It’s always interesting and often entertaining to observe how competitors promote their products and what they choose to focus on—and more importantly, what they choose not to focus on and what they hope people won’t ask questions about.
Consider yet again how a competitor chooses to position their “purpose built” AP vs. the Cisco Aironet 3700 802.11ac Access Point Series.
This competitor frequently (and somewhat obsessively) points out that its 802.11ac AP has dual “active” 800 MHz cores while the Cisco AP3700 has only one “active” 800 MHz core. This is not completely true since it completely overlooks the fact that the Cisco AP3700 also has a dedicated CPU core and DSP for each radio subsystem.
Furthermore, it also overlooks that the dual “active” cores in the competitor’s AP share 512 MB of DRAM. The single “active” core of the AP3700 has dedicated 512 MB of DRAM. Also each radio subsystem has a dedicated 128 MB DRAM (for 768 MB total DRAM in the AP3700).
Why is all of this important? Read More »
Tags: 11ac, 802.11ac, access point, AP, architecture, ASIC, client, compute, Computing, design, device, DRAM, efficiency, hardware, HD, HDX, high density, Industry, infrastructure, LAN, MB, memory, memory management, Mhz, mobile, mobility, network, networking, performance, rf, system, wi-fi, wifi, wireless, wlan
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem. However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
This blog series, authored by Kathy Trahan, will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk. To read the first post focused on securing device freedom, click here. The second post, available here, focused on the risks that come with mobile connections. – Bret Hartman, Chief Technology Officer (CTO) for Cisco’s Security Technology Group
The Cisco Visual Networking Index revealed an obvious truth that none of us can deny—mobile data traffic is on the rise and shows no signs of stopping:
- By 2018, over half of all devices connected to the mobile network will be “smart” devices
- Tablets will exceed 15 percent of global mobile data traffic by 2016
- By the end of this year, the number of mobile-connected devices will exceed the number of people on earth, and by 2018, there will be nearly 1.4 mobile devices per capita
With the explosion in the number of smart mobile devices and employees increasingly taking advantage of BYOD, securing company and personal data in a world where the mobile endpoint is a new perimeter presents technical and legal challenges for organizational leaders.
What are some of the most prevailing challenges? The personal use of company-owned devices happens more frequently than IT may realize and a complex legal environment can leave both employees and IT confused on how personal privacy is being protected. It is important for human resources to weigh in here as well.
Read More »
Tags: byod, Cisco, data security, future of mobility, malware, mobility, security, vni
Gartner has released their 2014 Magic Quadrant for Wired and Wireless LAN Infrastructure. For the 3rd year in a row, Cisco is recognized as a leader in both vision and execution. We believe this Gartner recognition is validation of Cisco strategy and investments for unified access, policy management and cloud managed solutions.
Cisco’s position in the Wired and Wireless Gartner MQs has been consistent over the past 3 years as the market landscape has shifted we believe validating our commitment to meeting shifting customer priorities and requirements.
The 2014 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (Authors: Tim Zimmerman, Andrew Lerner, Bill Menezes; Published 26th June 2014) reflects the evolution from prior years and highlights what customers are looking for:
“With limited growth in IT resources, administrators require one network management application, one access security solution, one guest access application or one policy enforcement solution with the flexibility to be deployed in a public cloud, private cloud or on-premises. This integration reduces the costs associated with the upfront capital expense of multiple network service applications each dedicated to either the wired infrastructure or the wireless or cloud components. This savings is also extended to the ongoing software maintenance costs of all access layer management, security and policy enforcement components.”
What Does Being a Leader Mean? Read on for the full story Read More »
Tags: #80211ac, #wireless, 802.11ac, access, access point, analyst, App, application, aruba, Cisco, customer, data, enforcement, Gartner, HP, Industry, infrastructure, IT, LAN, landscape, leader, Magic Quadrant, market, mobile, mobility, MQ, network, policy, quadrant, secure, security, service, technology, unified access, wifi, wired, wireless, wlan
It’s estimated that the number of mobile-connected devices will exceed the world’s population by the end of this year. That is a tremendous amount of connections and as more devices enter the market, the way people, processes, data, and things – the Internet of Everything – connect will change everything about how we do business and live our lives.
Mobility is the power-player when it comes to the future of the Internet of Everything, revolutionizing everything from our shopping habits to healthcare innovations. In this blog, Mala Anand, Senior Vice President, Cisco Services Platforms Group, outlines the importance of mobility as an Internet of Things driver and how these “things” are essential to the success of the Internet of Everything.
Be sure to read the first blog in this series by Rachael McBrearty, Chief Creative of the Cisco Internet Business Solutions Group, about the Nexus of the Internet of Everything.
The Internet of Things (IoT) is on course to exponentially grow in the coming years, with more than 30 billion devices installed by 2020. And this count doesn’t include the “standard” items such as PCs, tablets, and smartphones!
We have already seen how IoT innovations can connect homes, linking light bulbs, locks, thermostats, and more. We have even seen networks make their way under water to the ocean floor. And during this year’s Cisco Live, mobile phone notifications, sensors on streetlights and recycling bins and other smart technology gave attendees insight into the fluidity of a connected city, as these “things” spoke to each another. These innovations are fascinating, but the question still remains -- what’s next?
Read More »
Tags: cloud, mobility
Multiple changes are on the horizon for public sector information technology managers. Over the next two years, IT organizations could be heavily impacted by these transformations, via a very distinct series of events. Government and education CIOs, program managers, and business process planners will need to keep an eye on these looming changes as they embark on long-range IT plans.
IDC Government Insights recently worked with Cisco to develop a detailed InfoBrief – as a way of highlighting these crucial issues. It’s titled Public Sector Reacts Positively to the Changes in IT Consumption.
Read More »
Tags: cloud, education, government, internet of things, IoT, IT Consumption, ITConsumption, mobility