AirTight had strong representation at the Dallas conference (February 2015) with 2 keynote sessions and 4 Ten Talks. View the video and SlideShare archive. Read more
In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat. Read more
As the net neutrality debate rages, Hemant Chaskar delves into how ISP networks are organized. Not surprising he found that the ISP core network and service provisioning therein can get pretty complex. Additionally, he found that even at the access layer and in-home networking there are many technologies at work. Read more
Scale versus Scalability: They are different notions. Scale is mostly about numbers, but scalability incorporates business enablement in addition to scale.
In the Wi-Fi industry, we’ve always talked about “scalability at the edge” which is about higher wireless speeds, more clients served, high density and so on. This will continue to be important in 2015 as more applications and clients connect to Wi-Fi.
However, there is another scalability requirement that is becoming increasingly important in some verticals. I call it “scalability behind the edge” and I think that it will be a hot topic in 2015.
What is “scalability behind the edge”? Read more
One of the biggest benefits of using the cloud is its ability to scale. In the world of cloud managed Wi-Fi, scale really means being able to deploy tens of thousands of access points (APs) without having to worry about additional resources being available to manage them. However scaling Cloud Wi-Fi is not without its set of challenges. In this blog we will look at some interesting challenges in scaling Cloud Wi-Fi, and how they are addressed. Read more
Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand). Read more
Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS Read more
The FCC issued an order and consent decree (settlement details) DA 14-1444 in the investigation of Marriott International regarding blocking of personal Wi-Fi hot spots in the conference facilities of the Gaylord Opryland hotel. The FCC imposed $600,000 fine. Read more
iOS8 MAC RandomGate: Who turns OFF location services AND turns OFF cellular data connection while using their iPhone? Read part II of our iOS8 blog series: IOS8 MAC Address Randomization Update. Read more
In June of this year, at WWDC#14 Apple announced that the Wi-Fi scanning behavior of their devices would change starting with iOS8. They would start using randomized and locally administrated MAC addresses in the probing state. The touted rationale was that such an approach would hide the real MAC addresses of the device and make Wi-Fi device MAC based analytics difficult. Apple made iOS8 generally available as part of their September 2014 launch. Accordingly, it was time for me to take out the packet sniffing gear and dig into the workings of randomized MACs (no pun intended here). Read on to find out how they work. Read more