Archives

Aerohive A3 Walkthrough

A3 provides complete functionality for securing, managing and controlling all devices on your access network – from standard wired and wireless clients, to IoT and BYOD. Its streamlined workflows and intuitive user interface greatly reduce the operational complexity and cost typically associated with competitive offerings. Watch a demo of Aerohive A3 and experience what it’s […]

Aerohive A3: Helping IT Radically Simplify Access Management

In the IT world, I’ve watched the two massive shifts in my career. When I first entered it, it was workstation mode. Employees came into the office, logged into desktop computers, and did their work. We eventually moved to the mobility era with smartphones and tablets. That era took us to where we are now. We are currently […]

What is Application Visibility and Control?

What Is AVC? Application Visibility and Control, or AVC, is one feature out of the multiple elements that should be considered when you are looking at a Wi-Fi solution. This feature delivers complete Layer 7 awareness, where applications, user authentication, and privacy are handled, among other critical services. AVC enables the ability to see what […]

Security Concerns for K-12 Networks

Network security (read last week’s article if you haven’t) is inextricably linked with BYOD, but it is also an issue of its own. Protecting student data has been a concern in K-12 for years, as shown in the Federal Educational Rights and Privacy Act and the Children’s Online Privacy Protection Acts in the U.S.; the […]

Network Security Questions To Answer Before Considering BYOD

Last time, I looked at the role BYOD plays in K12 environments. Whether you are actively implementing a BYOD program today, or are simply allowing students and teachers to bring devices onto the network, BYOD will affect your Wi-Fi network. Some questions to consider before starting include: How do you enable access to substitute teachers […]

What Role Does BYOD Play In K-12 Deployments?

For the past few weeks, we’ve been discussing the Wi-Fi strategy when considering a K-12 deployment. Like with any network rollout, eventually the end-user devices come into play. When Intel first coined the term BYOD or “Bring Your Own Device” in 2009, the idea of people bringing their own PCs, tablets, or smartphones in to […]

If Wi-Fi Networks Can Operate Without Controllers, Why Do Companies Still Use Them?

Last week, we started the discussion about if the architecture of WLAN networks was a relevant topic in 2018. If a company offers both controller and cloud-managed controller-less architectures, ask why do they offer both? If the controller-based design is considered the right path for larger or more complex deployments, what elements, specifically, would contribute to the […]

Does Wi-Fi Architecture Matter In 2018?

Last week, I looked at how to avoid RF interference in WLAN deployments. While this is something that affects everyone that uses Wi-Fi, the architecture your network uses is something that you can control (based on which vendor you choose). One of the primary differences between WLAN architectures is where and how the system is controlled. […]

How Can You Avoid RF Interference In Wi-Fi Deployments?

Last week, I talked about how to deploy a Wi-Fi network that actually works. I mentioned that the key is to avoid RF interference. This week, I want to discuss how to avoid it. First, I want to give you a “cheat sheet” on some basics of Wi-Fi. Wi-Fi Quick Reference Guide: Wi-Fi is a […]

Understanding RF Interference In Wi-Fi Deployments

In my last post, I looked at how to pick the best access point. This week, we will be looking at what it takes to deploy a network that actually works. A good Wi-Fi deployment looks like something out of science fiction; you simply put the access points up on the ceiling, and suddenly you […]