Cisco CMX Mobility Developer Challenge is under way at topcoder. CMX Mobile Application SDK can be leveraged in a mobile application to provide indoor location and navigation for users. The SDK will connect with the CMX Mobile App Server to determine a user’s location, downloading maps, venues, point of interests, and determine routes for a selected point of interest. The CMX Mobile Application SDK can also receive a mobile push notification when application is not running. When notified, the application can be launched and include message how to join the customer network when first initiated. The core feature is the indoor location which displays current location of device on the map. The location updated as a user moves through a venue and can help navigate the user to some defined location.
The topcoder challenge is to use the CMX Mobile Server SDK to create a new app using a simulated environment for a meeting host to automatically launch a WebEx conference, based on the location of the conference room where the meeting is scheduled.
The SDK is composed of several modules to allow for varying types of application integration. The CMXClient is the core module for getting client and venue information. Read More »
Tags: API, App, Cisco, client, cmx, coder, Conference, core module, develop, developer, device, location, map, mobile, notification, program, programmer, sdk, server, simulator, software, technology, topcoder, venue
Wireless is enabling change everywhere. According to Cisco’s VNI Global Forecast, wireless traffic will bypass wired traffic 40% by the year 2017. This is evident by the way many organizations are using Wi-Fi technology. Take healthcare providers as an example: many hospitals today rely on Wi-Fi to provide seamless clinician roaming, improved efficiency and patient care--not to mention patients’ relatives and friends who expect to connect to guest Wi-Fi. And then there is education where we are seeing both universities and K-12 schools faced with more and more students coming onto campus carrying mobile devices with bandwidth intensive applications like video.
The explosion of high performance applications and the number of clients using them is a big reason why 802.11ac adoption is happening at a rapid pace. 802.11ac as a standard addresses the performance needs of applications while providing a robust network that handles a growing number of client devices. Cisco provides our customers with a unique solution to meet the high density requirements with a technology suite called Cisco High Density Experience (HDX). HDX helps Cisco customers prepare beyond 802.11ac and addresses the key aspects of any network that is challenged by the high density of large numbers of clients on the network and increasing performance demands of bandwidth intensive applications. Deploying 802.11ac with Cisco’s HDX Technology will provide a relief from the bandwidth demands while also making the overall Wi-Fi network more efficient.
With this in mind, we are hosting a webinar on June 26th where we focus on 802.11ac Standard, Cisco’s 802.11ac solution including our HDX Technology and how it can be used in various networks. We have also invite Joe Christoffersen who is the Director of IT at Katy Independent School District in Katy, TX to provide his unique perspective on how Katy ISD is deploying 802.11ac, how it will affect the performance of his network and the benefits he expects from this technology.
The webinar is next Wednesday at 1:00PM PDT. Here is the registration link. If you miss it, we will have it available on demand here shortly after.
For more on Cisco’s 802.11ac, visit www.cisco.com/go/80211ac.
Tags: 11ac, 802.11ac, application, client, density, device, experience, HD, HDX, high, high density, network, performance, Speed, technology, wi-fi, wifi, wireless, wlan
On Thursday and Friday of last week, I attended the Big Boulder data conference, which brings together vendor, academics, analysts and practitioners of social data. The purposes were many: discuss emerging trends, acknowledge the issues and challenges around privacy and security, and make introductions to encourage discussion of how we all envisage social data technology and by extension social data maturing.
I spent two days fastened in on how vendors believed social data could be used and how companies and researchers were ultimately using it. At times, there was a wide gulf and not only because the rate at which technology is evolving is rapid but because we, as an industry, recognize the importance of this data and don’t want to compromise the trust our customers and clients have for us.
The people at GNIP/Twitter are well aware of this and have spearheaded the Big Boulder Initiative, a task force created to address critical issues around stewardship, enablement, availability and value. If you’re interested, you can learn more here.
Over the two-day conference, there were over 45 sessions with topics ranging from Sina Weibo to the challenges of analyzing unstructured data to user-generated content vs. brand-created content. Despite the wide scope of topics discussed, there was an underlying recognition that we were all in this together, that we have an obligation to manage the growth of social data in a responsible and secure manner and that we still had some growing up to do.
I could probably write several pages of themes and insights that I noted during the two days but here are three I thought we’re particularly interesting.
Visualize Whirled Peas
This year there was a lot of discussion around visualization and the impact of Tumblr and Pinterest, respectively. One of the panelist believed that visual channels were happy because people like to engage with images. I’m not sure I entirely buy that and other members of the panel were quick to argue to the contrary. However, watching the world wake up and go to sleep with Twitter was very compelling and did make me smile (if not happy).
Some members of the panels wanted customers to more fully recognize the value in sharing their location via a social platform. I can see the benefits to users of the data; it was amazing to see the outline of common maps reveal themselves not through traditional boundaries but rather through social activities—outlines of cities, airports, etc. emerged as people Tweeted. The panelists didn’t seem to share some of the anxieties I had about sharing my whereabouts in real-time. Issues of safety and cyber-bullying can and should influence what people share online. However, I liked the idea of using imagery to guide discovery and finding someone on say, something like Tumblr, with a similar aesthetic to encourage that connection.
We Do Have Some Standards Around Here, You Know
This was the first year, where I heard the admission that social does not have the same standard of measurement as say TV advertising, print ads, etc.. This wasn’t the familiar beat of the ROI drum but rather a recognition that we need to, as an industry, better define the value of social. To date, we don’t have a verifiably mature model that clearly defines what comprises that value. We don’t have a clear idea of when engagement matters most and how to attribute that activity. But honest conversations are beginning and everyone seems to recognize the importance to sales, marketing, HR, etc. to answer these questions.
Millennials vs. Digital Behavior—Which One Truly Matters
I have to admit this topic really intrigued me and I was excited to learn the digital characteristics of this generation. I don’t know if the resulting information was meant to make us all feel better (read: younger) but some of the panelists felt that generations should be segmented along the lines of digital behavior over age. Susan Etlinger suggested that we’ve been using demographic behavior as a proxy for categorizing customers and it’s losing its value. It’s certainly true that using the blunt instrument of age to determine a person’s online social persona may omit a lot of detail but with each succeeding generation the use and proliferation of online tools can’t be entirely overlooked. Susan certainly wasn’t minimizing the influence of social technology broadly across generations but that we should perhaps adjust our lens to include more than just demographics to segment an audience.
In the two days, I met some great people, discovered that everyone is facing very similar changes and that it’s never been more exciting to be involved with Social Data. Learn more about the Boulder Initiative here and the Big Boulder conference here.
Tags: Big Data, social media, technology
Wi-Fi roaming is often a tumultuous subject. The crux of the issue is, with Wi-Fi the roaming decision is left to the client.
In the recent years, there have been great strides in improving Wi-Fi roaming with the creation of standards-based roaming technologies. Cisco first pioneered fast roaming many years ago with CCKM (Cisco Centralized Key Management), which was the foundation for 802.11r. 11r which was ratified by the IEEE in 2008, allows for fast roaming, even on a secure 802.1X SSID. With 802.11r it is possible to roam without disruption during a voice or video call.
While client support of 802.11r is largely lacking in the laptop space, there is large support in the smartphone realm. Apple iOS devices have supported 11r since iOS 6 (http://support.apple.com/kb/HT5535). The recent Samsung smartphones, such as the Galaxy S4, S5, and Note 3, also support 11r.
Note: Some non-802.11r clients can react adversely when connected to an 11r WLAN. The current recommendation from Cisco is to have a separate WLAN for 802.11r clients.
802.11k is another amendment from the IEEE that helps to improve roaming. 802.11k provides a whole slew of information to the client, which allows the client to understand the RF environment and make an informed roaming decision. This information can include channel load and AP neighbor lists.
11r and 11k help, however, that does not mean the infrastructure is irrelevant in the roaming picture. With the help of a model train, we did some testing to figure out just how much impact the infrastructure could have. We compared Cisco to one of our competitors, whom we will call Vendor A.
This video summarizes the results and shows the train in action, or continue reading for more details:
Read More »
Tags: 11r, 11x, 802.11, 802.11k, 802.11r, 802.11x, access point, AP, channel, channel load, client, dbm, device, infrastructure, rf, roam, roaming, roaming decision, RRM, SSID, standards, statistic, technologies, technology, transit power, video, Voice, wi-fi, wifi, wireless, wlan
With its fast-growing economy, India faces significant challenges in meeting the energy needs of its population and industry. And given the growth of the renewable energy sector, the Indian Renewable Energy Development Agency (IREDA) was established in 1987 to promote, develop, and extend financial assistance for projects involving renewable energy generation, energy efficiency, and conservation. IREDA recognized the need to optimize use of its resources and leverage technology advances to better serve its constituents.
To improve the efficiency of its increasingly complex operations, IREDA sought to replace its aging heterogeneous campus network infrastructure with a scalable, unified solution. Key requirements included superior reliability and security as well as energy efficiency to foster the agency’s values while providing cost savings. There was an immediate benefit in lowering network energy consumption and the network would be the tool to both help ensure the security of confidential information and provide high performance for applications such as video.
How did this renewable energy agency approach deploying a network that would be scalable and power resilient while optimizing network efficiency? Click to read the full blog
Tags: Cisco, confidential, Energy, financial assistance, india, ireda, midsize, network, performance, project, reliability, renewable energy, security, switch, technology