In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat. Read more
All indications are that 2015 will be a banner year! Stay tuned for new technology developments in Wi-Fi and see what AirTight brings out in the coming year. Read more
Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand). Read more
Choose your wireless network carefully. Cloud and APs are not all created equal.
Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Read more
The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”. Read more
Did 2013 have to end with the somber news of a big credit card security breach? But it did! It is reported that 40 million credit cards were compromised in the security breach in stores of a major U.S. retailer Target. This is only a shade second to the earlier TJX breach in which 45 million credit cards… Read More
This is part 2 of last week’s post The Holy Grail of Retail. In today’s installment, I discuss what it takes to reach it. Operational Implementation There is a set of coordinated technologies required to affect the Holy Grail. A complex set of variables if you will. It’s the responsibility of manufacturers to implement this… Read More
In the retail market, the current Holy Grail is to unify the online and in-store shopping experiences (sometimes called ‘omni-channel’ retailing) such that the customer has a personalized shopping experience that promotes brand loyalty. The customer experience should be enjoyable and personalized, with available contextually relevant and timely information that makes interacting with the retailer… Read More
This is part 2 of the 2-part series on the managed service provider model in Wi-Fi. Click here for part 1. Is Wi-Fi Ready for MSPs? An important consideration when offering Wi-Fi as a managed service is whether or not the Wi-Fi solution you will choose is designed for it, both from the technical and… Read More
Retail Survival: Enabling the Consumer – blog by Lina Arseneault Read more