mobility

March 31, 2014

NETWORKING

BYOD helps boost creativity and sales for family-owned midmarket furniture manufacturer.

2 min read

Vitra is a renowned for producing quality furniture. Their designs are well known for innovation and style. What makes Vitra unique is that they not only encourage creativity from their employees but they also invite visitors to participate in their creative process. Vitra is headquartered in Switzerland and their flagship store, Vitrahaus is located in […]

March 26, 2014

PARTNER

Cisco Mobility Gives Partners the Keys to Create Customized and New Experiences and Drive Customer Traction

4 min read

First and foremost, I want to thank you for being a valued business partner. You are a top priority for us at Cisco and an extension of our sales team. If you’re attending Cisco’s Partner Summit event in Las Vegas this week, our goal is for you to gain valuable insight into new opportunities that […]

March 26, 2014

NETWORKING

Beyond BYOD to Workspace Mobility

3 min read

Today I’d like to share some thoughts on Cisco’s approach to Business-to-Employee (B2E) mobility and draw attention to today’s mobility announcements. After more then ten years working on the amazing roller coaster called Cisco Data Center, most recently leading marketing for our desktop virtualization solutions, I was looking for something different and equally exciting to […]

Ask The #IoE Futurist: “In an Internet of Everything World, Will the Smartphone Become Superfluous?”

3 min read

In my role as Cisco’s Chief Futurist, I get many questions about what the future holds and how new technology and emerging solutions will change our lives. Given the positive feedback and the volume of questions being submitted from the community around the first series, I’ve decided to do another series to answer questions from […]

March 18, 2014

NETWORKING

Summary: Navigating Security Threats in a Mobile World

1 min read

Security plays an important role in the success of mobility implementations worldwide. We assume security threats are always present, however it’s not always apparent where threats may arise from....