Cisco Blogs


Cisco Blog > Mobility

CMX Analytics: An Inside Scoop on CiscoLive! Milan #CLEUR

cmxclmilan1

Today is the final day of a very busy and successful Cisco Live Milan 2014. Read my initial observations from the event earlier this week.

As the event draws to a close, lets look at some of the location analytics available via Cisco’s Connected Mobile Experiences solution (CMX) and perhaps try to answer some of the following questions about the event.

For this I will just focus on the World of Solutions Show floor -- approximately 800,000 sq feet in size, and containing all the Cisco Booths and the partner displays.

  1. How many people actually visited the world of solutions?
  2. How many people did  the different Cisco Booths attract?
  3. Where was the busiest part of the show floor?

These and other insights can be derived from looking at the business intelligence that emerges from CMX. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Is Your K-12 Network Ready for Common Core Standards?

What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to support the mandated online testing capabilities. Enter district IT.

Technology is a key component when it comes to achieving the objectives of these standards. The objective is to augment the learning experience through the use of wired and wireless devices and enhance skills such as communication, collaboration, research, critical thinking and tackling problems. The mandate is computer based assessments. This promotes more personalized leaning. The students are also acclimated to use technology effectively for productive life activities in the future.

The combination of common core standards adoption with BYOD or 1:1 initiatives, results in an exponential growth in addressing endpoints, bandwidth, and security. Schools are looking to upgrade their existing networks to be able to handle the current and future requirements of these standards.

Deploy K-12 Common Core-Ready Networks 20140121 Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Cisco Live Milan 2014 & CMX

cmxclmilan1

Cisco Live Milan 2014 kicked off this morning with an opening keynote by Rob Lloyd. During the session Rob shared Cisco’s  vision of the Internet of Everything, and explored the industry trends and technologies that are making that vision a reality. One of these areas is enabled by Cisco’s CMX solutions and our growing ecosystem of partners.

To illustrate how this vision is becoming a reality, a CMX demo was shown on stage. The demo related to a wine producer ( we are in Italy by the way..) who was able to engage with their customers via their mobile app. Enabling the customer find the particular wines they are interested in, interact with the wine maker, get location specific promotions and really deliver a highly personalized and location specific service.

cmxclmilan2

CMX at Cisco Live Day 1:

The whole venue has been designed and setup for WiFi location based services and CMX is running across the complete conference. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HDX Blog Series #4: Optimized Roaming

Editor’s Note: This is the last of a four-part deep dive series into High Density Experience (HDX), Cisco’s latest solution suite designed for high density environments and next-generation wireless technologies. For more on Cisco HDX, visit www.cisco.com/go/80211ac.  Read part 1 here. Read part 2 here. Read part 3 here.

If you’ve been a long time user of Wi-Fi, at some point you have either observed someone encounter (or have personally suffered from) so called “sticky client syndrome”. In this circumstance, a client device tenaciously, doggedly, persistently, and stubbornly stays connected to an AP that it connected to earlier even though the client has physically moved closer to another AP.

Surprisingly, the reason for this is not entirely…errr…ummm…unreasonable. After all, if you are at home, you don’t want to be accidentally connecting to your neighbor’s AP just because the Wi-Fi device you’re using happens to be closer to your neighbor’s AP than to your own.

However, this behavior is completely unacceptable in an enterprise or public Wi-Fi environment where multiple APs are used in support of a wireless LAN and where portability, nomadicity, or mobility is the norm. In this case, the client should typically be regularly attempting to seek the best possible Wi-Fi connection.

Some may argue that regularly scanning for a better Wi-Fi connection unnecessarily consumes battery life for the client device and will interrupt ongoing connectivity. Therefore the “cure is worse than the disease”. But this is true only if the client is very aggressively scanning and actually creates the complete opposite of being “sticky”.

The fundamental issue with “stickiness” is that many client devices simply wait too long to initiate scanning and therefore seeking a better connection. These devices simply insist on maintaining an existing Wi-Fi connection even though that connection may be virtually unusable for anything but the most basic functionality. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Summary: A Balanced Approach to Mobile Security

For the benefits of collaboration to be better realized, IT leaders must take a balanced and strategic approach to mobile security that focuses more on protecting the network and proprietary data and less on implementing overly broad restrictions.

Gartner recently made three interesting predictions about mobility in the workplace. And while each of these predictions are compelling – they only offer one-side of the story and the solution:

  1. Twenty percent of BYOD projects will fail by 2016 due to IT’s “heavy hand.”
  2. Strict mobility policies will drive employees to want to isolate personal data from business data.
  3. Mobile browsers will gain market share for app delivery for multiple platforms, and the role of HTML5 in solving issues that arise with the multiple platform problem.

Instead, IT leaders should encourage employees to use secure solutions on devices connected to the network. Managing belief and behaviors of users and deploying a flexible infrastructure that can support an open BYOD policy and mitigate advanced security threats, can have tremendous impact on creating an immersive collaborative environment.

Learn more about how Gartner’s mobility and security predictions can affect the future of collaboration by reading the full blog: A Balanced Approach to Mobile Security.

Tags: , , , , , , ,