The annual Passenger Terminal EXPO is underway this week in Barcelona. The event provides a powerful international platform for the airport and airline sectors to interact and share common issues, goals and solutions about the airport industry, with a particular and unique focus on the terminal.
Cisco’s partner SITA has a very strong presence at the event with various speakers on the industry trends as well as booth and demos. One of these is the iFlow platform which uses Cisco’s MSE as a core component.
The Airport industry is one of the most researched industries with very solid and proven metrics and clear ROI measures. Some interesting statistics recently reported include:
Airport IT Investment trends:
- IT spending in Airports has grown by 12% CAGR since 2010,
- with IT spend in Airports in 2013 representing 5.43% of their revenues (up from 4.9% in 2012)
- 90% of Airport CIO’s (or technology chiefs) expect further increases in 2014 and beyond. Read More »
Tags: ad, airport, analytic, cmx, connect, connected mobile experiences, experience, expo, hospitality, Industry, location, location-based, mobile, mobility, operations, passenger, satisfaction, SITA, terminal, travel, trend, wi-fi, wifi, wireless
As more and more 802.11ac devices come to the market this year, businesses need to make sure the best possible 802.11ac wireless infrastructure gets deployed to make sure those 802.11ac end points are performing at both the best possible data rates and application throughputs to maximize the move to 802.11ac.
Cisco’s Aironet 3700 with HDX Technology does just that. If you’re thinking that the 3700 is just another 802.11ac AP, think again: not all 802.11ac AP’s are created equal.
To demonstrate this, let’s take a Cisco 3700 access point..
When you open a Cisco AP, you will see dedicated memory (RAM) on the radio chipset itself (one on the 2.4 GHz radio, another on the 5 Ghz radio) to ensure the RF packets get processed “onboard” each radio instead of “offboard” in order to reduce latency and any packet processing collision from memory contention on the AP. Additional packet processing can be handled on the “offboard” memory that is part of the network processor portion of the AP platform as well. This unique, innovative ASIC-based Wi-Fi chipset by Cisco exemplifies the built-for-Purpose design, and is the hallmark of Cisco’s 3700 Series AP.
Contrast this with the competitive landscape that claims to be Purpose-Built, but in reality is leveraging off-the-shelf merchant silicon-based 802.11ac WiFi chipsets. Read More »
Tags: 11ac, 11n, 2.4 GHz, 802.11, 802.11ac, 802.11n, access point, aggregate throughput, AP, application, ASIC, built-for-purpose, chipset, Cisco, client, ClientLink, collision, data rate, GHz, HDX, infrastructure, latency, maximum, mbps, memory, memory contention, network, network processor, offboard, onboard, Packet, packet processing, performance, purpose-built, radio, RAM, rf, scale, silicon, smartphone, tech, technology, throughput, wi-fi, wifi, wireless
SES ( soon to be called ClickZ) hosted a Digital Marketing Conference in Jakarta this week which is the meeting point for digital marketing and advertising professionals in the AP region.
Here the latest mobile marketing trends, best practices, new technologies have been discussed and presented, including Cisco’s CMX capabilities as part of meet the experts session called “Context marketing using Wifi location services”.
Some interesting observation and ideas being discussed include:
Multi-Channel Attribution modeling:
While online marketing investments are more measurable compared to conventional media such as television, however tracking what leads to sales conversion is becoming increasingly complicated.
The simple measures of last click or first click attribution are not fully meaningful to represent today’s omni-channel ultra-connected consumer. Therefore it’s not surprising that multi-channel tools and attribution modeling are one of the hot topics in digital analytics.
Data to underpin a successful digital marketing strategy:
Increasingly consumers are connected all the time – and with that every day around the world, connected consumers are being wooed by offers of better prices, better deals and better service.
How can marketers compete…often the only defence they think they have to fire back at competitors is to match those deals and price cuts.
However data is key, as more information about customers becomes more plentiful and more detailed, and as customers become more interactive with the companies they buy from, the competitive marketing landscape is becoming radically different. For many advanced organisations it is using data to deliver insight and analysis gives them a competitive edge to keep ahead of the pack. Read More »
Tags: analytics, attribution, best practice, click attribution, clickz, Conference, consume, content, context, conversation, crm, customer, digital, engagement, Industry, jakarta, location, marketing, mobile, mobility, model, multi-channel, network, omni-channel, purchasing, relationship, ROI, sales, services, SES, technology, trend, wi-fi, wifi, wireless
Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from. Being aware of these potential risk areas is crucial.
Business decision-makers must gain insight into where these breaches are occurring. They should also understand why it is important for them to care, and how they can be aided by technical decision-makers to solve these issues moving forward.
Here’s a brief look into the where, the why and the how of embracing a secure approach to enterprise mobility and what it means for business leaders.
Where are security threats? Today’s organizations are facing a greater attack surface as advanced mobile devices and public cloud services foster new attack models and increasing complexity within networks. To cover the entire attack continuum, organizations need to address a broad range of attack vectors with solutions that operate everywhere the threat can manifest itself: on the network, on traditional endpoints, on mobile devices, and in virtual environments.
How can threats be thwarted? The best approach is a proactive one, rather than a reactive one, especially when many organizations may not know when they are under attack. Business leaders must work with IT teams to institute a formal program for managing mobile devices and to ensure that any device is secure before it can access the network.
Why does a balanced approach to mobile security matter? In a recent blog post, I discussed the need for organizations to deploy a balanced approach to mobile security. This approach should focus more on protecting the network and proprietary data and less on implementing overly broad restrictions. IT needs to approach security with a user experience mentality. After all, if you overly manage devices, your adoption will be low and so will your return on investment (ROI). This approach can lead to greater opportunities to align threat intelligence and security best practices.
To learn more about this balanced approach to mobile security, read the full blog: Navigating Security Threats in a Mobile World.
Tags: architecture, Cisco, future of mobility, infrastructure, mobile, mobile device, mobile security, mobile workspace, mobility, network, security, wi-fi, wifi, wireless
Cisco has been placing a lot of emphasis on delivering solutions that provide insights and understanding on how customers, patients, visitors and communities interact with their physical environments. Mobility and leveraging mobile devices in the environment has revealed itself as a very powerful way to gather critical business intelligence. This business intelligence is highly impacted by the resolution of the location-data and the demand to improve resolution and accuracy is increasing quickly. Apparently, this has not been missed by UBM. This year Cisco is honored to be selected as a Best of Interop Finalist for the Wireless award category for our innovations in improving location data resolution calculations.
It’s an honor to be recognized for our innovation and technological advancements in wireless, and we wanted to share a bit more about our submission with you.
What are Location Data Resolution Calculations?
Many systems acquire location analytics by relying solely on the probing that occurs from a mobile device to an access point. Unfortunately, this approach is delivering diminishing returns. It puts location analytics at the mercy of the mobile device vendors. What I mean by this is that as mobile device manufacturers look to improve mobile devices in regards to OS, drivers and battery life they are reducing the frequency of the probing from the mobile device. In addition, different mobile device manufacturer use different probing intervals. The need to do this makes sense from the mobile device manufacturer perspective, but it has an impact on the accuracy of the data acquired when representing movement of end users in the physical environment. If a user is recognized when they walk in the environment and then is identified a minute later, there is a lot of movement that can occur in that time. But the analytics only sees two data points and draws a straight line. Not a very accurate representation.
Cisco is leveraging what we know best, the network, to supplement the device probing. Bringing in network data allows us to gather higher data resolution regarding mobile device movement, equating to a more accurate representations of end user movement in the environment.
Why is This Important? Read More »
Tags: access point, accuracy, analytic, AP, battery life, data, device, driver, granular, interop, interval, location, mobile, movement, network, OS, Packet, probe, probing, resolution, rssi, Scalability, scale, wi-fi, wifi, wireless