Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS Read more
Choose your wireless network carefully. Cloud and APs are not all created equal.
Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Read more
iOS8 MAC RandomGate: Who turns OFF location services AND turns OFF cellular data connection while using their iPhone? Read part II of our iOS8 blog series: IOS8 MAC Address Randomization Update. Read more
In June of this year, at WWDC#14 Apple announced that the Wi-Fi scanning behavior of their devices would change starting with iOS8. They would start using randomized and locally administrated MAC addresses in the probing state. The touted rationale was that such an approach would hide the real MAC addresses of the device and make Wi-Fi device MAC based analytics difficult. Apple made iOS8 generally available as part of their September 2014 launch. Accordingly, it was time for me to take out the packet sniffing gear and dig into the workings of randomized MACs (no pun intended here). Read on to find out how they work. Read more
More often than not, when things don’t work as they should, Wi-Fi is the obvious scapegoat even though the problems aren’t necessarily Wi-Fi specific.
In fact, I’ve come to expect this “guilty until proven innocent” rational. My job is to investigate, get to the root of the problem, and then propose a plan of action to remedy the situation. Such is the life of a troubleshooting Jedi! There’s never a dull moment, something is always happening. Read more
Did you know that sales of enterprise-grade wireless LAN equipment with the new 802.11ac Wi-Fi standard are expected to skyrocket over the next four years? This is partly due to the aggressive pricing strategies, according to a report from Dell’Oro Group. Find out why customers should interested in AirTight Networks for their 11AC needs. Read more
Implications for Public Facing Wi-Fi Security, Advertising and Analytics.
You may have already noticed – Google search has been strictly using HTTPS for some time now. Typically, you would not enter passwords in a keyword search and so people probably were not terribly worried about search sites not using HTTPS (Bing still allows HTTP). Nonetheless, Google has led by example by adopting strict HTTPS for search. With this, they have also demonstrated that HTTPS isn’t the bottleneck for transactions scalability of the site.
Additionally, just last month, Google disclosed that they will provide (slight) SEO rank incentives to HTTPS sites. If the trend picks up and most useful sites on the Internet move to HTTPS (news and other type of information distribution sites have the least penetration of HTTPS), it will impact public facing Wi-Fi in some interesting ways. Read more
Did you know that Tencent Holdings Ltd is China’s largest listed Internet company? And that WeChat, or Weixin as it is known in China, is Tencent’s flagship mobile messaging product?
In just 3 years since Tencent debuted WeChat, it has become one of the largest social networking sites in China. WeChat has secured its position as the most powerful mobile app in China today and is fast becoming one of the world’s most powerful as well. Read more
Will my friends get spam if I use Facebook social login? What information about my friends will be shared? These questions come to many when faced with the Facebook login option on websites and captive portals. This post seeks to answer these questions from the technical standpoint.
Graph API is the Facebook’s API that enables apps to read and write to the Facebook social graph. The discussion here is with respect to the API version 2.0 (released in April 2014) and later versions. To leverage the Graph API, there first needs to be a Facebook app. The app can be easily created in any Facebook account from the menu options. By default, apps can access the social login user’s public profile, email and friends list in the Facebook social graph. For access to additional information, the app needs to go through review and vetting process with Facebook. For illustrative purposes, let’s take the example of a consumer facing business that creates an app called “Da Brand” with default access rights. Read more
The third webinar in AirTight Networks’ 802.11ac webinar series [available on-demand] featuring Robert Ferruolo. Includes Q&A and video.
Throughput and Client density: 802.11n vs. 802.11ac
802.11ac use cases by Industry
Determining if 802.11ac is the right choice
802.11ac Performance ROI calculator Read more