With networks getting faster and the whole world going mobile, the number of connections is growing at an unprecedented rate. By next year, the amount of mobile-connected devices will exceed the number of people on the planet, and by 2020, will reach 50 billion. And those devices are getting smarter all the time.
While there is no doubt that mobility, cloud and big data are each enabling business transformation, imagine what they could do collectively. That’s the power of convergence, and it’s revolutionizing the IT and business landscape.
This convergence brings together applications, systems and processes to help meet current needs while preparing for future innovation. It’s at the heart of the Internet of Everything (IoE) in connecting people, process, data and things in new and innovative ways. And mobility is a driving force fuelling this evolving landscape, breaking down barriers and enabling the birth of entirely new kinds of business and economic models.
Mobility: A Cornerstone in the Converging IT Landscape
Mobile devices are already a pervasive part of our lives. As mobility continues to evolve, these devices will be primarily how a network connects to the user, helping shape and customize the end-user experience to deliver more personalized services and real-time engagement.
Imagine you are an online shopper who doesn’t want to wait overnight for your shipment. You want your product now. From your mobile device, you will not only be able to price-match with other retailers and see if the product is available in a store near you (a current capability), but also connect with real-time data in the cloud over an agile network to see if there are checkout lines in the store, reserve a parking spot, and tell the customer service rep you are on your way.
Gartner predicts that, through this year, mobile apps will drive “the next evolution in user experience” by “leverage[ing] intent, inferred from emotion and actions, to motivate changes in end-user behavior.” This is already happening through smart devices and wearables, for example, as people (myself included) use health and fitness apps to help make better, healthier choices.
Read More »
Tags: Big Data, carlos dominguez, Cisco, cloud, convergence, Fast IT, future of mobility, mobility
As a business or technical leader, you know you need to protect your company in a rapidly evolving mobile ecosystem.
However, threats are not always obvious. As malware and attacks become more sophisticated over time, business decision makers must work with technical decision makers to navigate security threats in a mobile world.
I’m excited to introduce a new blog series, authored by Kathy Trahan, which will explore the topic of enterprise mobility security from a situational level and provide insight into what leaders can do now to mitigate risk.
This first post will discuss the security concerns presented by the rapid-fire growth of BYOD (Bring Your Own Device) and how implementing specific policies can help organizations reap the benefits of true mobility now and in the future.
Senior Security Solutions Marketing Manager
With the increasing amount of tablets, wearables, and other connected “things” in the workplace, it’s no wonder that the BYOD trend is causing a dynamic shift in security policies and protocol.
This heightened focus on security only increases when the security threat evolution shows that attackers seem to stay one step ahead of the security measures in place to stop them. And while the BYOD movement does present special challenges to ensuring data security, it also affords BDMs and TDMs an opportunity to collaborate and come up with security solutions that balance the need to secure company assets while still allowing employees to conduct business on devices that are familiar and comfortable to them.
As enterprises look for ways to improve productivity, efficiency, and flexibility for their workforces, mobility has become a key factor. A Gartner survey predicts that by 2017, half of employers will require their employees to provide their own devices for work purposes. And as use of and reliance on mobility increase, so does the need for security policies that allow employees to function in a work world that extends beyond their cubicle and office walls.
Read More »
Tags: Cisco, device, future of mobility, mobility, navigating security, security, Security Threats
In just two years, indoor location technology has taken off and attracted a lot of buzz across industries, from retailers to healthcare. But it’s no longer a conversation about just Wi-Fi – the introduction of beacon devices, including iBeacon, has added a new dimension to location technology for IT and their line of business counterparts to grapple with on how to leverage it to better reach their customer base.
Some customers have been asking about beacon technology and how it fits in with Wi-Fi, so let’s start from the beginning:
How do beacons work?
Beacons are sensors that send out Bluetooth low energy (BLE) tracking tags. These sensors can be placed around a venue, such as a store, and a mobile device can pick up the BLE signal and determine that it is in close proximity. When a mobile app is built off of this technology, it can be used in interesting ways to interact with the end user, such as notifying a customer of a promotion for an item they are close to.
I’m having trouble differentiating Wi-Fi and beacons. What do I need to know? Read More »
Tags: access, analytics, Apple, beacon, BLE, bluetooth, byod, Cisco, cmx, consumer, customer, deployment, device, dimension, Enterprise, GPS, granular, Guest, healthcare, ibeacon, indoor, Indoor location, IT, lbs, line-of-business, location, location based services, marketing, mobility, mobility services engine, mse, network, operation, productive, productivity, proximity, retail, sales, tag, technology, track, tracking, wi-fi, wifi, wireless, wlan
Over the past 10 years, the consumption of technology has become more accessible than ever. The workspace has shifted from being heavily reliant on the fax machine to now allowing people to be in different parts of the world, yet flawlessly connected to their company’s network.
The result of these technological advancements – such as the growth of mobility, cloud and big data – is the evolution of the Next Generation Workforce, which has immense opportunities for businesses and interested candidates.
For example, considering that 74% of millennials want flexible work schedules, the Next Generation Workforce will seek remote collaboration more than ever before. Companies that will succeed at recruiting and retaining these candidates will be those that practice flexibility through the use of technology, while simultaneously showing employees that the work they are doing is both impactful and valuable.
Tailoring to the interests of these future candidates is an investment that companies must think about now – especially because by 2025, millennials will account for 75% of the global workforce. Employers who take new approaches to management, offering flexible benefits and providing effective employee retirement planning strategies will benefit from a three-generation workforce that is engaged, energized and experienced.
However, as the Next Generation Workforce evolves, there are certain challenges businesses must overcome to successfully excite and attract top talent. Here’s a closer look at those challenges – especially for those in the midmarket industries – and what they can do today to remain competitive and innovative in a rapidly changing landscape. Read More »
Tags: #ciscomidsize, Big Data, Cisco, cisco channels, cloud, collaboration, midmarket, mobility, next gen, next-gen workforce
Northern Kentucky University is among the fastest growing universities in Kentucky. It hosts over 15,000 students with about 13,000 undergraduate and 2,000 graduate students. The goal of the wireless program at NKU is to provide secure, robust and ubiquitous wireless access throughout the campus, both indoors and outdoors. This ensures that students always stay connected and feel at home. The classrooms are equipped with smart technology to ensure that the teachers can benefit from technology when collaborating with students. The IT team has blanketed the libraries, the classrooms, the dorm-rooms as well as the outdoor areas with Wi-Fi. In the previous blog in 2012, we described how the Cisco 7.5 release allows networks to recover with no client re-authentication in the rare event of your primarily wireless LAN controller goes down.
At a Glance:
Located in: the Highland Heights Kentucky
Number of students: 15,000 of which about 2000 stay in residence halls
Number of teachers/staff: 2000
# WLAN clients: Approximately 8500 concurrent clients
Access-Point Model and Units: 1200 units of AP models including AP702W, 3502, 3602, 3702, 1550 and a few older Access Points which are being phased out
Controller Model and Units: 2 Pairs of WiSM2 operating in 188.8.131.52
Switch Models: Various models 2960, 3650, 3850, 3750X and 6500
Prime Infrastructure: 1.4.2
Mobility Services Engine: 7.6
Deployment Details: We talked to Christopher Johnson, the Senior Infrastructure Systems Analyst II at Northern Kentucky University to capture some of his thoughts around their choice of this solution and the associated benefits. Read More »
Tags: 11ac, 802.11, 802.11ac, access point, AP, application, AVC, bandwidth, CCIE, client, control, controller, device, gigabit, graduate, kentucky, LAN, mobile, mobility, nku, prime, professor, re-authentication, smart, staff, student, switch, system, teacher, technology, university, video, visibility, wi-fi, wifi, wireless, WiSM2, wlan