Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT

MWC14 will be rife with new announcements about the future of the mobile networks. The theme of the show "Creating What is Next" screams of the innovations in line for the next decade, 2020 and beyond.

 

I am going to throw my hat in the ring and explain how Juniper's Hi-IQ Networks vision will transform the mobile networks of the future ... 

 

Hi-IQ Networks.jpg

Read more...

Having previously foiled the dark plot of the “Empire”, let us look at what the Jedi knights at Ericsson are up to these days. They deserve the title of Jedi as for last 20+ years they have been busy keeping the order in our mobile galaxy by fighting at forefront against the evil plots of the “Empire” and other separatists.

 

Their recent innovation, the indoor small cell system, named “Dot”, has seen mixed reaction from friends and foes. Even though the architecture can be called the classical closed system from the radio heads, it looks way better than the “Hyper Dense HetNet” proposed by the Imperial army generals, I mean visionaries.

 

Dot system.png

Read more...

pcrowcombe

Lotus F1® Team Builds the Best with Juniper Networks

by Juniper Employee ‎06-27-2013 12:55 AM - edited ‎06-27-2013 07:55 AM

As the Formula 1 season enters the critical phase of back-to-back European races the Lotus F1 Team is busy upgrading and enhancing the network infrastructure at its Enstone Technical Centre, in Oxfordshire England. Next year the FIA, F1’s governing body, introduces new rules, radically changing the 2014 cars. All the F1 teams face a technical challenge to be competitive in 2014 and information technology will play a critical role in the success of each team. In response to this challenge the Lotus F1 Team decided to build the best with Juniper Networks

 

The Enstone Technical Centre is the hub of the Lotus F1 Team and this was the scene in March 2013 when 14 pallets of Juniper equipment arrived ready to transform the team’s complete network infrastructure. The first phase of what will become an end-to-end Juniper network went live in March with Lotus F1 Team benefiting from one of the best security and remote access solutions in Formula 1.

Read more...

When determining which vendor to choose for your next Wireless LAN project, there are many requirements to factor in, before making a decision:

 

  • Who can offer the best price?
  • Who is most advanced in their support of the new 802.11ac standard?
  • Should I go for a cloud based solution or my own controller?
  • Which vendor has the best performing Access Point?
  • Who has the most features in their WLAN controllers?

 

While these are all relevant factors to consider, none of the above would come top of my list. Here’s why:

Do you remember the term “offline”? The state that you (or rather your computer) was in, when not connected to the internet? If so, you have just identified yourself as an adult with many years of internet experience. Personally, I suddenly felt old a couple of years ago, when it occurred to me, that my teenagers at home couldn’t quite grasp the concept of “being offline”.

Read more...

Gilles

TAMING THE MOBILE FRONTIER

by Gilles ‎05-06-2013 06:32 AM - edited ‎07-23-2013 03:44 AM

Like the Wild West of the 1800s, today’s campuses are becoming lawless places. Employees and visitors roam free armed with multiple devices, user owned and company supplied, and expect to connect to the corporate network, wherever and whenever they want to.

Read more...

Trust.

 

Subjective, emotional, personal yet crucial that it exists for inter-personal or business to business transactions to be conducted on an ongoing basis. 

 

The first curious thing about trust is that in many ways it is not a monetarily expensive thing to establish. It is built on the emotional pillars of integrity, authenticity, and transparency.  Those pillars can and often do take time to establish but once established they provide a strong foundation for that ongoing transactional engagement.

Read more...

As customers, partners and colleagues return home, dispersing across the globe I reflect on a busy week at Mobile World Congress. This is the biggest event in the global calendar for the mobile industry and one of the highlights for me was Neelie Kroes, Vice President of the European Commission’s Digital Agenda, speaking this week to announce a Mobile Action Plan for Europe. The UK has just completed its 4G spectrum license sale and discussions are already underway about 5G across Europe...

Read more...

Gilles

Beyond BYOD – A True Mobile Enterprise Experience

by Gilles ‎06-28-2012 04:31 AM - edited ‎07-29-2012 05:15 AM

Certainly BYOD is on everybody’s lips and is the most common and probably feared concern today. You can read about it in every single publication and blog, and all vendors – including those not associated with the topic which raises question of credibility – claim to have somehow a solution to let personal-owned devices securely accessing the network.

Read more...

Oliver Crofton

Bring Your Own Device (BYOD) presents Opportunities not Issues

by Oliver Crofton on ‎05-31-2012 04:17 AM - last edited on ‎06-11-2012 06:20 AM by Administrator Administrator

A few years ago I had dinner with the CEO of a FTSE 100 company. After about five minutes of the usual pleasantries, he suddenly became very animated about the prospect of showing me his latest toy. He reached into his bag, and with a look of sheer delight on his face, he pulled out an iPad.

 

The conversation that followed involved a great deal of excitement and enthusiasm about how this new device would change the way he does business. After 10 minutes of positively salivating at the prospect of using his iPad for work, he told me that he'd asked his IT director to order 60 immediately for his senior management team, as the firm must be seen to be "leading the market in technology and innovation".

 

Whilst he was talking, my mind wandered to the conversations that would follow his request within his IT team. I could almost see the head scratching and endless diagram sketches, with all hands on deck trying to understand how to make the requested device fit in with the standard corporate network.

Read more...

Nushin

Security and the Bring Your Own Device Trend

by Nushin ‎05-14-2012 09:17 AM - edited ‎05-14-2012 09:21 AM

This is a guest blog post. Views expressed in this post are original thoughts posted by Nushin Hernandez, Analyst at Canalys.


The survey results of Juniper Networks’ Trusted Mobility Index have highlighted just how pervasive the Bring Your Own Device (BYOD) trend really is. Looking at the mobile device market – according to Canalys estimates worldwide smart phone shipments grew approximately 63% last year, similarly pads or tablets have seen rapid adoption, up a staggering 274% by the end of 2011. Smart phones and tablets in particular, which have conventionally been viewed as consumer devices, are increasingly making their way into corporate environments and businesses around the world are now faced with the challenge of managing a growing mobile workforce using multiple devices and multiple operating systems with increasing data consumption. These mobile devices can no longer be categorised as simply corporate or consumer. The number of personal-liable devices has grown considerably over the last year. Canalys estimates the number of personal-liable smart phones will grow at a compound annual growth rate of about 43% from 2011 through to 2015.

Read more...

So today saw the launch of Juniper Networks’ Trusted Mobility Index research and findings. We held an exclusive breakfast meeting with selected journalists to hear the findings of this research in London this morning.

 

Penny Still introduced the session and set the scene and agenda. She highlighted that the research combined theories and best practices about Trusted Mobility and gave a short summary on how the research was conducted with over 4,000 respondents interviewed in US, UK, Germany, Japan and China.

 

Today’s speakers at the event included;

 

• Nushin Hernandez, Analyst, IT Security Analysis and Mobile Security Analysis Services, Canalys
• Paul Gainham, Senior Director, Marketing, EMEA, Juniper Networks
• John Smith, ICT Network Manager, Settle College
• Oliver Crofton, Ethical Hacker, Vigilante Bespoke

Read more...

There is a mildly humorous saying amongst the acting fraternity that you should never work with children or animals, the inference being that they are likely to do unpredictable things at the most inappropriate times.  In marketing that saying translates to never ask end users opinions on anything because they either tell you things you don’t want to hear or come back with comments you were not expecting.

Not strictly true of course and said a little tongue in cheek but as we looked through the results of the Juniper Networks Trusted Mobility Index report, there were some real surprises.

Read more...

I am pleased to announce the details of Juniper Networks’ upcoming Twitter Chat.  We will be hosting a Tweet Chat on 9 May at 11am (BST) with Oliver Crofton, Ethical Hacker, Vigilante Bespoke and Paul Gainham, Senior Director Solutions Marketing EMEA, Juniper Networks. The theme of the chat will be mobile device security, threats and how you can secure your device and network.

 

Anyone can participate, so please do join the chat on 9 May at 11am (BST).  All it takes is to log into Twitter, follow the hashtag #mobilechat between 11am and 12 noon (BST) and join in the conversation by adding a question for Oliver Crofton and or @PaulGainham. Note that the chat will be hosted from @Juniper_UK, with various moderators. If you want to submit your mobile security chat question before the event, then please direct message either @Juniper_UK or @ZoeSands.

 

I look forward to seeing you on Juniper Networks’ tweet chat - follow #mobilechat.

Read more...

About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.