Cisco Blogs


Cisco Blog > Mobility

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

Unlocking the Value of Data in Motion Through Analytics

Kiran-Mattyola-mabadejeWritten By Kiran Matty, Marketing Manager, and Ola Mabadeje, Marketing Manager

If “Big Data” is crude oil, then Analytics is its refinery. According to a Cisco IBSG report, “if ‘crude” data can be extracted, refined, and piped to where it can impact decisions, its value will soar”. The trends, patterns, and insights that can be gathered from the various sources of Big Data are virtually limitless. However, this blog shall primarily focus on the analytics that can be generated by refining i.e. analyzing the data that’s resident in a mobile network and is largely untapped.

According to Cisco VNI, the number of connected devices will be three times the global population by 2017 and the global IP traffic will also increase threefold in the same time frame. Mobile Networks have not only been primed to sustain this onslaught but have also transformed into a programmable platform that can collect, correlate, and contextualize data rapidly. Network data, Policy, and Analytics interplay in a multitude of ways and form the basis of Data in Motion that’s at the heart of network monetization.

Hidden opportunities exist in the market gaps

As you might be aware, CPM (Cost per Mille) for mobile Ads is lower than that of other advertising media such as online, television, etc. This is because mobile Ads are generally untargeted, which leads to ineffective Ad campaigns, and could be attributed to a large extent to the lack of contextual awareness vis-à-vis location, demographics, browsing history, network conditions, screen size, etc. Although market researchers have perfected the measurements for other advertising media, they haven’t yet cracked the nut for mobile and the mobile metrics remain fuzzy at best which is impeding the flow of advertising dollars to mobile. On the other hand, as much as we love applications like Apple Siri and FaceTime, Angry Birds, etc., and devices like the Apple iPhone, they have turned out to be an operational nightmare in certain cases for the mobile operators around the world because of the data and signaling Tsunami that they can potentially bring about. This is due in part to lack of network analytics that can predict such surges in the network traffic with reasonable accuracy to allow for timely management of the network in terms of network capacity and bandwidth. This would eventually lead to operational efficiency and hence cost savings. Further, think about Internet of Everything and the 50 billion devices that would come online by 2020!

Mobile network operators are well positioned to address the above pain-points. With access to millions of subscribers, they can predict network and consumer behavior with high degree of accuracy quite simply because of the law of large numbers. Unlike many pure-play analytics vendors, network operators have direct access to data from a variety of sources such as CDN (Content Delivery Network), devices, applications, network billing and charging systems, not to mention the various mobile network elements. Some may even have access to subscriber Wi-Fi data. Lastly, many have the cloud infrastructure that’s needed for analyzing data at a bigger scale.

Translating opportunities to $$$ Read More »

Tags: , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Three Simple Ways to Boost Mobile Device Security

The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.

Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »

Tags: , , , , , , , , , , , ,

Collaboration and Interdependency, Anywhere

Change is afoot on a big scale and fast. We see it around us, we feel it, we talk about it, we experience it. We even know its name — the Internet of Everything (IoE).

Briefly put, IoE is a new way of connecting people, processes, data, and things.  Looking back, you can almost say that the Age of the Internet and of the Internet of Things have merely been preliminary stages designed to lead us where we are today: on a course that radically changes how we interact with the world around us. We have started on a new exciting journey. At every step we are uncovering new ways to create and share value, not just for the organizations we work for but in our personal lives as well.

Let’s take the world of business first.  It’s changing dramatically as we speak.  Here are a few leading transformational trends the effects of which I’m sure you have experienced yourselves  in one way or another.

We Are More Interdependent

Marthin_CL_Slide

More and more expert surveys are finding that employees are working more collaboratively  now than they were in the not very distant past. For instance, according to research from the Corporate Executive Board  (CEB), two thirds of employees are doing more collaborative work today than they were just three years ago.  Collaboration technology is a big part of making us increasingly effective in this environment, delivering benefits including those that help us become: Read More »

Tags: , , , , , , , , , ,