Cisco Blogs


Cisco Blog > Mobility

TU Darmstadt Rolls Out Cisco Unified Access to Prepare for 802.11ac

May 27, 2014 at 11:31 am PST

Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.

tud1

No wonder, they have a reference from Albert Einstein!

tud2

In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Have You Registered for the April 17th One Network Deep Dive?

Activate the IT Transformation with Cisco Unified Access” Webinar Series: Part II Network Deep Dive, April 17

Wired and Wireless

In just two days, Wednesday April 17, we will have the 2nd live broadcast of the Cisco Unified Access webinar series. We will have excellent technical content to dig deeper into the subject of “One Network”, specifically converged wired and wireless access (CLICK HERE TO REGISTER). Read More »

Tags: , , , , , , , , , , , , , , , ,

Get Ready for a Deep Dive into Converged Wired and Wireless Access

April 10, 2013 at 11:30 am PST

Wired and WirelessActivate the IT Transformation with Cisco Unified Access” Webinar Series: Part II Network Deep Dive, April 17

Your network is going through rapid changes as your user and business requirements continue to evolve. Before long (if it’s not already happening), the edge of your network will more than likely transition to a high performing Gigabit desktop switching network plus a highly reliable Gigabit Wi-Fi (802.11ac) network. Cisco Converged Access is an innovative deployment mode that has been optimized to support both the Gigabit Ethernet based and the Gigabit Wi-Fi based edge as a single network with excellent scale, security, and performance.

You might be thinking to yourself: Read More »

Tags: , , , , , , , , ,

Deep Dive into Converged Wired and Wireless Access April 17

April 10, 2013 at 10:18 am PST

Last week we kicked off the first webinar of a new 5-part Cisco Unified Access webinar series. Many of you joined the event and I was very happy to see your questions and discussions during the broadcast. The event was a high level overview of industry challenges with BYOD, mobility and the Internet of Everything, as well as how Cisco Unified Access can help address these challenges with the One Policy, One Management, One Network approach.

Next week on Wednesday April 17, we will have the 2nd live broadcast of the Cisco Unified Access webinar series. We will have excellent technical content to dig deeper into the subject of “One Network”, specifically converged wired and wireless access (CLICK HERE TO REGISTER) and we will be covering a lot of technical topics such as your above questions. See more a the Borderless Blog.

Wired and Wireless

Read More »

Tags: , , , , , , , , , , , , , , , ,

Compliance versus Security

Rogue access points and unauthorized access, DDoS or penetration attacks, evil twin attacks – all mobile security issues that can keep you awake at night. But do you know the difference between compliance and enterprise security? Being compliant is not synonymous with being secure, that’s why our webcast on April 16, is focused on how to bridge the gap between PCI compliance and security to minimize the impact of an attack.

Read More »

Tags: , , , , , , , , , , , , , , , , , , , ,