You read about the three flavors of analytics we offer with the Connected Mobile Experiences solution last week. One of the key innovations Evyatar discussed is the a completely transformed user interface for onsite analytics, so I want to give you all a closer look at exactly what enhancements are in store for location analytics CMX 7.6 (available later this year).
Redesigned from the bottom up, the UI update came from a strong team effort to deliver a solution that is not only relevant to our customers, but intuitive and easy to use for business users. Our vision is that anyone from sales to marketing, from store management to customer operations should be able to use the tool without having the call the IT guy.
The redesign process considered around the needs and learnings of our early customers, with over 20 individual customer interviews and previews, and incorporated input from proven UI and HCI experts.
The most important feedback was from our customers, and we listened! The new UI contains both overt and subtle changes, all tailored from our customers’ perspective in order to deliver tools they need to make better business decisions, enhance their customers experiences, improve their operational efficiency and increase their revenues
Some of the major UI innovations coming in this release include:
A new dashboard introduced to deliver key information at a glance when the user first logs in. The dashboard layout can be configured to display the most relevant information to the user so that they can immediately make use of it within the business.
Read More »
Tags: analytics, cmx, connected mobile experiences, enterprise mobility, location, location analytics, location based services, mobility, network, onsite analytics, user interface, wi-fi, wifi, wireless
There’s no question that more people around the world are connecting to wireless networks at home, work and play via mobile devices, such as smartphones and tablets. This rise in mobile device usage begs the question: How soon will it be (if not already) before these mobile devices dominate the mobile network, especially in the workplace?
Just recently, I read an article in Forbes, by Louis Columbus, that addresses the issue of increased mobile devices and unprepared network infrastructures. The article examines a study by IDC that predicts that 87% of sales for connected devices will be tablets and smartphones in next four years. As many employees prefer working from their own mobile devices, corporate networks, as they’re currently designed, will not be capable of successfully managing such a large volume of mobile data traffic generated by these mobile devices. With such expansive growth expected, the majority of businesses will either need to adapt an existing strategy to support this increase in mobile devices or adopt a new strategy.
Currently, there is a clear need for enterprises to better prepare and invest in their IT infrastructure. As more employees use their own devices at work for business and personal use, it’s imperative that business organizations require a secure mobile device and BYOD strategy to accommodate their business needs and employee preferences. However, the decision to adopt BYOD comes with a set of challenges for IT organizations.
Many of the benefits of BYOD, such as having the choice of device and anywhere, anytime access, are somewhat adverse to traditional IT requirements for security and support. In the past, IT pre-determined a list of approved workplace devices, typically a prescribed desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT has to approach the problem differently. Read More »
Tags: bring your own device, business transformation, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
One of the basic tenants of enterprise mobility is its direct influence on “now”.
When organizations implement mobile policies like BYOD and virtualized desktops, day-to-day operations can immediately improve. In most cases, the rate of return on seeing change is direct. However, the impact of enterprise mobility is not short-lived.
Recently, we counted down the “Six Essential Steps for Unleashing the Power of Enterprise Mobility.” Throughout the series, we provided a guide for enterprises to follow to implement broader mobility. We discussed how businesses could benefit now by untethering their global workforce and increasing productivity. The series highlighted a tactical approach to mobility, yet we would be amiss not to discuss the long-term transformational impact mobility can have on businesses. How can mobility be a catalyst for organizational growth and innovation?
Last week, I read an IT Web article by Johannesburg-based Lebo Mashiloane that discussed how BYOD and mobility are fueling enterprise growth. The article brought up a concept that is always important to keep top-of-mind: How today’s technology solutions are changing the landscape of tomorrow. Read More »
Tags: bring your own device, byod, Cisco, enterprise mobility, mobile, mobile device, mobility, network, wi-fi, wifi, wireless, wireless network
I recently had the honor to speak at the Small Cells Forum in Dubai. One thing is certain: Wi-Fi and small cells are certainly important throughout the Middle East and Northern Africa. Operators from throughout the region came together to learn how they could deploy small cells to meet their growing customer demands and improve their own bottom-line in the process.
I took away six key messages from the conference on the future of mobility in the Middle East:
- Small Cells Are the Next Big Thing: Operators from large countries like Saudi Arabia to smaller countries like Qatar all wanted to learn how they could use small cells to help them cope with the huge traffic that they are experiencing on their mobile networks and to improve mobile coverage, especially indoors and in heavily congested areas.
- Small Cells Are Not an Add-On: SPs realize that future of mobile networks lies in a heterogeneous network (“HetNet”) world where licensed and unlicensed mobile networks coexist and complement each other. With their unique strengths, Wi-Fi and licensed small cells are quickly becoming important components of an integrated access portfolio complementing the macro mobile access network.
- A New Read More »
Tags: MENA, mobility, Service Provider, small cell
Risk. It’s not just a strategic board game; in business it’s the analysis that determines the potential for loss.
In today’s organization, the consumerization of IT has led to groundbreaking developments in the mobility space. The broad deployment of BYOD, coupled with the availability of corporate data and applications, have challenged how we define security. And with recent news reports citing the rise of mobile hacking and network threats, the security of mobile technology and the data it carries seems to be at risk.
Fortunately, all is not lost.
Mobility gives employees and providers options for the workplace and creating a mobile experience that is efficient and innovative. It is also helping businesses save and make money. Today, employees in any place on any device can access any application across any network in any cloud. As a result, there are challenges associated with implementing a comprehensive BYOD policy that encompasses a proliferation of devices connecting to a network.
Even though mobility can cut costs and increase productivity, 60 percent of IT professionals recently surveyed believe mobile devices in 2013 present more of a risk to their organization than they did in 2012. And even with the growing concerns over mobile security, it still appears that only 60 percent of organizations require security technology for mobility plans. Why isn’t that number higher? After all Android Malware grew 2,577 percent in 2012 alone.
Read More »
Tags: byod, Cisco, Cisco Security, Cisco Security Intelligence Operations, Internet of Everything, IoE, malware, mobile, mobile malware, mobility, security