Cisco Blogs


Cisco Blog > Mobility

HDX Blog Series #4: Optimized Roaming

Editor’s Note: This is the last of a four-part deep dive series into High Density Experience (HDX), Cisco’s latest solution suite designed for high density environments and next-generation wireless technologies. For more on Cisco HDX, visit www.cisco.com/go/80211ac.  Read part 1 here. Read part 2 here. Read part 3 here.

If you’ve been a long time user of Wi-Fi, at some point you have either observed someone encounter (or have personally suffered from) so called “sticky client syndrome”. In this circumstance, a client device tenaciously, doggedly, persistently, and stubbornly stays connected to an AP that it connected to earlier even though the client has physically moved closer to another AP.

Surprisingly, the reason for this is not entirely…errr…ummm…unreasonable. After all, if you are at home, you don’t want to be accidentally connecting to your neighbor’s AP just because the Wi-Fi device you’re using happens to be closer to your neighbor’s AP than to your own.

However, this behavior is completely unacceptable in an enterprise or public Wi-Fi environment where multiple APs are used in support of a wireless LAN and where portability, nomadicity, or mobility is the norm. In this case, the client should typically be regularly attempting to seek the best possible Wi-Fi connection.

Some may argue that regularly scanning for a better Wi-Fi connection unnecessarily consumes battery life for the client device and will interrupt ongoing connectivity. Therefore the “cure is worse than the disease”. But this is true only if the client is very aggressively scanning and actually creates the complete opposite of being “sticky”.

The fundamental issue with “stickiness” is that many client devices simply wait too long to initiate scanning and therefore seeking a better connection. These devices simply insist on maintaining an existing Wi-Fi connection even though that connection may be virtually unusable for anything but the most basic functionality. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: A Balanced Approach to Mobile Security

For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:

  1. Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
  2. Strict mobility policies will drive employees to want to isolate personal data from business data.
  3. Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.

Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.

Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.

Tags: , , , , , , ,

A Balanced Approach to Mobile Security

Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution.

In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT leaders taking a balanced and strategic approach to security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner Prediction #1: Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”

While the actual failure rate may be less than one-fifth, mobility efforts will fail if companies are too restrictive with MDM policies. Instead, a two-fold approach to supporting a BYOD environment from a security perspective is essential.

First, IT leaders should take a balanced approach to security that protects business-imperative network solutions and data. In most cases, blocking Angry Birds and Candy Crush is unnecessary and not scalable. With Apple and Google supporting over a million apps each (and counting), it can cost precious time and IT resources just trying to keep up with restricting non-threatening applications.

Secondly, IT leaders should be focused on encouraging users to use secure solutions. This will only grow more important as the explosion of new connections and various devices evident in today’s Internet of Everything world creates more opportunity for malicious actors to utilize even more inroads to compromise users, networks, and data. By educating employees to take an active role in the security of their device, users can be empowered to report suspicious threats and have an open dialogue with IT teams. Read More »

Tags: , , , , , , , , , , , ,

Cisco CMX @ NRF 2014

NRF1

NRF 2014 was held last week at the Javits Centre in New York City. It’s the biggest retail event of the year where vendors show off the future of the industry to all the delegates both using inspiring key notes and exciting demos on the Expo floors.

2014 and beyond:

It wasn’t too hard to identify that there were some common themes. On Tuesday afternoon I stood on the main Expo floor and just looking around I could quickly see the industry’s top of mind phrases and buzz words popping out:

“Omni channel”,”Onmianalytics”, “Predictive”, “Insights”, “Customer science and Analytics”, “Precise Location Matters”, “Analyze Decide”, “Mobilize”, “Mobility solutions”, “Big data”, “Customer engagement”, “Adaptive offers”, “Personalized customer experience”, “Customer Experience Analytics”

We certainly are entering the era where using data, analytics and personalization is no longer just an interesting notion or “nice to have” for retail -- it is now the KEY thing companies MUST do.

And a big common theme is that mobile is exploding and changing things rapidly, so retailers either need to keep up or inevitably fall behind their competitors. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: Next Gen IT Predictions: 2014 and Beyond

2014 will be a year that builds on the momentum of mobile, cloud, the Internet of Things (IoT) and the Internet of Everything (IoE). How can your organization realize value from today’s new model for IT?

Here’s my take on the trends we will see over the next twelve months:

  1. Increasing urgency to manage our zettabyte-driven world.
  2. The need for hybrid cloud adoption.
  3. A revolution in software and new IoE platforms.
  4. The rise in thinking about security holistically.
  5. The Internet of Me finally arrives: real personalized, mobile, cloud-based experiences.
  6. The Internet of Everything is happening now.

If you think technology has infiltrated your life, just wait. You can feel the potential for monumental change as we begin to interconnect the physical and virtual worlds.

Read the full blog: Next Gen IT Predictions: 2014 and Beyond to learn more about each trend and discover how your organization can realize the benefits of the Internet of Everything.

Next Gen IT Predictions : 2014 and Beyond from Cisco Business Insights

 

Tags: , , , , , , , , , , , ,