The annual Cisco Networking Academy Conference opened with a fitting tribute to celebrate its rich 15-year history. Cisco Executive Chairman Emeritus John Morgridge took the stage just days before his 80th birthday and told the audience the story of how Networking Academy was founded. Hundreds of academy instructors and Cisco staff watched in person from Cisco headquarters in San Jose, California and virtually from around the world.
According to John, there are 3 reasons why NetAcad has been such a success. First of all, it capitalized on Cisco’s strengths and capabilities. Cisco also invested for the longer term: 15 years and hundreds of millions of U.S. dollars. Finally, he mentioned and thanked the great instructors who have taught more than 4.75 million students in 165 countries since 1997. Today, NetAcad is evolving to keep up with the ever-changing educational system. One key component, according to Morgridge, is that “we test to master not to measure.”
Read More »
Tags: Career, ICT, job, networking, skills, technology
The explosion in business mobility is transforming our companies in profound—and sometimes challenging—ways. One of the most vexing issues is security.
Recently, I came across a Wharton article predicting that by 2015, more Americans will access the Internet through mobile devices than PCs. From open data to an increase in government-accessed information, this sweeping trend raises questions about the true security of mobile networks and devices. But how can an organization support the infusion of wireless devices into employees’ lives without opening the door to heightened security risks? Read More »
Tags: bring your own device, byod, Cisco, mobile, mobile device, mobility, network, networking, solution, unified network, wi-fi, wifi, wireless
So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional. Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE) Policy Deployment, part of Cisco BYOD Solutions for K12 Education. With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience. You can be rest assured that we have your back while you balance it all.
Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic]. Protection of access to and access by students is a high-priority. It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the K12 BYOD Solution protects student information through secure, role-based, application access – simply -- over the wired and wireless infrastructure. Read More »
Tags: bring your own device, byod, campus, Cisco, device, education, enrich, Google, ISTE, K-12, K12, LAN, learn, mobile, mobile device, mobility, network, networking, school, school district, server, solution, student, tablet, teach, technology, wi-fi, wifi, wireless, wireless network, wlan
Editor’s Note: This is a guest post by two Wireless Networking Group interns, Nonie Grewal and Nivedita Jagdale, to capture their thoughts on the Connected Mobile Experiences Hackathon that they helped plan and execute.
June 29th marked the start of the Connected Mobile Experiences (CMX) Hackathon in the Cisco San Jose campus. CMX, powered by the Mobility Services Engine, provides a unique way of providing personalized real time location services over Wi-Fi. CMX aims to increase customer-oriented and operational efficiencies through analytics and personalized mobile services. The contestants at the hackathon were invited to help build prototypes that could help complement these goals, focusing on enhancing user connectivity and visibility.
As summer college interns volunteering at the event, we walked into the Deep Space Nine room where the hackathon was held, to find clusters of intense developers at each table. With each passing minute, we felt the name “Deep Space” seemed apt for the cause it was hosting -- deep thought and real coding! Read More »
Tags: API, Cisco, cmx, Connected, connected mobile, hack, hackathon, mobile experience, mobile experiences, network, networking, REST, rest api, wireless
In recent years, social media has become the staple of communication. I remember when I was only about 11 years old and I first discovered the wonder of Myspace. This tool (the first of its kind) led the way to , , ,, etc. Social media opened up a whole new world of opportunity and how people communicate with each other and even businesses. However, the power of social media comes with a price if you do not know how to use it. That is why, when it comes to social media, a person must realize who their audience is and what they would like to portray. There are a few key points when deciding to use social media as a platform of communication:
- Start with listening to your audience and observing their activity prior to engagement.
- Create a strategic Social Media plan.
- It is also important to set goals that you want to achieve overall and pay attention to how social media plays into these goals that you have.
- Set goals that map your overall objectives (personal/professional use).
When you’re using social media for personal use, you may have a different audience and a different reason for your posts than if you were using social media for professional use, where your views are projected onto the organization as a whole. In a professional setting, social media can be used as a tool for an organization to communicate with their customers. Customers may use this tool to express to the organization how much their products/services do for them, or possibly what they don’t do for them. There are also people who use social media purely to induce negativity, and they will be around no matter the platform. They are called “trolls” and it is best to avoid them and to pay them no attention.
Whether you choose to use your platform for business or personal use, it is always necessary to remember these tips:
- Remember that whatever you post is most likely accessible to others as well.
- What you post can end up on search engines and on other people’s news and activity feeds.
These have been the most important lessons that I have learned in my experience and utilization of social media. Listen, create a plan, set goals and be aware of your audience and the content that you are posting. These days where there seems to be a “no limits” attitude with sharing information, which has in turn caused people or businesses a lot of trouble. What important lessons have you learned about social media? Are there any mistakes that you’ve made on a social media platform that caused you problems? What advice would you like to give others on their usage of social media? I would love to hear your thoughts.
Tags: communication, facebook, networking, Pinterest, Smart Tips, social media, twitter, unified communications, youtube