Northern Kentucky University is among the fastest growing universities in Kentucky. It hosts over 15,000 students with about 13,000 undergraduate and 2,000 graduate students. The goal of the wireless program at NKU is to provide secure, robust and ubiquitous wireless access throughout the campus, both indoors and outdoors. This ensures that students always stay connected and feel at home. The classrooms are equipped with smart technology to ensure that the teachers can benefit from technology when collaborating with students. The IT team has blanketed the libraries, the classrooms, the dorm-rooms as well as the outdoor areas with Wi-Fi. In the previous blog in 2012, we described how the Cisco 7.5 release allows networks to recover with no client re-authentication in the rare event of your primarily wireless LAN controller goes down.
At a Glance:
Located in: the Highland Heights Kentucky
Number of students: 15,000 of which about 2000 stay in residence halls
Number of teachers/staff: 2000
# WLAN clients: Approximately 8500 concurrent clients
Access-Point Model and Units: 1200 units of AP models including AP702W, 3502, 3602, 3702, 1550 and a few older Access Points which are being phased out
Controller Model and Units: 2 Pairs of WiSM2 operating in 18.104.22.168
Switch Models: Various models 2960, 3650, 3850, 3750X and 6500
Prime Infrastructure: 1.4.2
Mobility Services Engine: 7.6
Deployment Details: We talked to Christopher Johnson, the Senior Infrastructure Systems Analyst II at Northern Kentucky University to capture some of his thoughts around their choice of this solution and the associated benefits. Read More »
Tags: 11ac, 802.11, 802.11ac, access point, AP, application, AVC, bandwidth, CCIE, client, control, controller, device, gigabit, graduate, kentucky, LAN, mobile, mobility, nku, prime, professor, re-authentication, smart, staff, student, switch, system, teacher, technology, university, video, visibility, wi-fi, wifi, wireless, WiSM2, wlan
Thank you for being a part of our Higher Ed Thursdays conversations. Today concludes this series, and we’re looking forward to re-starting the discussion near the beginning of the school year. New trends are emerging for the next phase of our discussion, including how to secure your campus environment and intellectual property, how the Internet of Everything will change higher education, and the finance of higher education.
In this current series, we’ve seen that educators share a common crisis in the delivery of higher learning. They suffer many of the same challenges, with regard to access to quality educational experiences, the need to evolve outdated teaching methodologies, and the imperative to prepare students to become part of the workforce of the future.
To address these challenges, we recommend that the community share a common approach in helping to transform its systems. It can employ an approach that uses technology to create cultural shifts, modernize teaching and learning to prepare learners for next-generation careers, and effectively scale these modifications. Read More »
Tags: Cisco, edtech, education reform, higher education, HigherEdThursdays, mlearning, mobility, technology
Johns Hopkins Medicine is one of the leading health-care providers in the US. The Johns Hopkins University School of Medicine is consistently ranked as one of the top Medical Schools in the US and the Johns Hopkins Hospital is consistently ranked #1 in the US for 21 years in a row! In a previous blog in 2012, we described how the Cisco Wireless LAN controller 7.5 release enables wireless networks to recover with no client re-authentication in the event of a primarily controller failure. In this blog, I will share more details about unified access deployment at the Johns Hopkins Hospital with particular focus on the High Availability design.
Patients are the focus at Johns Hopkins Hospital. Johns Hopkins uses state-of-the-art technology in their hospitals to ensure that patients get the latest advances from surgical tools, radiologic imaging suites with the best diagnostic capabilities to something as humane as sound-absorbing private rooms for each patient. Read More »
Tags: access, aireOS, blade, Cisco, client, controller, deployment, design, device, diagnostic, equipment, health care, healthcare, High Availability, hospital, IOS, johns hopkins, LAN, mdf, medical, Mission Critical, mobility, NCV, network, patient, re-authentication, release, text, unified, Voice, voip, vss, wi-fi, wifi, wireless, WiSM2, wlan
“It’s not secure enough… so we are not going to allow it to happen.”
Does this phrase seem all too familiar?
Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunting road to travel on the path towards true enterprise mobility security. This is especially true as the combination of sophisticated threats and new mobile capabilities and applications are continuing to shape the role and evolution of security controls and policies.
As the mobile endpoint becomes the new perimeter, how can organizations evolve their mobility security policies to mitigate risk? Is protecting information at the data or device level the way to keep employees and assets secure when users conduct business on untrusted networks?
Recently, I had a chance to participate in a new Future of Mobility podcast with Dimension Data’s Stefaan Hinderyckx, to discuss the biggest challenges our customers are seeing as they deploy enterprise mobility security solutions.
Many CSOs that Stefaan speaks with are seeing the clear and present danger of opening their networks, devices and applications to a new mobile world. Yet, many are not shying away from the benefits that enterprise mobility offers. They say:
“Mobility is inevitable. It’s happening and we need to embrace it and deliver it for the business.”
With this in mind, how can IT and business leaders address key challenges and embrace a holistic approach to secure enterprise mobility?
Complexity: There Are No Boundaries Anymore
One of the biggest challenges our customers are seeing is the increase in complexity as they work to meet business needs through mobility, all while keeping users and assets secure.
Simply put, there are no boundaries anymore. There is no place you can put a firewall to make things secure on the inside and insecure on the outside.
A major reason for this complexity is the result of approaching security in a siloed manner. It can be complex to try to secure the device, data on the device, the user and the network in a disparate way!
IT and business leaders need to work together to make the whole environment secure. It is no longer enough to find point solutions to data-centric or device-centric controls, the only way to be confident in your approach is to build a holistic strategy.
Read More »
Tags: access control, Data Classification, Holistic Strategy, mobility, policies, security, Security Control
Innovations in mobility have made it possible for us all to connect from pretty much anywhere in the world, turning wherever we are in to our office. And mobile connections show no signs of slowing. By the end of 2014, the number of mobile-connected devices will exceed the number of people on Earth!
As with any technology, mobility is constantly changing, having to meet the demands of an increasingly mobile workforce that desires to conduct “business as usual” from anywhere. And while companies have realized the importance of investing in mobility solutions, critical questions remain that must be answered for them to determine what needs to happen next to remain competitive and maximize their mobility efforts:
- How has mobility changed your business?
- What do you need to impact your future business initiatives?
- How is mobility influencing behavior among workers and customers?
- What’s got you excited for the future of mobility in your organization?
Join me on Twitter this Friday, June 27 at 10 a. m. PST/1 p.m. EST for an exciting and insightful hour about the #FutureOfMobility in the #InnovateThink Tweet Chat. Join me @RachaelMcB and @CiscoIoE alongside @ron_miller to learn more about how mobility has transformed the business landscape and why companies must continue to keep pace with the possibilities it creates. Simply use the hashtags #InnovateThink and #FutureOfMobility on Twitter to join the conversation.
Tags: future of mobility, FutureOf, futureofmobility, innovate, innovatethink, Internet of Everything, IoE, mobility, Rachael McBrearty, Tweet Chat, tweetchat