It’s that time of year again in the US – Tax Time! That time of year where we review the previous year’s bounty, calculate what’s due, and re-evaluate our strategies to see if we can keep more of what we worked for. Things change; rules, the economy, time to retirement, and before you know it you find yourself working through alternatives and making some new decisions.
Anyway, as I was working through the schedules and rule sheets, my mind wandered and I started to think about Wi-Fi and the taxes associated with it. In my day job, I often play the role of forensic accountant. Like a tax accountant, I’m always looking for a way to get more or understand why there isn’t more already. So along those lines, lets talk about a little known tax that you may well be paying needlessly. I’m talking of course about the dreaded 802.11b Penalty.
Wi-Fi protocols like 802.11b are referenced by standards committees for the workgroup that develops them. In the 2.4 GHz spectrum, there is 802.11b, 802.11g, and 802.11n. Back in 1997, 802.11b was the first modern Wi-Fi protocol ratified by the IEEE and it allowed transmissions of 11 Mbps, a major jump forward from the previous 2 Mbps that was possible with the original 802.11 standard.
After 802.11b came 802.11a, and then 802.11g. Both of these protocols where a radical departure from the simplistic 802.11b structure and employed Orthogonal frequency-division multiplexing (OFDM) modulation (now standard in every 802.11 protocol created since then). OFDM allowed for Read More »
Tags: 802.11, access point, airtime, AP, battery, behavior, channel, client, data, data rate, device, efficiency, efficient, GHz, IEEE, mbps, mobile, mobility, native protocol, network, Packet, portable, protection mechanism, protocol, specification, spectrum, SSID, standard, tax, traffic, utilization, WFA, wi-fi, wifi, wireless
Digital Marketing Executives, trade press and specialist companies gathered in New York this week for the latest ClickZ Live NYCevent.
Location, location, location…!!!
A very clear trend visible here is how location had become a key part of the digital marketing language.
It was part of the Keynote addresses.
- Facebook’s former Director of Marketing is advocating it.
- Google are presenting on it and delivering workshops on it.
- Various booths talk about its importance.
- Numerous speakers mention it in their presentation.
- And Cisco are evangelizing how indoor location using WiFi and CMX can really enhance location capabilities and hugely driven additional revenue streams and enable new business models. Read More »
Tags: analytics, attribution, best practice, click attribution, clickz, Conference, consume, content, context, conversation, crm, customer, digital, engagement, Industry, jakarta, location, marketing, mobile, mobility, model, multi-channel, network, omni-channel, purchasing, relationship, ROI, sales, services, technology, trend, wi-fi, wifi, wireless
We are proud to announce that the Cisco IT internal implementation of Cisco Prime Service Catalog, dubbed the Cisco IT “eStore”, was honored (and ranked #25) in the InformationWeek Elite 100 awards this week – as one of the most innovative uses of business technology in 2014. You can read more about the awards here.
(If you haven’t heard about Cisco IT’s eStore, be sure to check out my recent write-up about eStore. You can also read the case study here, and read more from Adel du Toit who blogged about Cisco IT’s initiative here last June.)
The Cisco IT eStore was also nominated as a finalist for a Consumerization of IT in the Enterprise (CITE) award. Stay tuned as the award winners will be announced at the CITE conference at the end of this month.
We are thrilled to see Cisco IT being recognized for it’s internal Cisco Prime Service Catalog deployment. It’s a great testament to the innovative partnership between our product engineering teams and our internal IT organization.
That’s not all … This week at Interop Las Vegas, adjacent to the InformationWeek Elite 100 awards ceremony, was the announcement of the new Cisco Mobile Workplace Solution – where Cisco Prime Service Catalog serves as the unified IT storefront for mobility services (you can read a great overview of the new solution from Jonathan’s blog post here). We showcased a live demo of the award-winning Cisco IT internal implementation of the Cisco Prime Service Catalog: the Cisco IT eStore.
As enterprise IT organizations adopt and implement their mobility strategies, they are learning just how much their end users expect and need in today’s increasingly mobile environment. For example, they need a simple, easy-to-use, and automated solution for ordering all of the mobility and other workplace services an IT organization may offer – rather than having separate portals for requesting smartphones, tablets, mobile apps, desktop software, laptops, or BYOD services. A unified service catalog and single access point for all IT services increases workforce productivity, with a better employee experience and improved satisfaction with IT.
As Jonathan describes in the blog post linked above, organizations typically begin from a device-focused approach. IT often focuses on corporate-liable devices or employee owned devices, providing an easy way to onboard these devices and access basic services. Then, organizations progress to the application-focused phase, where the enterprise leverages mobile applications to provide productivity and empower employees.
The third and final step in the enterprise mobility journey is experience-focused. After having fulfilled the initial device-focused and app-focused stages, organizations are becoming experience-focused and prioritizing service automation to improve the employee experience and provide an easy-to-use, automated self-service experience.
Read More »
Tags: awards, Cisco IT, CITE, data center, Enterprise, eStore, information week, interop, it-as-a-service, mobile, mobility, service automation, Service Catalog, TechWiseTV, workspace
Closing the big deal. Calming an irate customer. Clarifying instructions given in an email. Voice has long been the killer app for business. As the world goes mobile, smartphones are becoming a key way for business people to stay connected, not just when they are out of the office, but an important means of voice communication in the office. Like consumers, many business users are cutting the cord and using their mobile device, instead of their desk phone, to make and receive voice calls. A recent Cisco study of mobile users reveals that 50 percent of knowledge workers use their mobile phone at least one-quarter of the time to make calls in the office, instead of reaching for a desk phone. And, 35 percent of knowledge workers equally choose between a mobile and desk device when placing a call. We expect this mobile displacement of the traditional desk phone to grow as employees increasingly bring their own mobile devices to work and use them for conducting business.
Mobile cellular networks were built to cover large outdoor and semi-outdoor areas. They were never built to penetrate the steel, glass and concrete of modern buildings. While there may be some coverage near the windows, the signal strength rapidly degrades as you head towards the center of the building. This is only going to get worse as new building materials, such as blast resistant glass, make it even harder for signals from the macrocell network to adequately cover the place of work. Our research found that one-third of all business users receive only 1 to 3 bars of signal strength at their place of work. And, 10 percent of business people obtain very poor quality mobile service (1 to 2 bars).
The shift to mobile in the workplace should be Read More »
Tags: Cisco, devices, Enterprise, mobile, mobile offload, research, Service Provider, small cells, wi-fi
Editor’s Note: This post is a response to EN Mobility Workspace. Please see that post for full context.
A colleague of mine here at Cisco, Jonathan, recently spoke well to the Evolution of Cisco Mobility Workspace Journey. Like all technologies, there is an adoption and engagement cycle based on maturity and risk level. We begin at the device-focused phase with a simple “get me on the network.” Following is the application-focused phase, “now that I am on what can I do with my ability to move around without a wire and work anytime and anywhere.” And the final is the overall experience, which is tailored to the user based on who they are, where they are, what they need or can do. And one can argue the next mobility phase for organizations is IoT (Internet of Things) as more single purpose devices (not necessarily with a user behind it) move to the wireless network.
What is critical to point out is the consistent requirement (not a nice to have) for security as the mobile user experience expands. Why is this so important? According to IDC over 47 percent of organizations see security enhancements required with their mobility initiative. The questions to consider are:
- What are the secure mobility issues today and potentially tomorrow?
- What are the implications?
- What is likelihood of these threats?
The top secure mobility concerns noted by numerous surveys indicate the following:
- Data protection
- Application access
- Lost and stolen device
- Rogue devices
Read More »
Tags: application access, cyber security, data protection, interop, lost device, mobile, MobileIron, Ponemon, rogue device, security, stolen device