Cisco Blogs


Cisco Blog > Education

ISTE 2013: The Idea Incubator

We attended ISTE 2013 this year and came away filled with ideas and excited about a bright future of technology in education. One of the most inspirational takeaways was from the keynote speech by Steven Johnson, “Where Good Ideas Come From”.

Kevin talked about the evolution of ideas. Contrary to popular belief, the best ideas aren’t a light bulb going off, they take time to mature and develop. He defined this as the “slow hunch”, the source of true creativity. Furthermore, ideas are usually not single and solitary, but are built on a network of other ideas. Within this incubator of ideas, connections and collaboration become more and more important, both for development and implementation.

Read More »

Tags: , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] Why deploy Pervasive Wireless for K-12. Who’s doing it and how.

July 10, 2013 at 11:07 am PST

With so many schools looking to integrate various technologies for things like blended & distance learning, increased staff and student collaboration, and mobility options, many are asking “are we sure we have the necessary infrastructure?”. And if they answer yes, will it support the newest technologies, and will it work all the time, every time?

We all know technology-enabled classrooms are becoming necessary for students and teachers living in a network-connected, mobile world.  Luckily, schools can actually reduce operating costs at the same time they are enabling these technologies by providing a wireless network infrastructure. Read More »

Tags: , , , , , , , , , , , ,

Social Media’s Impact on On- and Offline Events

How do you turn social media on its head and make it unique for your initiatives? I’m always fascinated to see new approaches to using social media and get inspired by different organizations’ creativity. From specific initiatives to drive more traffic and awareness (like American Express’ Passion Project) to getting executives involved (like HubSpot’s CEO Manager Twitter for a Day) to countless other examples in sports, entertainment, B2B, and B2C, creativity is a key factor in the success of our efforts.

Let's Chat! #Ciscosmt Series

Let’s Chat! #Ciscosmt Series

Social media is especially intriguing when it comes to the way it can be used for on- and offline events. (E.g., webcasts, virtual environments, onsite conferences and meetings, Twitter chats, etc.) Based on the nature of these types of activities, social media is a strong communication channel to pilot new ideas, convert more traditional approaches to 2-way engagements, and create real-time impact.

Specifically social media can be used to:

  • Drive registration traffic
  • Create a much more engaging environment
  • Tie on- and offline participants together
  • Generate more information sharing, innovations, and crowdsourcing
  • Provide more direct access to speakers, executives, peers, and others
  • Offer ongoing engagement opportunities long after an “event” has taken place
  • Troubleshoot and resolve issues quickly

Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , ,