Tags: access, branch, byod, Cisco, cloud-managed, customer, interoperability, interoperable, ISE, main office, Manage, management, meraki, network, on-premise, policy, product, security, segregated policy management, single user, solution, webinar, wi-fi, wired, wireless
Technische Universität Darmstadt, usually known as TU Darmstadt is a research university based in Germany. It was founded in 1877 and over the last 137 years has grown to be among the largest and most prestigious public universities in Germany serving over 25,000 students per year. It is the alma-mater to many world-wide leaders from Nobel prize winners, a CEO of a fortune 500 company, a president of a country and multiple World Robocup champions.
No wonder, they have a reference from Albert Einstein!
In 2009 TU Darmstadt embraced BYOD with the 5508 Series Controller managing the 1140 802.11n Access Points. Recently we talked to Thomas Vogel, the Head of Network Group and Andreas Liebe, the Network Services Manager who have over 15 years of experience managing WLAN environments. In this blog, we will describe some of the details of WLAN deployments using the 3850 Series Switch and the 5760 Series Wireless LAN Controller to address the new requirements in the school environment. Read More »
Tags: 3850, 5760, 802.11, 802.11ac, 802.11n, access, access point, account, AP, App, application, authorized, AVC, bring your own device, buildings, byod, Cisco, client, controller, Converged Access, darmstadt, deployment, devices, employee, encrypted traffic, environment, frankfurt, Germany, infrastructure, IPv6, LAN, management, network, policy, prime, Prime Infrastructure, requirements, research, school, security, services, standard, switch, technische, technology, trend, TU, TUD, unified access, Universität, university, user, visualize, wi-fi, wifi, wired, wireless, wlan
This two-part blog series discusses the future of wearables and mobility in an #InternetOfEverything world.
Check out the first post of this series that discusses why contact, connections and context will drive the next generation of wearables.
When 24-year-old Jason Barnes lost part of his arm in an electrical accident, he also lost the ability to drum. Thanks to engineers at Georgia Tech, he now has range with his artificial hand that is impossible with a normal human hand. Arguably, now he has new capabilities that other musicians don’t have – all because of an incredibly advanced replacement part.
If you consider how wearables may evolve, we may see a time where people take a perfectly good limb, eye or ear and replace it with something synthetic because it gives them a skill that they haven’t had before. Perhaps it gives a solider infrared vision at night or a baseball pitcher a robotic arm that throws a perfect game.
These new capabilities will propel us into a new phase of human history – this period of self-designed evolution. As the power of Internet of Everything (IoE) technology merges with biology, we can create a self-evolving population. Let’s take a step back and look how this has developed over time.
How it Began
If you look back throughout human history, we’ve always adorned ourselves with some kind of capability. Usually it’s because we want to differentiate ourselves or show status or an association with a tribe or group. This has traditionally been accomplished through wearing jewelry, getting tattoos or piercings and so on. Today, we’re beginning the wearable phase and it’s about smart watches, glasses and jewelry, but tomorrow will bring the era of embeddable technology.
Tags: Ben Waldron, Brain machine interfaces, Cisco, Cochlear implants, Dave Evans, future of mobility, Future of Mobility Podcast, Futurist.com, Glen Hiemstra, Internet of Everything, internet of things, IoE, IoT, Jason Barnes, mobility, PillCam, wearable, Wearables, wired, WIRED Innovation Insights
We live in amazing times, ask anyone who ever had to look up a phone number in a phone book. In the past this was the only way you could find the number to your favorite restaurant if you wanted to make a reservation. Today, all we need to do is reach into our pocket or purse and grab our mobile device, open an application and in a few seconds (not minutes) we have the phone number. Not only that, but we can see the menu and make a reservation right from the device. Over time we have become dependent on carrying the world (both personal and professional) in our pocket. With mobility, we are always on, always connected: nothing—whether it’s your team’s latest score or that email from a vendor you need to send to your boss—is more than a quick search away.
What once seemed unfathomable, this way of always being connected is now commonplace. However, as the application developers sit and think of the next killer app, the IT team has to make sure the network can not only support this new app, but also assure the performance meets the higher and higher demands of new apps. This requires the network to be more application-aware. And the reality is that more applications that require higher network performance are coming at a faster rate. Add to it new devices that use these applications are becoming accessible to everyone. On top of that, the people that use these applications and devices are becoming more demanding in terms of reliability and experience. So what is an IT person to do?
“We were ahead of the times,” says Joseph Tufano, VP and CIO of St. John’s University. “But times have changed. You see it everywhere: for example, if you go to a basketball game on campus, and there’s a timeout, everybody is using their mobile devices.”
IT is always working to increase the wireless performance of the network. However, as more bandwidth becomes available, users increase their usage and consume that bandwidth. Read More »
Tags: #80211ac, 802.11, 802.11ac, access point, App, application, bandwidth, campus, data, data rate, density, design, device, environment, gigabit, healthcare, infrastructure, IT, mobile, mobility, network, performance, standard, wi-fi, wifi, wired, wireless
Security concerns around cloud adoption can keep many IT and business leaders up at night. This blog series examines how organizations can take control of their cloud strategies. The first blog of this series discussing the role of data security in the cloud can be found here. The second blog of this series highlighting drivers for managed security and what to look for in a cloud provider can be found here.
In today’s workplace, employees are encouraged to find the most agile ways to accomplish business: this extends beyond using their own devices to work on from anywhere, anytime and at any place to now choosing which cloud services to use.
In many instances, most of this happens with little IT engagement. In fact, according to a 2013 Fortinet Survey, Generation Y users are increasingly willing to skirt such policies to use their own devices and cloud services. Couple this user behavior with estimates from Cisco’s Global Cloud Index that by the year 2017, over two thirds of all data center traffic will be based in the cloud proves that cloud computing is undeniable and unstoppable.
With this information in mind, how should IT and InfoSec teams manage their company’s data when hundreds of instances of new cloud deployments happen each month without their knowledge?
Additionally, what provisions need to be in place to limit risks from data being stored, processed and managed by third parties?
Here are a few considerations for IT and InfoSec teams as they try to secure our world of many clouds: