2015 Year of the Goat and Wi-Fi & Security

2015 Year of The Goat

In many Asian countries, the New Year is based on the lunar calendar and is dictated by the first new moon and ends on the full moon. In the case of the Chinese calendar, each New Year is marked by the characteristics of one of the 12 zodiacal animals: the rat, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog and pig.

In the first part of a 2 part blog series, we started off by reflecting on the Year of the Horse and 2014. In this second installment, we look ahead to the Year of the Goat which began on February 19th 2015.   Read more

AirTight at Wireless LAN Professionals Conference WLPC in Dallas

Wireless LAN Professionals Conference: WLPC video archive

AirTight had strong representation at the Dallas conference (February 2015) with 2 keynote sessions and 4 Ten Talks. View the video and SlideShare archive.   Read more

Year of the Horse: Wi-Fi and Security Thought Leadership

2014 Year of the Horse

In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat.   Read more

ISP Network on the Home Side and the Role Wi-Fi May Play

ISP Network on the Home Side and the Role Wi-Fi May Play   (blog by Hemant Chaskar)

As the net neutrality debate rages, Hemant Chaskar delves into how ISP networks are organized. Not surprising he found that the ISP core network and service provisioning therein can get pretty complex. Additionally, he found that even at the access layer and in-home networking there are many technologies at work.   Read more

2015: The Year of Experience and Scale

Wi-Fi Scalability and Engagement in 2015

Scale versus Scalability: They are different notions. Scale is mostly about numbers, but scalability incorporates business enablement in addition to scale.

In the Wi-Fi industry, we’ve always talked about “scalability at the edge” which is about higher wireless speeds, more clients served, high density and so on. This will continue to be important in 2015 as more applications and clients connect to Wi-Fi.

However, there is another scalability requirement that is becoming increasingly important in some verticals. I call it “scalability behind the edge” and I think that it will be a hot topic in 2015.

What is “scalability behind the edge”?   Read more

The Hunt for Rogue October

The Hunt for Rogue October by Rick Farina via AirTight blog

Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS   Read more

The Impact of IoT on Enterprise Wi-Fi

The Impact of IoT on Enterprise Wi-Fi

Choose your wireless network carefully. Cloud and APs are not all created equal.

Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site.   Read more

iOS8 MAC Randomization – Analyzed!

iOS8 MAC Randomization – Analyzed! via blog.airtightnetworks.com

In June of this year, at WWDC#14 Apple announced that the Wi-Fi scanning behavior of their devices would change starting with iOS8. They would start using randomized and locally administrated MAC addresses in the probing state. The touted rationale was that such an approach would hide the real MAC addresses of the device and make Wi-Fi device MAC based analytics difficult. Apple made iOS8 generally available as part of their September 2014 launch. Accordingly, it was time for me to take out the packet sniffing gear and dig into the workings of randomized MACs (no pun intended here). Read on to find out how they work.   Read more

Wi-Fi Troubleshooting: Guilty until Proven Innocent

WizShark: A picture is worth a thousand packets

More often than not, when things don’t work as they should, Wi-Fi is the obvious scapegoat even though the problems aren’t necessarily Wi-Fi specific.

In fact, I’ve come to expect this “guilty until proven innocent” rational. My job is to investigate, get to the root of the problem, and then propose a plan of action to remedy the situation. Such is the life of a troubleshooting Jedi! There’s never a dull moment, something is always happening.   Read more