Cisco Blogs


Cisco Blog > The Platform

Myth vs. Reality: Top “Future” Techs from This Summer’s Blockbusters

Each new innovative technology ups the ante for the next along with our expectations for performance. In fact, I’m reminded of a Louis CK piece from a couple years ago that captures this sentiment exactly. Because of these raised expectations, Hollywood has pushed to up the ante for special effects in movies—to leave any sense of the mundane in the dust. However, when taking a look at this summer’s biggest blockbusters, it seems that reality is quickly catching up to the silver screen’s science fiction and fantasy.

Read More »

Tags: , ,

Can BYOD Be Simple, Affordable, and Secure for the Medium-Business?

Do you have an iPhone,  Android, Samsung , or any other mobile phone? Not surprising since there will be 15 billion networked devices by 20151. With employees (yes, even IT themselves) bringing their mobile phones to work, businesses are seeing at least a doubling of mobile devices per employee; from laptop-only to laptop + mobile phone (+ tablet)2.

The IT department is faced with an increased burden on their existing wireless network, while securing email access from any platform and simultaneously ensuring an optimal, reliable user mobile experience. Offering a reliable, consistent user mobile experience used to be a luxury ask; today, it impacts employee productivity. Mobile employee productivity can range from wireless laptop access from conference rooms to roaming the within the building accessing corporate email from any mobile device. This is true for me (working at a large enterprise) and my husband (working at a medium-sized business).

Read More »

Tags: , , , , , , , , , , , , , , ,

Observations from HIPAA Conference – Time to Act?

On June 6-7, the National Institute of Standards and Technology (NIST) co-hosted a conference focused on HIPAA, the foundational U.S. health care information law. I attended the conference and came away with the sense that a) health care entities have begun to see clarity in the things they must do from an IT perspective to abide by the law’s requirement to protect patient information and b) they are motivated to do so through Federal moves to enforce the law.

The links between vague laws and concrete technical requirements to support them are usually ambiguous because the laws are written by non-technical lawyers and they often turn over implementation details to government departments.

Read More »

Tags: , ,

A Recipe for Cookies

This month marks the 63rd anniversary of the publishing of the novel Nineteen Eighty-Four, it might be interesting to take a look at what is currently the primary method used for tracking on the Internet, the Browser Cookie. Browser cookies are a subject with almost as much misinformation floating around as there is correct information.

Read More »

Tags: , ,

Cisco is a Leader in the 2012 Gartner Wired & Wireless Magic Quadrant with a Policy-Guided Approach to Today’s Networks

In the past few years a number of paradigm shifts have made policy-based networking essential to effective enterprise IT management. Some of these shifts include an increased reliance on virtualization and the cloud; the “consumerization” of business networks that has occurred with the popularity of devices such as tablets and smartphones; and the rapid adoption of video in business communications. By applying appropriate policies within the network, IT managers can do a better job of meeting users’ expectations and become business enablers.

We believe our message of One Policy, One Management and One Network has been recognized in the recent Gartner 2012 Wired and Wireless LAN Infrastructure Magic Quadrant, where Cisco has been positioned as a leader.

Foundational to Cisco’s One Policy strategy is the Cisco Identity Services Engine (ISE), which enables organizations to create and deploy unified policy to address the need for BYOD compliance. ISE enables one consistent policy across the entire enterprise, as well as enforcement by correlating a unique combination of contextual information including user, device, location and time.

Read More »

Tags: , , , , , , , ,