Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
Do the Right Thing-184012-edited.png
Fanning the Flames of Rebellion with Honor
Posted by Rick Wilmer on Sep 14, 2017

Witnessing ethical train wreck after train wreck in Silicon Valley, it’s easy to conclude that the quest for success at all costs is a recent phenomenon and one limited to startups.

Auto Packet Capture, Where Have You Been All My Life?
Posted by Robert Ferruolo (Dr. RF) on Aug 8, 2017

You can tell how long someone has been troubleshooting networks by the length of their arms. Orangutans like me have been doing it a long, long time.  I started with a sewing machine sized Network General luggable that I carried around the world. Now I have to stand up very straight  to keep my knuckles from dragging on the ground.

Mojo’s Cognitive WiFi platform - Aware, saves network engineers from having to have shirts specially made because it includes Auto Packet Capture.

IDC_Corporate_Logo-1.jpg
Accelerate the Digital Enterprise with a Cognitively-Enabled WLAN
Posted by Nolan Greene, Sr. Research Analyst, IDC on Jun 12, 2017

What were once revolutionary words when talking about enterprise WLAN – monitoring, visibility, single-pane-of-glass management – now sound conventional to the ears of network managers. Today, for many, the features those words describe have evolved into what is now known as the “cloud console.”

As WiFi networks have moved from merely supporting the business to serving as its backbone, WLAN management must evolve as well. Yesterday's security, scalability, and remediation are inadequate for the digitally transformed enterprise in which WiFi is the conduit to customers, suppliers, and mission-critical business applications.