Cisco Blogs


Cisco Blog > Mobility

Get Your Network Ready For iOS7

September 13, 2013 at 5:30 pm PST

In their highly anticipated announcement this week, Apple introduced two new phones, the iPhone 5C and iPhone 5S, and confirmed that iOS 7 would be released on September 18th. Techies like myself took note that iOS 7 will include quite a number of new features. We at Cisco want to help you understand what iOS 7 means for your network, so here’s a quick blog to sum it up:

How does iOS 7 impact your wireless networks?

Soon your employees and guests will be upgrading to IOS 7. Did you know up to 20% of traffic to mobile devices is software upgrades, application updates and synchronizing your devices via the cloud? Cisco’s Application Visibility and Control technology can help you identify and tame these applications and is available on the routers, Wireless LAN and visible via Prime Infrastructure. In addition, Cisco’s ISR can cache these updates to reserve valuable and expensive WAN bandwidth. More details about protecting the WAN is available in another blog.

If you leverage a Captive Portal, you will experience a change in behavior. Apple has enhanced the Captive Network Assistant (CNA) functionality iOS 7 making it more robust. Cisco has proactively developed and tested a new version of wireless LAN controller code to interoperate with Apple’s new implementation while ensuring a seamless experience for all other clients.

Finally iOS 7 also has significant security and manageability enhancements to improve productivity for the enterprise.

What do you need to do in order to optimize for iOS 7? Read More »

Tags: , , , , , , , , , , , ,

Ask The Futurist: “How Will the Internet of Everything Impact Teachers’ Roles in the Connected Classroom?”

Chalkboards. Textbooks.  Stacks of papers and folders. All of these items can make anyone a little nostalgic and remind us of our time in primary and secondary school. While basic fundamentals remain the same, classrooms are evolving. The reason? The Internet.

This year’s back-to-school season has sparked many conversations around the future of the classroom. Most parents have seen the workforce and everyday life evolve as the Internet of Everything (IoE) begins to connect more people, places, data, and things. Yet questions about IoE in the classroom persist. That’s why in today’s “Ask the Futurist” post, I take a deeper look at how the IoE will impact the classroom of the future.

Today’s question comes from Rob Coote, a systems analyst for a public K-12 school district in Northern Alberta, Canada. Here’s his two-part question:

Question: “How do you envision the future of the ‘connected classroom’ and one-to-one learning in K-12 education? How do you see this impacting or changing the teacher’s role?”

Read More »

Tags: , , , , , , , , , ,

The Fifth Step to Enterprise Mobility: Defending Your Data

This is the fifth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here. The fourth blog post focused on creating an app checkpoint can be found here

In a 2012 survey of IT executives and CEOs, nearly half of the companies that permit mobility and BYOD reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. In addition, security concerns continue to remain a key issue for decision makers looking to deploy additional mobile solutions such as enterprise mobile apps, according to a recent article from IT Pro.

Careful planning can help enterprises manage security concerns and harness the power of mobility. Here’s a brief checklist to help organizations secure devices, data and the network:

Watch the video: http://youtu.be/k8ytncvjE7M

Watch the video: http://youtu.be/k8ytncvjE7M

1. IT Pushing of Capability Down to End Devices

 IT needs to be able to push capabilities down to end devices and access control for both on-premises and off-premises apps, while providing pull capabilities for users, so they can self-provision apps.

IT must have the ability to apply situational control policies (for example, for disabling cameras on mobile devices in order to protect on-premises company assets when employees and guests are on corporate premises or in restricted areas). Another must have? The ability to remotely locate, lock, and wipe devices should there be a theft or if an employee leaves the company. It is also essential to be able to automate geo-specific policies to control roaming costs when workers are out of country. Read More »

Tags: , , , , , , , , , , ,

An Internet of Everything Startup Spotlight: John Funge, Co-Founder & CEO, BrightContext

Today I’m introducing a new series that focuses on the collective power of connections in the Internet of Everything (IoE) — and some of the new companies that are creating value from those connections. The industry is ripe with emerging IoE-focused startups that deserve to be recognized for their work in building the Internet of Everything, brick by web-enabled-brick. These various startups are making an impact in education, healthcare, home automation and more. They are led by thinkers and doers who are helping to create the future. Periodically over the next several months, we’ll take a look at some of these startups and learn more about how IoE is enabling their success — and how they, in turn, are enabling the Internet of Everything.

Recently, we had a chance to talk with John Funge, co-founder and CEO of BrightContext, a cloud-based data-stream processing platform that is helping to turn Big Data into actionable insights. Here’s how BrightContext is pioneering the growth of the Internet of Everything:

BrightContextLogo

 

John Funge, Co-Founder_CEO of Bright Context

John Funge, Co-Founder & CEO, BrightContext

What is BrightContext? And how does your business meet new demands in our increasingly connected world?

BrightContext is an ultra-scalable, cloud-based data-stream processing platform that makes it easy to deliver real-time stream analytics from any data source. BrightContext is used for stream analytics, live visualization, monitoring, and generating alerts from high-volume data sources such as web click and activity data, mobile activity data, social media, audience sentiment data, point-of-sale data, and transactional data.

BrightContext is taking on one of the major problems of the century – how to process a deluge of data in real time, immediately derive insights, and take action. BrightContext provides companies with a platform for monitoring and analyzing streams of Big Data in motion. It enables customers to mine that information instantly to make it actionable. This, in turn, makes it easier to use input streams to create and distribute sub-streams for others to use.

Read More »

Tags: , , , , , , , , , ,

The Fourth Step to Enterprise Mobility: Create an App Checkpoint

This is the fourth post in a blog series featuring Vine-format videos focusing on the “Six Essential Steps for Unleashing the Power of Enterprise Mobility”. The first blog post discussing how to build a mobile structure can be found here. The second blog post highlighting the benefits going virtual can be found here. The third blog post focused on preparing enterprises for the division of devices can be found here.  

For today’s app-centric mobile workforce, it’s no longer enough to provide basic security features for devices. Gone are the days where security for mobility is “all or nothing” where virtual private networks (VPNs) gave you access to all corporate network resources, or you had very limited email and calendaring access.

Today, enterprises are managing public and private mobile applications that require a shift in security practices and a new application strategy. Here’s a short checklist to guide enterprises as they create app checkpoints to meet new security demands:

Step 4

To watch the video, see: http://youtu.be/dpQ5_n6FoX4

1. Look for a rapid, reliable, and secure vetting process for applications. 

IT security teams are usually directed toward securing the network and the devices connected to it, versus securing the applications that run on those devices. Many organizations lack the resources to evaluate an application’s ability to handle sensitive information throughout its lifecycle.

Companies rarely have the resources to monitor sites that could breed malware, nor do they have the ability to maintain heuristic algorithms to identify such sites prior to infection. And those that decide to secure mobile apps themselves might end up having to prioritize remediations, leaving them vulnerable. Read More »

Tags: , , , , , , , , , , ,