Cisco will host a live webcast on Wedn November 13, 2013 to discuss BYOD, mobility, security and how Cisco access switching address these customer needs. If you are reading this blog, there is a good chance that your work is somehow related to these critical areas. To test how widely BYOD, mobility and security impact IT professionals, I’ve used an unscientific way to check it out on several popular online IT web sites. I want to see if they consider at least one of these areas to be their main focus. Here’s what I’ve found – many of them (although not every single one) are devoted to at least one area. Read More »
Cyber Crime: Identifying the Sources of an Everyday Threat
Cyber crimes, cyber thievery, and cyber warfare have become an everyday reality. In fact, security breaches are so prevalent that, according to a new study from the National Cyber Security Alliance and a private sector firm, 26 percent of Americans have been the victims of a data breach in the past 12 months alone. Not only do breaches reduce citizens’ trust in government to protect their confidential data, they also cost government agencies a significant amount of money. For most CIOs and other government keepers of data, these statistics prompt one immediate question – “Can this happen to us?” Unfortunately, the answer to this question is: yes, it can. Read More »
It’s a critical time for enterprise IT as new mobile devices from Apple, Samsung and Google enter the market and operating systems are updated almost weekly. Apart from the new color and form factor options, this round of new technology features new operating systems and a proliferation of app updates, which IT leaders must be prepared to meet head on.
It’s an exciting time for mobile technology, but it’s also an important time for enterprises to look at not only meet the demands of today’s mobile-enabled workforce, but tomorrow’s as well. Basic mobility functionality is not and will not be enough, and a solid framework must be put in place to support the growth.
In this inaugural post of a four-part Network Matters blog series, I’ll be discussing how IT leaders can rely on a network, built for all kinds of devices, to simplify the process of onboarding new mobile technology and free up precious IT resources. I would like to provide you with a deeper look at how having the right network in place can help ease the challenges of tomorrow that will be presented to IT departments due to device evolution and enable a culture of self-service for employee-owned devices.
With the explosion of smart mobile devices, consumers expect to have Wi-Fi access at pubic venues everywhere they go. Venue owners are under pressure to provide reliable Wi-Fi guest access in a simple and easy way. Wouldn’t it be great to be able to do that AND extract some value out of your investment in setting up the Wi-Fi network as well? Cisco Connected Mobile Experience (CMX) is an industry leading solution provides just that: an easy, customizable and location-aware way to onboard guests using CMX Connect, an ability to gain insights into guest behaviors using CMX Location Analytics and an opportunity to engage guests in meaningful ways using CMX Browser Engage.
With MSE Release 7.6 coming out later this year, we wanted to give you a closer look at new feature CMX Connect. Read More »
Tags: Cisco, connect, connected mobile experiences, customer experience, guest access, guest captive portal, guest experience, guest portal, location, location based services, location-aware, location-based, mobility, mobilt, network, technology, wi-fi, wifi, wireless
The mobility discussion isn’t fresh off the presses. BYOD isn’t something you have to look up to remember what the D represents. But much of the business-mobility discussion still focuses around smartphones and basic access. It’s a pretty limited view when you consider the potential beyond the petri dish of e-mail and calendaring.
Having access to my work e-mail and calendar on my smartphone is good stuff. As is having my choice of phones. And even the simple tools benefit my productivity, while letting me have a life beyond my job. Surprise, surprise: Sometimes “work happens” outside the normal work hours of my particular time zone. And, yes, “life happens” during my normal work hours.
I could be productive on a laptop from home, but my dog would soon gnaw through my keyboard in protest. (Hastened by prodding from my kid and a jar of peanut butter.) But she doesn’t mind if I check and answer e-mail at the dog park.
Beyond the Basics
So, what’s missing? Once people get over the novelty of e-mail and calendaring, they look for more. If they can slingshot birds across the universe, book airline flights, and deposit checks on these pocket-sized supercomputers, shouldn’t they be able to do more?