So here I am, at a customer event in San Francisco, at an outdoor restaurant (yes, I’m cold). Today we’ve been talking a lot about mobility – mobile devices (around 3 per person here today), how to extend access to corporate resources to employees or students or patients wherever they connect, how to manage BYOD. No one is questioning whether this needs to happen, we have all moved on to HOW to make it happen, how to manage it, how to make it easy for users.
I’ve brought along my personal iPhone on 4G that I also use for work, and I’ve logged in to Cisco Jabber to stay connected while away from my laptop. I’m just wondering if my manager has answered a couple of key questions for me when my phone buzzes in my pocket. She is IM’ing on Jabber. Where is she? Well, you wouldn’t know it, but she is on a flight from San Francisco to New York. Her company-owned laptop is connected using in-flight Wi-Fi, and she’s using WebEx Connect on her laptop.
What’s it called when a mirror reflects a mirror with infinite reflections, or a person holds a picture of themselves holding a picture? That’s what this is — we are doing the same thing that we’re talking about. We are working outside on the ground using 4G, and inside in the air using Wi-Fi, talking about mobility. We are linked to corporate email and UC (Unified Communications) tools, and using AnyConnect VPN to access more sensitive information, regardless who owns the device, or whether it’s Windows or iOS or Andriod, or which access network or physical location. In the sky or earth-bound city walker – we’re connected. And talking about it.
What’s the most outlandish connection you’ve had? Any mobility Escher moments of your own? Share with us on Twitter or Facebook.
802.11ac: The Fifth Generation of Wi-Fi Technology
In the last few months, there have been a lot of written on the emerging 802.11ac standard. This next generation of Wi-Fi promises to be very exciting since 802.11ac will address some critical pain points faced by users of 802.11n today – more bandwidth and more simultaneous users. To help explain the technology, we put together a new Fundamentals video. You’ll learn about new features such as:
- Operating in the 5GHz band
- Wider channels (80MHz & 160MHz) which means more capacity in the band
- Increased modulation with 256 QAM (Quadrature Amplitude Modulation), providing a significant increase in throughput over 802.11n which has 64 QAM
- Downlink Multi-User MIMO which allows an AP to transmit to multiple clients simultaneously
- Up to 8 Spatial streams which doubles the number of spatial streams used in 802.11n
Read More »
Tags: 802.11ac, 802.11n, byod, mobility, mu-mimo, wlan
Until now, it’s been assumed that enterprise IT leaders probably view the current BYOD (“Bring Your Own Device”) movement with about the same enthusiasm as a farmer awaiting the next locust invasion.
A recent survey from the Cisco Internet Business Solutions Group (IBSG), however, indicates that BYOD may no longer be a “four-letter word” in enterprise IT departments. In fact, the study of 600 U.S. enterprise IT leaders—all from companies of 1,000 or more employees—shows that, if anything, BYOD now has a predominantly positive reputation in U.S. enterprise IT circles. Read More »
Tags: Bring your Own Device (BYOD), Cisco, devices, Horizons, IBSG, IT, leaders, mobile, mobility, research, security, support, survey
As I flew home from Interop Vegas the other night – quick side note: the event was great, check out an overview and a few fun TechWiseTV Videos: Keynote from Padma Warrior , Managing Beyond BYOD, Is Your Network Ready for Cloud? - I realized that my kindle was not accessible, my laptop was dead and I’d already read the in-flight magazine. Given the close quarters of the commuter plane, I decided it would be okay to peek at what my neighbor was reading. As I glanced over, he turned to an article with a headline that screamed “It could happen to you!!” I then noticed it was a combat handgun magazine and decided I would give him some space.
With no reading materials, I started thinking about all of the situations that we as individuals and as organizations get into that feel secure, but which can actually be quite threatening. Those are the situations that make having insurance worthwhile. When it comes to security on the wireless network, nobody expects hackers and rogue attacks to infiltrate their network, but all of the smart network managers prepare for it anyway.
Read More »
Tags: aWIPS, mobility, mse, rogue detection, security, WIPS, wireless, wireless attacks, wireless security
By Peter Gaspar, Consulting Systems Engineer, Service Provider Mobility, Emerging Theater
It’s not new news that when it comes to network access, Wi-Fi technology is a cost-effective complement to macro radio access. Industry blogs continuously feature analysis about the economic advantages of using Wi-Fi as a small cell technology. No surprise, then, that many mobile operators have completed or are working seriously on plans to integrate this technology into their mobile ecosystems.
But when it comes to details, things start to get confusing. Terms like policy and charging, lawful intercept, mobility and SIM authentication start to pop up. The Third Generation Partnership Project (3GPP) has incorporated Wi-Fi (non-3GPP IP Access) as part of the LTE architecture, created the terminology and studied the Read More »
Tags: architecture, data offload, mobile, Service Provider, wi-fi, wifi