In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat. Read more
The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”. Read more
The FCC issued an order and consent decree (settlement details) DA 14-1444 in the investigation of Marriott International regarding blocking of personal Wi-Fi hot spots in the conference facilities of the Gaylord Opryland hotel. The FCC imposed $600,000 fine. Read more
Will my friends get spam if I use Facebook social login? What information about my friends will be shared? These questions come to many when faced with the Facebook login option on websites and captive portals. This post seeks to answer these questions from the technical standpoint.
Graph API is the Facebook’s API that enables apps to read and write to the Facebook social graph. The discussion here is with respect to the API version 2.0 (released in April 2014) and later versions. To leverage the Graph API, there first needs to be a Facebook app. The app can be easily created in any Facebook account from the menu options. By default, apps can access the social login user’s public profile, email and friends list in the Facebook social graph. For access to additional information, the app needs to go through review and vetting process with Facebook. For illustrative purposes, let’s take the example of a consumer facing business that creates an app called “Da Brand” with default access rights. Read more
Following are seven clues to help the delegates resolve this Wireless Field Day 7 riddle.
1) It is personalized
2) There is one for each day of the week
3) Helps you relax
4) Smooth and sweet
5) Travel size
6) Better than a t-shirt
7) Works like magic
The answer to this Wi-Fi brain teaser will be unveiled during AirTight’s #WFD7 segment. Addition insight can be found in Wireless Field Day: Are you ready for Lucky Number 7? As a viewer tuning in, you’ll be able to see which of the delegates manages to solve AirTight’s #WFD7 riddle. More on AirTight via TechFieldDay archive. Read more
Wireless Field Day 7 (#WFD7) is just around the corner and AirTight Networks is pumped about being in the vendor line-up. This is our third WFD and certainly won’t be our last.
You won’t want to miss our session which takes place on Wednesday, August 6 from 13:30-15:30 (Pacific time). Most vendor presentations – including ours – are streamed live at TechFieldDay.com
Can’t make it for the live session? Keep calm and view video recordings of our presentations at your convenience. Read more
I read with interest Lee Badman’s article in Network Computing: Social WiFi Sign-In: Benefits With A Dark Side. Despite the gloomy title, the article is a fair and balanced look at both benefits and privacy implications of social Wi-Fi. Perfect timing, I said to myself. Facebook just announced that they will be adding new functionality… Read More
Mature cloud Wi-Fi offerings have gone through few phases already. They started with bare-bones device configuration from the cloud console and over the years matured into meaty management plane for complete Wi-Fi access, security and complementary services in the cloud. Alongside these phases of evolution, optimizing the cost of operation of the cloud backend has always been important consideration. It is critical for cloud operators and… Read More
MU-MIMO: The path from standardization to implementation – blog by Hemant Chaskar. Read more
Pleading the fifth at Wireless Field Day 5 – blog by Lina Arseneault. Read more