There is a new generation of college students out there, I would know as I recently was one of them. Information being at your fingertips is no longer a luxury, it is a necessity. Professors’ expectations of their students have increased dramatically due to the wealth of information on mobile devices. Every class I attended leveraged some form of wireless access to the web. Instant message in response to real-time questions and online submissions are just two of many examples of how network access has been integrated into the education system. Professors would consistently use online tools such as online drop boxes for projects and web conferencing tools. According to MarketWire 92% of college students feel a laptop is a necessity, this indicates that the requirement of mobile access at a university is a given and the college experience is defined by the ease of that access.
Professors are on tight schedules and are generally available only at certain times of the day. Imagine- wanting to contact a professor during open hours only to fall short because your laptop had difficulty getting any kind of connection. I remember the frustrations of wanting to revisit PowerPoint presentations on a class website in the library, only to realize that I was sitting by the one window notorious for being a wireless dead zone. Dorms were infamous for spotty coverage. Having the dorm room located closest to the access point for best access was purely by luck of the draw. I was not so lucky. In my dorm, you would not get any wireless access unless you were sitting right next to the hallway. That’s why I am especially envious of the students of Colorado University, whose alma mater upgraded to enterprise-class coverage.
Read More »
Tags: 802.11n, Borderless Networks, Bring your Own Device (BYOD), byod, cellphone, Cisco, Cisco Catalyst 6500, Cisco CleanAir, cleanair, college, colorado, controller, education, laptop, mobility, preparing students for the future, professor, scale as you grow model, security, student, system, tablet, Tablets, teacher, university, wireless, wireless access point, WiSM2
Cisco today announced it has completed the acquisition of NDS Group Ltd., a leading provider of video software and content security solutions that enable service providers and media companies to securely deliver and monetize new video experiences. NDS, which has approximately 5,000 employees, will become part of Cisco’s Service Provider Video Technology Group (SPVTG), led by Senior Vice President and General Manager Jesper Andersen.
While much has been written about this acquisition since it was announced, there’s plenty of exciting news yet to come. Over the next several months, we will begin to discuss with the industry analyst community the full impact of what it means to put together two market leaders. By combining the strengths of both companies, we have a unique opportunity to serve stakeholder across the video entertainment industry. Stay tuned for more information.
To read the full release, click here. To read Jesper Andersen’s take on the transaction, click here.
Tags: acquisition, security, video, videoscape
Today, the word “cyberspace” is used in many contexts, but it is not always clear what exactly that term describes and what it means. In this post we will compare the definitions of cyberspace from several sources with the purpose of establishing a range of notions as to what cyberspace is and to derive its ontology. Sources are relevant entities like national or regional government, standardization bodies, and dictionary.
The reason why the term “cyberspace” is chosen is that all other terms (e.g., cyber security, cybercrime, cyberwar, cyberterrorism, etc.) are based on, or derived from, cyberspace itself. Therefore, cyber security is security of cyberspace. Cybercrime is crime committed within cyberspace or where elements from/of cyberspace are used as a vehicle to commit a crime, and so on for other derived terms.
Read More »
Tags: cyber security, security
Each new innovative technology ups the ante for the next along with our expectations for performance. In fact, I’m reminded of a Louis CK piece from a couple years ago that captures this sentiment exactly. Because of these raised expectations, Hollywood has pushed to up the ante for special effects in movies—to leave any sense of the mundane in the dust. However, when taking a look at this summer’s biggest blockbusters, it seems that reality is quickly catching up to the silver screen’s science fiction and fantasy.
Read More »
Tags: Intelligent Network, internet of things, security
Do you have an iPhone, Android, Samsung , or any other mobile phone? Not surprising since there will be 15 billion networked devices by 20151. With employees (yes, even IT themselves) bringing their mobile phones to work, businesses are seeing at least a doubling of mobile devices per employee; from laptop-only to laptop + mobile phone (+ tablet)2.
The IT department is faced with an increased burden on their existing wireless network, while securing email access from any platform and simultaneously ensuring an optimal, reliable user mobile experience. Offering a reliable, consistent user mobile experience used to be a luxury ask; today, it impacts employee productivity. Mobile employee productivity can range from wireless laptop access from conference rooms to roaming the within the building accessing corporate email from any mobile device. This is true for me (working at a large enterprise) and my husband (working at a medium-sized business).
Read More »
Tags: 802.11n, access point, Aironet, AP, byod, controller, Ironport, midmarket, midsize, mobile, mobility, network, networking, security, wi-fi, wireless