Culture

Part 4: Modernizing Teaching and Learning

Part 5: Scaling Best Practices

Educators share a common crisis in the delivery of higher learning.  They suffer many of the same challenges, with regard to access to quality educational experiences, the need to replace outdated teaching methodologies, and the imperative to prepare students to become part of the workforce of the future.

Read More »

Tags: , , ,

Innovation is Standard at Idaho Education Network

For the last four or five years, I’ve watched as the Idaho Education Network (IEN) has implemented and reaped the benefits from their distance education program and use of video conferencing, or telepresence. To this day, they continue to improve on success, and during a session at ISTE 2013 last week, Brady Kraft and his team once again illustrated how they consistently stay on top of their game.

Brady Kraft, IEN, presents at ISTE 2013

Brady Kraft, IEN’s Technical Director, presents at ISTE 2013

IEN is a statewide network that connects every school in the state, including higher education institutions, Internet2, private and public training providers, and first responder training organizations.

One of their mandated goals is to provide equal access to a quality education for all citizens and they’re utilizing technology to achieve that goal. As the 7th  most rural state in the nation, half of the counties in Idaho have less than 10 people per square mile, and 75% of Idaho’s schools have < 600 students. These schools havenot been able to offer a full curriculumdue to many factors, including availability of qualified teachers and budgetary restraints. Read More »

Tags: , , , , , , , , , , , ,