What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to support the mandated online testing capabilities. Enter district IT.
Technology is a key component when it comes to achieving the objectives of these standards. The objective is to augment the learning experience through the use of wired and wireless devices and enhance skills such as communication, collaboration, research, critical thinking and tackling problems. The mandate is computer based assessments. This promotes more personalized leaning. The students are also acclimated to use technology effectively for productive life activities in the future.
The combination of common core standards adoption with BYOD or 1:1 initiatives, results in an exponential growth in addressing endpoints, bandwidth, and security. Schools are looking to upgrade their existing networks to be able to handle the current and future requirements of these standards.
Read More »
Tags: bandwidth, byod, common core, computer based assessment, computer-based, district IT, educate, education, endpoints, high density, IT, K-12, K12, learn, mandated online testing, mobile, mobility, network, online testing, school, security, standards, state standards, technology, wi-fi, wifi, wired, wireless, wlan
Cisco Live Milan 2014 kicked off this morning with an opening keynote by Rob Lloyd. During the session Rob shared Cisco’s vision of the Internet of Everything, and explored the industry trends and technologies that are making that vision a reality. One of these areas is enabled by Cisco’s CMX solutions and our growing ecosystem of partners.
To illustrate how this vision is becoming a reality, a CMX demo was shown on stage. The demo related to a wine producer ( we are in Italy by the way..) who was able to engage with their customers via their mobile app. Enabling the customer find the particular wines they are interested in, interact with the wine maker, get location specific promotions and really deliver a highly personalized and location specific service.
CMX at Cisco Live Day 1:
The whole venue has been designed and setup for WiFi location based services and CMX is running across the complete conference. Read More »
Tags: analytics, App, application, Cisco, cisco live, cmx, Conference, customer, customized, device, Enterprise, experience, heat map, innovation, innovative, interaction, internet, Internet of Everything, keynote, lbs, location, location based services, location specific, location-based, map, mobile, mobility, network, personalized, promotion, rob lloyd, service, technology, venue, wi-fi, wifi, wireless, wlan, world of solutions, wos
Editor’s Note: This is the last of a four-part deep dive series into High Density Experience (HDX), Cisco’s latest solution suite designed for high density environments and next-generation wireless technologies. For more on Cisco HDX, visit www.cisco.com/go/80211ac. Read part 1 here. Read part 2 here. Read part 3 here.
If you’ve been a long time user of Wi-Fi, at some point you have either observed someone encounter (or have personally suffered from) so called “sticky client syndrome”. In this circumstance, a client device tenaciously, doggedly, persistently, and stubbornly stays connected to an AP that it connected to earlier even though the client has physically moved closer to another AP.
Surprisingly, the reason for this is not entirely…errr…ummm…unreasonable. After all, if you are at home, you don’t want to be accidentally connecting to your neighbor’s AP just because the Wi-Fi device you’re using happens to be closer to your neighbor’s AP than to your own.
However, this behavior is completely unacceptable in an enterprise or public Wi-Fi environment where multiple APs are used in support of a wireless LAN and where portability, nomadicity, or mobility is the norm. In this case, the client should typically be regularly attempting to seek the best possible Wi-Fi connection.
Some may argue that regularly scanning for a better Wi-Fi connection unnecessarily consumes battery life for the client device and will interrupt ongoing connectivity. Therefore the “cure is worse than the disease”. But this is true only if the client is very aggressively scanning and actually creates the complete opposite of being “sticky”.
The fundamental issue with “stickiness” is that many client devices simply wait too long to initiate scanning and therefore seeking a better connection. These devices simply insist on maintaining an existing Wi-Fi connection even though that connection may be virtually unusable for anything but the most basic functionality. Read More »
Tags: 3G, 4G, access point, AP, beacon, cellular, client, connection quality, device, environment, experience, feature, HD, HDX, high density, IT, LAN, mobile, mobility, monitor, network, performance, retransmission, roaming, solution, sticky client, sticky client syndrome, usability, user, wi-fi, wifi, wireless, wlan
For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.
Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:
- Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
- Strict mobility policies will drive employees to want to isolate personal data from business data.
- Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.
Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.
Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.
Tags: Cisco, collaboration, future of mobility, infrastructure, mobile, mobility, network, security
Gartner recently made three interesting predictions about mobility in the workplace. While the ideas are compelling, they only offer one-side of the story, and the solution.
In this blog post, I’ll take a deeper look at each of these predictions and discuss why the future of mobility rests on IT leaders taking a balanced and strategic approach to security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.
Gartner Prediction #1: Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
While the actual failure rate may be less than one-fifth, mobility efforts will fail if companies are too restrictive with MDM policies. Instead, a two-fold approach to supporting a BYOD environment from a security perspective is essential.
First, IT leaders should take a balanced approach to security that protects business-imperative network solutions and data. In most cases, blocking Angry Birds and Candy Crush is unnecessary and not scalable. With Apple and Google supporting over a million apps each (and counting), it can cost precious time and IT resources just trying to keep up with restricting non-threatening applications.
Secondly, IT leaders should be focused on encouraging users to use secure solutions. This will only grow more important as the explosion of new connections and various devices evident in today’s Internet of Everything world creates more opportunity for malicious actors to utilize even more inroads to compromise users, networks, and data. By educating employees to take an active role in the security of their device, users can be empowered to report suspicious threats and have an open dialogue with IT teams. Read More »
Tags: architecture, Cisco, future of mobility, infrastructure, mobile, mobile device, mobile workspace, mobility, network, security, wi-fi, wifi, wireless