At Cisco, we’re committed to evolving and enhancing the collaboration user experience – connecting you to the experts you need, regardless of location. But user experience goes beyond that. It’s also thinking about ways to delight you – with a simpler AND superior user experience. Whether that’s with high-definition voice and video on “every pane of glass”, to sharing content in meetings using your device of choice, to bringing the worlds of personal mobile devices and corporate IT owned and managed closer together.
Given the proliferation of mobile devices that have entered the workplace, you probably don’t find my comments around a focus on user experiences for the mobile worker too surprising. However, what I think might be surprising to you is that we’re placing an equivalent level of commitment to drive innovation on user experiences for the worker at the desk.
Why would we do this? I’ll tell you. Consider primary research we commissioned this past summer of 2300 global enterprise and mid-sized company end users and decision makers. The study indicated 70% of users work primarily from a desk 4-5 days per week. Read More »
Tags: Cisco, collaboration, desk worker, dx650, Electronic Hook-switch Control, IP Phone 7800 Series, mobile, user experience, video, workplace
The collaboration market is on a transformational journey. Workloads and use cases such as web conferencing, telephony, video, and file sharing that started as separate islands at first, are now rapidly converging. With those islands come complexity of integration and interoperability, which means experiences can suffer.
Two key things Cisco is focused on is making collaboration simple to use, deploy, and buy; and pervasive by reducing cost and extending the value of existing investments. This week we announced Collaboration Systems Release 10 (CSR 10), the first time Cisco is converging voice, video, and content sharing across our portfolio to provide the best possible user experience whether you choose an on-premise, cloud, or fused model.
I’m excited about the fantastic new experiences we are enabling. Here are a few scenarios to help highlight what is now possible:
First Day on the Job
My first day at Cisco, I was told “everything is on the web,” Read More »
Tags: Cisco, collaboration, collaboration summit, CSR 10, CUCM, Jabber Guest, mobile, video
Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a work-life balance when my personal device is also my work device? Will my company support any device I choose?
Some of these questions might seem familiar as more business employees consider adding their own device to their company’s network. These questions also represent an important part of a comprehensive mobile strategy: User buy-in.
Recently, I read an interesting CIO article by Adam Bender that highlighted the importance of getting employees on board when implementing a BYOD policy. The article discusses that according to Frost & Sullivan analyst, Audrey William, many employees are worried that they won’t be able to control data on their device once they begin using it for work. In addition, William states that employees are also concerned about the lines blurring between work and play when both personas are merged onto one single device.
Although the concept of BYOD is not new, these concerns have important consequences in our networked world. So, what’s the answer?
An honest, safe, and secure MDM solution and effective policy communication. Read More »
Tags: bring your own device, byod, Cisco, enterprise mobility, ISE, mobile, mobile device, mobility, network, security, unified access, wi-fi, wifi, wireless, wireless network
There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?
Just recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.
Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.
Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »
Tags: bring your own device, business transformation, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
Now when I’m talking about safekeeping a mobile device, I’m not saying don’t use your Kindle by the pool or let your toddler play on the iPad while eating ice cream. These are dangerous things to be doing with a gadget, but today I want to focus more on the data within that device, rather than the device itself.
No matter what you do, your device may be stolen. It only takes a moment of inattention for someone to swipe your phone or tablet. Before that unfortunate event occurs, there are several things that you can do to mitigate the damage that occurs from the loss of a mobile device.
Read More »
Tags: data retention, encryption, mobile, ncsam-2013, passwords, phone, security, Storage, tablet