Cisco Blogs


Cisco Blog > Collaboration

The Future of Any-to-Any Collaboration Depends on Satisfying Today’s Mobile User Demands

When we think of the term “collaboration” we can often get trapped in the cycle of thinking that it only applies to IT departments and the bottom line. However, it’s important to consider how the role of the enterprise is shifting thanks to the consumerization of IT. For example, how can IT leaders satisfy new user demands while unleashing the power of a sound mobile strategy?

With today’s technology-driven global economy, enterprise mobility and collaboration tools need to be about connecting communities, not just companies. Never has there been a time when more business processes extend beyond headquarters. Organizations need to enable all types of connections: From the mobile worker to the teleworker, from other businesses to target consumers, from traditional branch offices to the cloud. This any-to-any type of collaboration is no longer keeping the enterprise at the center. Instead, the future is driven by all types of users.

It’s clear that users expect to collaborate anywhere, on any device, with any workload. They want to collaborate like they’re in the office regardless of their location. IT leaders must keep user demands top-of-mind when working to deploy a BYOD policy. This can create challenges and opportunities in five key areas:

Brett Belding - Collaboration

Join the conversation on Twitter, #CiscoYourWay

Read More »

Tags: , , , , , , ,

Create Mobile Web Campaigns with CMX Browser Engage

In the last MSE blog, Reddy Babu talked about the new Location Aware Guest Captive Portal powered by the Mobility Services Engine (MSE). The MSE was first introduced to provide location based information as a core service to the network, but has since built out a suite of location-based services that take the location-based data from the wireless network to the next level. These services are collectively known as the Cisco Connected Mobile Experiences (CMX) solution. As you read in Dr. Brendan O’Brien’s blog last week, we have been introducing more and more features to the CMX solution.

Today I will expand on one of these new features offered by the Connected Mobile Experiences solution: Browser Engage -- which is our new network based location and context aware orchestration platform.

Browser Engage allows organizations to customize the web browsing experience for mobile users in their venue by offering various context-aware value added services. These services, such as indoor navigation and search, are available to the mobile user throughout their mobile web browsing experience. Browser Engage also helps organizations setup their content and serve them to the users based on device location. For example, an organization can deliver coupons or deals to mobile users based on their location within the venue—making the offerings much more relevant to the mobile end user.  Imagine yourself in a mall and a deal shows up on your phone right around lunchtime that is valid at a food court right around the corner.

So, how does it work? Read More »

Tags: , , , , , , , , , , , , , , , , ,

How does Cisco Access Switching help address BYOD, Mobility and Security Needs?

November 11, 2013 at 5:45 am PST

Cisco will host a live webcast on Wedn November 13, 2013 to discuss BYOD, mobility, security and how Cisco access switching address these customer needs. If you are reading this blog, there is a good chance that your work is somehow related to these critical areas. To test how widely BYOD, mobility and security impact IT professionals, I’ve used an unscientific way to check it out on several popular online IT web sites. I want to see if they consider at least one of these areas to be their main focus.  Here’s what I’ve found – many of them (although not every single one) are devoted to at least one area. Read More »

Tags: , , , , , , , , ,

Cybersecurity: Where are the Biggest Threats?

Cyber Crime: Identifying the Sources of an Everyday Threat

Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can. Read More »

Tags: , , , , , , , ,

A Powerful Network Simplifies Adoption of New Mobile Devices

It’s a critical time for enterprise IT as new mobile devices from Apple, Samsung and Google enter the market and operating systems are updated almost weekly. Apart from the new color and form factor options, this round of new technology features new operating systems and a proliferation of app updates, which IT leaders must be prepared to meet head on.

It’s an exciting time for mobile technology, but it’s also an important time for enterprises to look at not only meet the demands of today’s mobile-enabled workforce, but tomorrow’s as well. Basic mobility functionality is not and will not be enough, and a solid framework must be put in place to support the growth.

In this inaugural post of a four-part Network Matters blog series, I’ll be discussing how IT leaders can rely on a network, built for all kinds of devices, to simplify the process of onboarding new mobile technology and free up precious IT resources. I would like to provide you with a deeper look at how having the right network in place can help ease the challenges of tomorrow that will be presented to IT departments due to device evolution and enable a culture of self-service for employee-owned devices.

Read More »

Tags: , , , , , , , , , ,