Image Title

Search Results for WiFi Connexion:

Masum Mir and Greg Dorai, Cisco


 

>>Mm. Okay, we're back. Digging into the infrastructure to make hybrid work possible. High performance, cost effective, scalable and secure. That's what it's all about. So far, we've covered the rapid migration to WiFi 60 technology and the role that switching is going to play. And now we're gonna get into private five g to do that. Let's welcome Masumi here. Who is vice president and general manager of mobile cable and the Iot business at Cisco and Greg Dorey, who is the vice president of product management for the networking experiences group of Cisco. He's responsible for Catalyst access that whole portfolio enterprise five G Cisco DNA spaces, Cisco, Iasi A lot of stuff there. Uh, Greg gentlemen, welcome, >>Dave. Thank you for having us. >>Yeah, our pleasure. So let's start with you on the topic of private five g five g. What do we need to know about that? And more specifically, you know what's unique about Cisco's private five G? >>So, most importantly, delivering private five G in enterprise terms that's super important to look at five p. Many of our peer groups might have got it wrong. We're looking at private five g with the lens of enterprise. What enterprise really needs is five g going to come and displace a lot of existing technology? Or is it going to help augment the technology that enterprise has an excellent Their digitisation is you need. I wanted to start Dave with the basic premise of hybrid work, and what hybrid work really means. Is it only for knowledge worker or is it for all workers? So we strongly believe hybrid work needs to empower all workers. It's not only connecting remote workers but also bringing people things and space together. And I strongly believe the combination of WiFi six n five g for private network is going to accelerate that journey, bringing people things and space together in a very, very cohesive way. Why are our offer is so unique? We are going to create a continent. Enterprises don't have to make a hard choice. They will be using WiFi technology and five G technology hand in hand without creating a disruption on their policy and identity systems. They don't have to rethink. Do I have to go and build a new background is a common background that will support both WiFi as well as five t Most importantly, delivering this enter offer as a service with the ease of consumption is of operation and trusted environment that they can put their mission critical workloads on. >>I like it. So couple takeaways there are inclusive of all workers, not just knowledge workers non disruptive. Everybody loves to hear that. And of course, the as a service model is key. So let me stay with you. I mean, we can't wait for five g, right? It's lightning fast. They've got super low latency, very high bandwidth. So that's what everybody is excited about. The question, though, is is five g gets introduced. You know it's going to power things like Coyote Networks. Is that going to replace WiFi and legacy Wired broadband? >>Absolutely not. So we see private five years, an augmentation to the enterprise on top of WiFi WiFi. As you heard in the previous conversation, WiFi is bringing more capability with WiFi six and WiFi 16 and five G is going to be yet another augmentation. WiFi and fight. The will coexist within enterprise for many years to come. I would like my friend Greg to talk a little bit about this continuum. Greg. >>Yeah, I think it's sort of like I like to say it's an and not an AR because there's enough use cases out there. Richard Pryor Spectrum And you know, spectrum >>is a constraint, so >>you have private five G, your WiFi six and both offer opportunities. So, for example, in an indoor carpet setting where you're basically connecting your phone for basic browsing or connecting your laptop, WiFi is sufficient. But if it's a process automation, uh, factory where you need seven nines of reliability, private five g is a better technology. Similarly outdoor large areas. It's probably private. Five g right like this, you can have easy handoff between public and private, so it's use case driven, and once it's used case driven, it's going to be an are because there's so many next time use cases, whether it's a are we are drones, self driving cars, you name it right, like And so I think these two technologies five g and Y 5 60 is gonna work hand in hand to deliver awesome outcomes for our customers. >>Yeah, and just the data volumes are gonna be incredible. We always talk about the data volumes. You ain't seen nothing yet is what I always say. But the thing is, every new tech that's introduced into the enterprise, you can almost be certain that is going to bring adoption challenges. And not only that also is going to bring changes in the way you do things. And that brings new complexities from an operational standpoint. So my question is, how are you addressing this with the introduction of five g. >>Dave, this is a fantastic question, and this is why we have spent me and Greg have spent tremendous amount of time to create continual. I'll start with the foundation first, back down. So we have been building this enterprise backbone, supporting what Wild Connexion as well as WiFi Connexion. We wanted to make sure that as private five G camps within enterprise, you don't have to rethink and reimagine your background is the common backbone that will support both WiFi WiFi six WiFi 60 as well as private five g. You rest assured that it is the same backbone that we have heard in the previous section on the Cap 90 that will also support a private key access. The second aspect of private five G is as you build any new technology into enterprise. Oftentimes we get into this trap to get to an outcome. We move fast and we create asylum. And then that silo operation creates a barriers to mainstream it. So upfront we have to think about not creating another silent and how we're doing it. Number one is a device that can connecting to WiFi network or a private five G network. You don't have to reimagine or rethink how I'm going to manage. The identity will create continue of the common identity across the WiFi access or five t access in the same environment. The second aspect of that is, how are we going to reach in all our staff are enterprise staff is well trained with WiFi technology and white technology. Now five G comes with tremendous amount of value and benefit, but it also comes with inherent technology complexity, learning problems. This is where our simple to consume simple to operate model of sass comes to play. That we're going to take all those complexity away. It is a cloud deliberate service enterprise don't have to go through this massive learning car. Adopting this technology last but not list on how you're going to manage your capital. Any new technology and enterprise, Oftentimes you need a huge amount of upfront investment to adopt the technology to get to the other side of getting the outcome. So again, our business model of SARS will allow Enterprise to adopt this new technology and pay as you go model to meet with enterprise needs. Finally, I also wanted to pass to break to touch a little bit more on how we are thinking about this common identity across any access in the enterprise. Greg to your >>So we we talk about it in two different ways. One is a lot of enterprises today use our identity and secure management platform. We call it Isis Co ice platform. And so years and years of policy and identities Excess service, radio service they use, uh, etcetera are plugged in already into our eyes. Right. So if you can share that with this private five years as a service, uh, infrastructure that Muslims been building, we think we'll be able to create that bridge because we're not forcing enterprises to create new identities, a new policy. So thats sort of step one to make it easier. Uh, you also talk through something where, in the case of a public five g network, for example, the It's very convenient because you take your phone out of your pocket and it's connected to the network, right? Was this for WiFi? You have to log into an S I D in your hotel or in your home and home. It's automatic, but that's that logging process that creates friction. And that's a problem, because then you can't be seamless. So we initiated what we call us open roaming, right? Like that's, uh, identity federation that we first created between identity owners. Could be carriers could be, um, anything that anyone who owns an identity and they will share with venues. And so if the sharing happens, then that Onboarding can be automatic and once on boarding is automatic, then it's easy to pass off between five and five G. And so that's again another way in which you can lower the adoption barriers because you share across public private G and WiFi networks. So these are two concrete examples of how we thought about lowering the barriers of adoption. As we enter into this heterogeneous >>world, >>I can't wait. Let's let's talk about how this thing scales in the go to market, what are the most likely or maybe preferred or obvious routes to market for private five g Francisco >>so they stay tuned when when they announce more about it. But I can also assure you that exposed to the spectrum is a challenge for many enterprises when it comes to cellular technology. In some countries, there are more spectrum accessible by enterprise. In many countries, that's not the case. So we have talked to very carefully that how do we bring this offer to the market? Partnering with many service providers and mobile operators, where in countries where we don't have direct access to the spectrum, our partnership with mobile operators that you will hear more about as we come to mobile world Congress is going to allow our enterprise to consume this technology even if they don't have the spectrum in places where the enterprise might have direct spectrum access. We'll also bring in our relativist providers to hide the complexity of the new technology on top of our cell services or a cloud deliberate services. This is the augmentation with the partnership with menaces providers and mobile operators that will ease this journey for enterprises are most important. Primitive in this journey is to keep it simple for enterprise. Make it intuitive and trust it from day one. >>Outstanding. Okay. Assume, Greg, Thanks so much. It's great to have you guys. I really appreciate your time. >>Thank you. Thank you. Mm mm.

Published Date : Feb 15 2022

SUMMARY :

and the role that switching is going to play. So let's start with you on the topic of private five g five g. Or is it going to help augment the technology that enterprise has an excellent Their digitisation Is that going to replace WiFi and WiFi 16 and five G is going to be yet another augmentation. Yeah, I think it's sort of like I like to say it's an and not an AR because it's going to be an are because there's so many next time use cases, whether it's a are we are drones, And not only that also is going to bring changes in the way you do things. It is a cloud deliberate service enterprise don't have to for example, the It's very convenient because you take your phone out of your pocket and it's connected to the network, Let's let's talk about how this thing scales in the go to market, We'll also bring in our relativist providers to hide the It's great to have you guys. Thank you.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
GregPERSON

0.99+

Greg DoreyPERSON

0.99+

DavePERSON

0.99+

CiscoORGANIZATION

0.99+

Greg DoraiPERSON

0.99+

Coyote NetworksORGANIZATION

0.99+

SARSORGANIZATION

0.99+

MasumiPERSON

0.99+

second aspectQUANTITY

0.99+

five yearsQUANTITY

0.99+

OneQUANTITY

0.99+

bothQUANTITY

0.99+

Masum MirPERSON

0.99+

Wild ConnexionORGANIZATION

0.97+

two concrete examplesQUANTITY

0.96+

fiveQUANTITY

0.95+

two different waysQUANTITY

0.95+

Y 5 60COMMERCIAL_ITEM

0.94+

WiFi 60OTHER

0.94+

firstQUANTITY

0.94+

IasiORGANIZATION

0.94+

IsisORGANIZATION

0.93+

day oneQUANTITY

0.93+

sevenQUANTITY

0.92+

five gORGANIZATION

0.91+

CatalystORGANIZATION

0.9+

couple takeawaysQUANTITY

0.87+

IotORGANIZATION

0.86+

two technologiesQUANTITY

0.85+

todayDATE

0.85+

privateCOMMERCIAL_ITEM

0.84+

WiFi 16OTHER

0.83+

five GOTHER

0.82+

gOTHER

0.78+

private five gCOMMERCIAL_ITEM

0.77+

WiFi sixOTHER

0.75+

g FranciscoORGANIZATION

0.75+

five GCOMMERCIAL_ITEM

0.72+

Richard PryorPERSON

0.71+

step oneQUANTITY

0.71+

Number oneQUANTITY

0.7+

fiveOTHER

0.7+

MuslimsORGANIZATION

0.7+

mm.PERSON

0.69+

CongressORGANIZATION

0.69+

Five gCOMMERCIAL_ITEM

0.69+

five G.QUANTITY

0.68+

five GORGANIZATION

0.66+

GORGANIZATION

0.66+

ninesQUANTITY

0.65+

private five gORGANIZATION

0.64+

gORGANIZATION

0.63+

five tOTHER

0.63+

sixOTHER

0.62+

WiFi ConnexionORGANIZATION

0.58+

fiveTITLE

0.56+

five g.OTHER

0.55+

private five GORGANIZATION

0.55+

Cap 90OTHER

0.49+

tORGANIZATION

0.49+

sixCOMMERCIAL_ITEM

0.44+

g.ORGANIZATION

0.44+

five GTITLE

0.41+

GOTHER

0.34+

fiveORGANIZATION

0.29+