We live in amazing times, ask anyone who ever had to look up a phone number in a phone book. In the past this was the only way you could find the number to your favorite restaurant if you wanted to make a reservation. Today, all we need to do is reach into our pocket or purse and grab our mobile device, open an application and in a few seconds (not minutes) we have the phone number. Not only that, but we can see the menu and make a reservation right from the device. Over time we have become dependent on carrying the world (both personal and professional) in our pocket. With mobility, we are always on, always connected: nothing—whether it’s your team’s latest score or that email from a vendor you need to send to your boss—is more than a quick search away.
What once seemed unfathomable, this way of always being connected is now commonplace. However, as the application developers sit and think of the next killer app, the IT team has to make sure the network can not only support this new app, but also assure the performance meets the higher and higher demands of new apps. This requires the network to be more application-aware. And the reality is that more applications that require higher network performance are coming at a faster rate. Add to it new devices that use these applications are becoming accessible to everyone. On top of that, the people that use these applications and devices are becoming more demanding in terms of reliability and experience. So what is an IT person to do?
“We were ahead of the times,” says Joseph Tufano, VP and CIO of St. John’s University. “But times have changed. You see it everywhere: for example, if you go to a basketball game on campus, and there’s a timeout, everybody is using their mobile devices.”
IT is always working to increase the wireless performance of the network. However, as more bandwidth becomes available, users increase their usage and consume that bandwidth. Read More »
Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers for managed security and what to look for in a cloud provider can be found here.
In today’s workplace, employees are encouraged to find the most agile ways to accomplish business: this extends beyond using their own devices to work on from anywhere, anytime and at any place to now choosing which cloud services to use.
Why Bring Your Own Service Needs to be on Infosec’s Radar
In many instances, most of this happens with little IT engagement. In fact, according to a 2013 Fortinet Survey, Generation Y users are increasingly willing to skirt such policies to use their own devices and cloud services. Couple this user behavior with estimates from Cisco’s Global Cloud Index that by the year 2017, over two thirds of all data center traffic will be based in the cloud proves that cloud computing is undeniable and unstoppable.
With this information in mind, how should IT and InfoSec teams manage their company’s data when hundreds of instances of new cloud deployments happen each month without their knowledge?
Additionally, what provisions need to be in place to limit risks from data being stored, processed and managed by third parties?
Here are a few considerations for IT and InfoSec teams as they try to secure our world of many clouds:
We live in a world of many clouds, clouds that are as unique as we are. Today’s IT leaders are helping organizations manage the new demands of rapidly changing business requirements and the delivery of innovative services, all due to the rise in cloud adoption.
“How the Cloud is Changing the Role of Technology Leaders” by Michael Beckley via WIRED Innovation Insights
Yet, according to a recent Wired article, the advancement of cloud computing is also redefining the roles of the CIO and the CTO. An IT leader’s job is becoming more complex as they work to navigate the influx of user-provided devices and ensure consistent performance, security and control across the infrastructure. How can IT leaders continue to offer value to their organizations through a strategic approach to cloud technologies?
There is no one-size-fits-all solution to cloud deployment. IT leaders need to become a broker of change for cloud. They must be empowered to create the right cloud strategy for business needs, support line of business requirements and meet IT demands across disparate clouds without sacrificing security or performance.
If you’ve worked on a K-12 wireless network, you’ll know that one of the main customer careabouts is adapting to Common Core Standards. Online testing and BYOD places even higher demands on a high quality, high performing network. What exactly needs to be taken into consideration when designing these networks?
Join us tomorrow Wednesday, February 5 for a great, informational webinar packed with tips and tricks on how to design K-12 networks to optimize for Common Core. If you work in education IT or are a partner or network consultant that handles lots of K-12 school district deployments, this is the webcast for you. We’re starting at 10am PST and will run for about 45-60 minutes--and there’ll be a chance for you to ask questions directly to Cisco engineers.
What do IT and K12 Common Core Standards have in common? Forty-five states, the District of Columbia, four territories, and the Department of Defense Education Activity have adopted the Common Core State Standards. 100% of each of these states’ schools must update their network infrastructure to support the mandated online testing capabilities. Enter district IT.
Technology is a key component when it comes to achieving the objectives of these standards. The objective is to augment the learning experience through the use of wired and wireless devices and enhance skills such as communication, collaboration, research, critical thinking and tackling problems. The mandate is computer based assessments. This promotes more personalized leaning. The students are also acclimated to use technology effectively for productive life activities in the future.
The combination of common core standards adoption with BYOD or 1:1 initiatives, results in an exponential growth in addressing endpoints, bandwidth, and security. Schools are looking to upgrade their existing networks to be able to handle the current and future requirements of these standards.