Hear how financial innovator Diebold gains visibility and control of the 87,000 devices on their network. David Kennedy, former Chief Security Officer at Diebold recognizes there is no stopping new mobile devices and sets course to secure the organization while ensuring the business may continue to generate revenue. Workers want to work their way securely and prefer that the security is transparent so that they have the optimal experience. He speaks to the unique granularity that the Cisco Identity Services Engine (ISE) offers to segment access by user, device, access method, posture, and time. So that engineers may have access to their codebase while marketing professionals like me have no access from my new iPad:
Forty-three years ago my parents sat on their couches in front of a black and white snowy television. They watched intently as Neil Armstrong planted the American flag on the surface of the moon. Fifteen years later, they bore witness to the invention of the first Macintosh personal computer. Five years after that, they stood by as the Internet was made available to the public. Last night, I watched as my mom used her iPhone to connect to an Apple TV unit via Wi-Fi. In doing this, she was able to flip through online Netflix movies on our Television. In the past 50 years, technology has evolved exponentially; the world and its inhabitants have evolved with it.
I am a student at the University of Oregon and a Cisco intern. Currently, I support Cisco’s Education Marketing Team. This blog portrays my thoughts on the technological transformation to a BYOD teaching model made by the Katy Independent School District. I will also discuss my perspective on why technology in teaching and learning is a natural and important step in the “re-invention” of the traditional education model.
There is a new generation of college students out there, I would know as I recently was one of them. Information being at your fingertips is no longer a luxury, it is a necessity. Professors’ expectations of their students have increased dramatically due to the wealth of information on mobile devices. Every class I attended leveraged some form of wireless access to the web. Instant message in response to real-time questions and online submissions are just two of many examples of how network access has been integrated into the education system. Professors would consistently use online tools such as online drop boxes for projects and web conferencing tools. According to MarketWire 92% of college students feel a laptop is a necessity, this indicates that the requirement of mobile access at a university is a given and the college experience is defined by the ease of that access.
Professors are on tight schedules and are generally available only at certain times of the day. Imagine- wanting to contact a professor during open hours only to fall short because your laptop had difficulty getting any kind of connection. I remember the frustrations of wanting to revisit PowerPoint presentations on a class website in the library, only to realize that I was sitting by the one window notorious for being a wireless dead zone. Dorms were infamous for spotty coverage. Having the dorm room located closest to the access point for best access was purely by luck of the draw. I was not so lucky. In my dorm, you would not get any wireless access unless you were sitting right next to the hallway. That’s why I am especially envious of the students of Colorado University, whose alma mater upgraded to enterprise-class coverage.
Demand for Internet services continues to build. The increasing popularity of smartphones, tablets, and video services is creating a “data tsunami” that threatens to overwhelm service providers’ networks.
So far, service providers have mainly reacted to the data flood with technical counter-measures—for example, by deploying Wi-Fi and small cells to offload data in heavy traffic areas such as sports stadiums and downtown urban areas. The Cisco Internet Business Solutions Group (IBSG) believes that operators should also act on the demand side, which can be best influenced by pricing.
Back in the early 2000s, network operators were clamoring to build their Internet customer base; they replaced their old metered models for dial-up Internet, and enticed new subscribers with unlimited, flat rate, “all-you-can-eat” broadband data plans. This pricing strategy has enabled mass-market penetration—first in fixed, then in mobile. But it has not increased ARPU.
While flat rate pricing plans have contributed to the waves of Internet data swamping the capacity of broadband operators, these plans have done little to create value from all that traffic. In fact, the decoupling of connectivity and service layers can destroy value if you compete on easily comparable flat rate access prices only. Flat rates shift the focus from quality and service differentiation to price competition, and expose operators to the risk of cost-plus-based pricing, with diminishing returns.
In some countries, fixed-broadband providers have started altering flat rates by introducing some forms of usage-based pricing: “throttling” data download speeds for the heaviest users, switching them to potentially more costly metered data plans, or introducing new tiered price plans. Just in the last few months in the United States, both Time Warner Cable and Comcast made announcements about their plans to experiment with usage-based pricing.
While usage-based pricing models are required to fight “bandwidth hogs,” they must be carefully introduced and managed. Customers have learned to love flat rates. The 2011 Cisco IBSG Connected Life Market Watch study found that Read More »
Despite phenomenal growth in mobile devices and application – and seemingly insatiable consumer demand – many key players in the mobile industry are struggling. This paradox – huge growth and customer demand, yet significant business and market challenges – is making it difficult for many companies in the mobile value chain to understand the key drivers that shaping the industry and the coming challenges and opportunities. And, most important, they are searching for strategies that will lead to success.