Today’s governments around the world look to technology to improve operational efficiency, to enable collaboration across agencies, and to provide on-demand and more engaged services to really transform the citizen experience. So…for those of you who work in government, where are you getting information that will help enable you to learn about which solutions or technologies align to or fit your specific needs?
Importance of High Availability: If you are reading this blog, you likely own 2-5 Wi-Fi-capable devices: laptops, mobile phones, or tablets. From employees to students, from doctors to guests, the common theme is that everyone now uses wireless as a preferred mode of access.
Tags: 7.3, access point, AP, business continuity, byod, CAPWAP, Cisco Unified Wireless Network, controller, CUWN, failover, HA, High Availability, mobility, SSO, Stateful Switch Over, wireless, WLAN controller
We’re in the midst of an incredible megatrend. We know it and we’re living it. We all love our mobile devices; whether it’s our laptop (yes, I’m sitting at my kids swim class typing away for work), our mobile phone (I’m getting texts on what’s for dinner), or our tablet (where Draw Something awaits me). Apple recently stated that they have sold more than 67 million iPads in the recent 18 months. That is more than all the Mac sales in the past 27 years. There’s no denying it: we are in the midst of an incredible megatrend—a mobile megatrend.
But what does this mean to businesses?From the IT perspective, the role of the mobile devices has transformed from a luxury item used for personal communication and entertainment to an integral tool for employee productivity. Mobile devices are now the main platform for work (laptop or tablet) and the primary medium for corporate contact (mobile phone). With employees bringing an average of two mobile devices each (laptop/tablet + mobile phone), companies can reap the benefits of new business opportunities and more productive employees.
As the digital content lead on the social media communications team at Cisco, my primary responsibility is to capture and produce relevant and compelling stories. The end goal of these stories is always the same: provide reporters, analysts, customers, thought leaders and others interested in Cisco and the industry with a better understanding of networking technology, its power and its significance in the lives of users.
That brings me to My Networked Life: True Stories from a Connected World. This twelve-part documentary-style video series takes viewers around the world for a look at how young professionals, entrepreneurs, artists and students are using connected technology to achieve goals and realize dreams. These stories are personal, they are real and they are powerful. Each video closes with a data point from Cisco’s Visual Networking Index or the Cisco Connected World Technology Report –reinforcing the reality of the trends showcased in each episode.
While the videos do not necessarily focus on specific Cisco customers, they do focus on the areas of technology Cisco is most interested in – video, collaboration, mobility, security, cloud and core networking technology. These videos also serve as an engagement spark of sorts for communications – driving conversation about the future workforce, what the expectations are globally and what CIOs should care about and listen to.
We welcome feedback on this series. Share YOUR networked life with us. Post your picture to our Facebook Page or Twitter and tag it #NetworkedLife showing how the network and connected technology allows you to follow your dreams and achieve your goals.
Hear how financial innovator Diebold gains visibility and control of the 87,000 devices on their network. David Kennedy, former Chief Security Officer at Diebold recognizes there is no stopping new mobile devices and sets course to secure the organization while ensuring the business may continue to generate revenue. Workers want to work their way securely and prefer that the security is transparent so that they have the optimal experience. He speaks to the unique granularity that the Cisco Identity Services Engine (ISE) offers to segment access by user, device, access method, posture, and time. So that engineers may have access to their codebase while marketing professionals like me have no access from my new iPad: