Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
Getting on the WiFi Freedom Trail with Open AP Standards
Posted by Hemant Chaskar on Feb 10, 2017

In the past, the “open revolution” became ingrained in our lives in the form of open source software. Now it is coming to infrastructure components in the form of hardware-software disaggregation.

What is Hardware-Software Disaggregation?

Disaggregation breaks vendor lock-in between infrastructure hardware and function-enabling software. The approach is to standardize interfaces between the two. Standardization of disaggregation started with OCP (Open Compute Project) founded by Facebook. Now, OCP has vendors across the industry as active participants. OCP’s first focus areas was scale computing. Disaggregation for data center compute and storage turned out to be a big success as many vendors today provide OCP based server technologies.

scalable-lg.png
A Change for the Better: How the Cloud Extends the Power of Your WiFi
Posted by Sean Blanton on Jul 11, 2016

We’ve all been there right? Stuck in a rut, unable to break free from the ways we’ve always done things. No, I’m not talking about your love life (well, not in this post, anyway), I’m talking about WiFi! Big things are happening in the world of enterprise WiFi, and we at Mojo are excited to lead the efforts to innovate our business and deliver services and specialized features that really make a difference. Let’s dive into an example, shall we?

Why 802.11ac Wave 2? Speed and Capacity
Posted by Robert Ferruolo (Dr. RF) on Jun 22, 2016

WiFi, like walkie-talkies, uses a shared medium. Only one device can effectively transmit at a time. When two people talk on walkie-talkies at the same time, neither is understood. The serial nature (one transmission at a time) limits the capacity of the channel. Capacity can be increased by having users talk faster, or by compressing what is said by using abbreviations for words or phrases. (OMG, this blog post has TMI!)

What You Need to Know about 5 Cloud-Managed Wi-Fi Myths
Posted by Sriram Venkiteswaran on Sep 17, 2015

Any technology often sparks lengthy discussions, questions, and tends to summon some common misconceptions that can and should be disproven. Cloud Wi-Fi is no exception to this. I want to share some of the most common myths about cloud Wi-Fi that I’ve seen and show you why they are not reality.

Cloud Wi-Fi Brings Safety, Simplicity, and Savings to K-12 Schools
Posted by Sean Blanton on Sep 1, 2015

Remember the 3 R’s in K-12 education – “reading, writing, and arithmetic”? Well, at AirTight, we’re bringing the 3 S’s to K-12 education – safety, simplicity, and savings.

4 Ways to Supercharge Your Outdoor Wi-Fi
Posted by Sriram Venkiteswaran on Aug 4, 2015

Great news: you can now have outdoor Wi-Fi that is easier to manage, more secure, and increases revenue.

Visit AirTight at ISTE 2015 - Booth 3161
Posted by Sean Blanton on Jun 28, 2015

Elevate the classroom experience with AirTight Secure Cloud Wi-Fi

10 Lessons for Retailers from Recent Security Reports
Posted by Freddy Mangum on Jun 16, 2015

Recent security reports from Verizon and new data from Mary Meeker of Kleiner Perkins Caufield & Byers have important security lessons for retailers. This blog summarizes key findings from these two widely respected sources.

3 Trends Impacting Wireless PCI Compliance
Posted by AirTightTeam on May 21, 2015

This is part two of the three-part blog series dedicated to wireless PCI compliance, which is a hot topic for retailers and other enterprises that accept payment cards. Read part 1 of the series: New PCI 3.1 Guidelines Address SSL Vulnerability; part 3: PCI Compliance and Wi-Fi: Friends or Foes?