How to Hit a Home Run with iBeacon

Baseball Player hitting a ball: How to hit a home run with iBeacon

iBeacon has been getting a lot of attention lately mainly because of claims of how it can transform the retail industry. After having talked to many retail customers, iBeacon technology providers, and others closely associated to this eco system, it occurred to me that iBeacon and baseball have a lot in common.

Just like in baseball, where a player has to advance through all the bases to score a run, there are some essential solution components to be built up before a retailer can extract value out of iBeacon. Continue reading to find out how to make your iBeacon deployment be a home run.   Read more

New PCI 3.1 Guidelines Address SSL Vulnerability

PCI DSS 3.1 - April 2015 - Payment Card Industry Data Security Council - standard 3.1

In April 2015, the PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision addresses vulnerabilities within the Secure Sockets Layer (SSL) encryption protocol that can put payment data at risk. This blog explains what this change represents to you and your business. Includes 2 whitepapers and 1 infographic.   Read more

How Does Restaurant Wi-Fi Pay for Itself?

Learn how On The Border maximizes Restaurant Wi-FI

Maximize Your Restaurant Wi-Fi: A Lucrative Tool for Revenue & Engagement is a how-to webinar that helps operators understand the potential of restaurant Wi-Fi, and focuses on a variety of strategies that lead to bottom-line impact.

AirTight joins forces with its partners On The Border Mexican Grill and Cantina and Industry Retail Group (IRG) to share how restaurant Wi-Fi networks pay for themselves.   Read more

2015 Year of the Goat and Wi-Fi & Security

2015 Year of The Goat

In many Asian countries, the New Year is based on the lunar calendar and is dictated by the first new moon and ends on the full moon. In the case of the Chinese calendar, each New Year is marked by the characteristics of one of the 12 zodiacal animals: the rat, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog and pig.

In the first part of a 2 part blog series, we started off by reflecting on the Year of the Horse and 2014. In this second installment, we look ahead to the Year of the Goat which began on February 19th 2015.   Read more

Year of the Horse: Wi-Fi and Security Thought Leadership

2014 Year of the Horse

In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat.   Read more

2015: The Year of Experience and Scale

Wi-Fi Scalability and Engagement in 2015

Scale versus Scalability: They are different notions. Scale is mostly about numbers, but scalability incorporates business enablement in addition to scale.

In the Wi-Fi industry, we’ve always talked about “scalability at the edge” which is about higher wireless speeds, more clients served, high density and so on. This will continue to be important in 2015 as more applications and clients connect to Wi-Fi.

However, there is another scalability requirement that is becoming increasingly important in some verticals. I call it “scalability behind the edge” and I think that it will be a hot topic in 2015.

What is “scalability behind the edge”?   Read more

What’s Under the Hood in Wi-Fi Analytics

What’s ‘Under the Hood’ in Retail Wi-Fi Analytics | Webinar

Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand).   Read more

AirTight Networks Honored with Two Industry Awards

Cloudys Award for AirTight with Frontera

AirTight Networks was honored with two industry awards for Cloud Wi-Fi, and Social & Analytics. AirTight won a 2014 Cloudys Cloud Channel Innovation Award and a Gold status from 2014 Golden Bridge Awards. Both awards were announced on September 8, 2014.   Read more

Wire-Side Containment – Hidden Gem of Rogue Access Point Protection

Wire-Side Containment - the Hidden Gem of Rogue Access Point Protection | by Hemant Chaskar via Airtight blog

The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”.   Read more

WeChat – This is how Social Wi-Fi is done in China

WeChat – This is how Social Wi-Fi is done in China via AirTight blog

Did you know that Tencent Holdings Ltd is China’s largest listed Internet company? And that WeChat, or Weixin as it is known in China, is Tencent’s flagship mobile messaging product?

In just 3 years since Tencent debuted WeChat, it has become one of the largest social networking sites in China. WeChat has secured its position as the most powerful mobile app in China today and is fast becoming one of the world’s most powerful as well.   Read more