As our team prepares to attend Hotel Technology Next Generation’s (HTNG) North American Conference next week in Atlanta, we are excited to have one of our very own as the keynote to really highlight Cisco’s leadership in the hospitality industry. Cisco’s Bob Friday, CTO, Wireless Networking Group, will be joined by our partner John Bollen, MGM resorts VP of IT to discuss key trends in the industry and specifically at MGM. They will discuss guest needs and demands, how to turn the mobile opportunity into revenue, and the vision of the industry and where it is going.
The keynote will hit on all the imperatives that Cisco Hospitality is driving citing Cisco’s recent Wi-Fi installation at MGM Resorts as a key example. Together, the pair will discuss how certain trends are impacting both Cisco and MGM solutions developments, investments and more. With Bob Friday’s experience in mobility, he will also address what he is seeing in other industries and how it can be applied to hospitality.
Read More »
Tags: Bob Friday, Cisco, cto, hospitality, hotel, hotel technology next generation, HTNG, HTNG North American, IT, John Bollen, location, location analytics, MGM, mobility, network, networking, platform, technology, wi-fi, wifi, wireless, wireless networking
By Jason Kohn, Contributing Columnist
You hear the term “M2M” a lot these days in the tech industry, and it means different things for different people. Broadly, machine-to-machine communications is about connecting devices — virtually any kind of devices — to network applications.
But for me, one of the most interesting aspects of M2M is the ability to improve the lives of people with disabilities or impairments by bringing them network-based tools that were previously inconceivable.
Read More »
Tags: Connected Life, healthcare, home monitoring, M2M, wireless networking
Regularly checking your WLAN for vulnerabilities will help keep your network safe
Network security is a never-ending task; it requires ongoing vigilance. Securing your wireless network can be particularly tricky because unauthorized users can quietly sneak onto your network, unseen and possibly undetected. To keep your WLAN secure, it’s important to stay on top of new wireless vulnerabilities. By regularly performing a vulnerability assessment on your wireless network, you can identify and close any security holes before a hacker can slip through them.
With a WLAN vulnerability assessment, you’re figuring out what your wireless network looks like to the outside world on the Internet. Is there an easy way in to your network? Can unauthorized devices attach themselves to your network? A WLAN vulnerability assessment can answer these questions—and more.
Read More »
Tags: small_business, wireless networking, wireless security, WLAN security
Consumers today are highly attached to mobile technology and are using it as part of their daily lives and shopping experiences. According to Nielson forty percent of mobile consumers over 18 in the U.S. now have smartphones. As these users consume bandwidth to send and retrieve content from SMS, MMS, Email, and social media apps such as Facebook, YouTube and Twitter that supports pictures and videos, they are increasingly looking to Wi Fi to improve their experience.
Are retailers offer their shopping channels (including store, web, voice and social media) to consumers, the consumers are expecting to be able to use their mobile device across all the channels whereever they are, at home, at work, and IN YOUR STORE.
As a retailer, facilitating mobility in the retail store can differentiate you from the competition, plus help you meet the soaring expectations of your customers. On the other hand, allowing access to your wireless network poses potential risks. You’ve got to ensure the security of your data, comply with PCI mandates, prevent misuse and interference, and provide consistent bandwidth for your own operations.
For help retailers address this issue, we are hosting a webcast on October 20th 10:00am Pacific Time titled
Read More »
Tags: Cisco, compliance, mobility, pci, retail, retaililng, security, wireless, wireless access point, wireless networking
By Steven Shepard, Contributing Columnist
Science, science fiction…which is it?
In October 1945, science fiction writer Arthur C. Clarke published a paper in Wireless World entitled, “Extra-Terrestrial-Relays: Can Rocket Stations Give World-Wide Radio Coverage?” In his paper, Clarke proposed the concept of a platform orbiting above the Earth that would serve as a relay facility for radio signals sent to it that could then be retransmitted back to Earth with far greater coverage (‘footprint’) than was achievable through the terrestrial transmission techniques of the time. He describes his platform in the article:
Read More »
Tags: history, network infrastructure, satellite communication, technology, wireless networking