For this week’s final Public Sector BYOD Thursday post, I wanted to discuss a survey that illustrated what employees want and need when it comes to IT in the workplace:
- Control over the work experience—the ability to use technology to personal preference, in ways that improve productivity and enhance job satisfaction.
- Choice when it comes to devices and the ability to use preferred, personally owned devices to complete work-related tasks.
- Flexibility to perform personal activities at work and work activities on personal time.
- Mobility that enables anytime, anywhere connections to colleagues, customers and partners.
Read More »
Tags: architecture, byod, collaboration, connectivity, desktop virtualization, education, government, IT, mobile, mobile collaboration, mobile-ready, public sector, unified workspace, virtualization
..AND WIN !!
Think you know Cisco’s Unified Data Center? Like to friendly compete with others ? Well , well ! It’s about time to prove it! There are at least two ways to do that: the serious and the fun.
The Serious Way: You deploy an Unified Data Center at Work – Can it be risky? – Not really ..but check out this video anyway:
Disclosure : The numbers displayed in this video are extracted from a real case study
The Fun Way: Participate to the Unified IQ Contest!
Starting on October 1st, we give you the opportunity to test your knowledge .
A fun and easy way to play and compete with an immediate reward. During 6 weeks , we will propose every week a set of questions with multiple choices created by our genius and facetious bloggers. We will cover topics such as Unified Computing Systems, Unified Fabric, Unified Management, Desktop Virtualization, Cloud, Open Network Environment. You got the picture! The whole Cisco Unified Data Center portfolio !
Read More »
Tags: Cisco, cloud, contest, data center, desktop virtualization, iPad, UCS, Unified Fabric
Millions consumers around the globe are buying smartphones, tablets, and other advanced mobile devices loaded with features and apps that can be used for business as well as for their own personal communication and entertainment needs. Many of these people have started taking these devices to work and integrating them into their daily workflow. This trend is often called “bring your own device,” or BYOD.
Cisco’s Internet Business Solutions Group (IBSG) wanted to know how prevalent BYOD is, and how corporate IT departments are handling these new devices in terms of support, network access, and security. In the spring of 2012, we surveyed 600 IT decision makers in U.S. enterprises, and then expanded our study in the summer of 2012 to include 4,900 IT decision makers in midsize companies and enterprises – in a total of nine countries.
Read More »
Tags: bring your own device, byod, Cisco, desktop virtualization, employee-owned devices, IBSG, innovation, mobile devices, policy, Smartphones, survey, Tablets
Just imagine. It’s HR benefits enrollment season. And you’ve left your annual selections to the last possible minute. And it’s the last day of the enrollment period. You find yourself feverishly dialing the support line, hoping that by some stroke of luck there’s still an HR analyst around to help you wade through an employee guide (that you were supposed to have read two weeks ago but didn’t). Read More »
Tags: BPO, desktop virtualization, vdi, VMware, vxi
………..New Cisco Data Center Security Enhancements
The workplace is changing fast. Workers are becoming increasingly mobile. The introduction of employee-owned consumer devices like tablets, is becoming the norm; in fact, the average number of devices used by knowledge workers is between 3 and 4 and rising. While IT organizations acknowledge the productivity, business agility and cost benefits these developments can bring, they are also concerned by the associated challenges. Not surprisingly, numerous industry research papers point to device, application and data security, and regulatory compliance as the biggest challenges for mobility and BYOD projects.
To address these security concerns many IT organizations are applying desktop virtualization or virtual desktop infrastructure (VDI) technologies to ensure management and protection of the applications, data and content centrally in the data center, regardless of which device is used. But how can IT ensure that VDI deployments themselves are secure?
Today, Cisco announced new data center security enhancements that further protect VDI deployments. These new innovations enable more scalable, secure access to hosted virtual desktops and more robust protection of data center resources. These innovations also ensure that business critical applications and virtual desktops hosted within the data center can be better protected from other virtual desktops that have become compromised or infected. (Read also today’s blog from John N. Stewart , Cisco Sr.VP, Chief Security Officer “Does Virtualization Improve Security ? “)
Deploying a data center infrastructure that has the built-in security capabilities to address these challenges needs to be an integral part of any VDI design. The Cisco VXI Smart Solution is a comprehensive, secure desktop virtualization solution that addresses these security concerns in both Citrix XenDesktop and VMWare View deployments; you can find more information on the designs here.
Read More »
Tags: Cisco, data center, desktop virtualization, security, vdi, vxi