Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand). Read more
Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS Read more
The FCC issued an order and consent decree (settlement details) DA 14-1444 in the investigation of Marriott International regarding blocking of personal Wi-Fi hot spots in the conference facilities of the Gaylord Opryland hotel. The FCC imposed $600,000 fine. Read more
iOS8 MAC RandomGate: Who turns OFF location services AND turns OFF cellular data connection while using their iPhone? Read part II of our iOS8 blog series: IOS8 MAC Address Randomization Update. Read more
In June of this year, at WWDC#14 Apple announced that the Wi-Fi scanning behavior of their devices would change starting with iOS8. They would start using randomized and locally administrated MAC addresses in the probing state. The touted rationale was that such an approach would hide the real MAC addresses of the device and make Wi-Fi device MAC based analytics difficult. Apple made iOS8 generally available as part of their September 2014 launch. Accordingly, it was time for me to take out the packet sniffing gear and dig into the workings of randomized MACs (no pun intended here). Read on to find out how they work. Read more
Following are seven clues to help the delegates resolve this Wireless Field Day 7 riddle.
1) It is personalized
2) There is one for each day of the week
3) Helps you relax
4) Smooth and sweet
5) Travel size
6) Better than a t-shirt
7) Works like magic
The answer to this Wi-Fi brain teaser will be unveiled during AirTight’s #WFD7 segment. Addition insight can be found in Wireless Field Day: Are you ready for Lucky Number 7? As a viewer tuning in, you’ll be able to see which of the delegates manages to solve AirTight’s #WFD7 riddle. More on AirTight via TechFieldDay archive. Read more
As someone who has walked more than a few miles in a network administrator’s shoes, I’m all too familiar with the challenges of configuring and troubleshooting mesh environments. In my last position, as an administrator responsible for 300+ mesh nodes, I know the stress and frustration of dealing with dropped connections along with the other problems associated with mesh environments.
Our approach here at AirTight has always focused on making IT managers’ lives easier, and our Wi-Fi mesh implementation follows in the same footsteps.
As you may have already noticed, a new feature is now available in the AirTight Networks cloud console under configuring the SSID for your templates.
Since its release to the Wi-Fi product line, this enhancement has received lots of positive feedback regarding its innovative visual capabilities of managing mesh links, as well as the new options that offer both indoor and outdoor flexibility. Read more
Wireless Field Day 7 (#WFD7) is just around the corner and AirTight Networks is pumped about being in the vendor line-up. This is our third WFD and certainly won’t be our last.
You won’t want to miss our session which takes place on Wednesday, August 6 from 13:30-15:30 (Pacific time). Most vendor presentations – including ours – are streamed live at TechFieldDay.com
Can’t make it for the live session? Keep calm and view video recordings of our presentations at your convenience. Read more
Mature cloud Wi-Fi offerings have gone through few phases already. They started with bare-bones device configuration from the cloud console and over the years matured into meaty management plane for complete Wi-Fi access, security and complementary services in the cloud. Alongside these phases of evolution, optimizing the cost of operation of the cloud backend has always been important consideration. It is critical for cloud operators and… Read More