SlideShare a Scribd company logo
WiFi as-a-Service:
Delivering an exceptional wireless
wireless experience without the
hassle
October 2nd 2018, Dennis Holmes, Senior Technology Advisor, Mobility
and IoT Solutions
Today, wireless is a must-have
• Gradually,WiFi has moved from a “nice-
to-have” to a “must-have” part of a
school’s IT infrastructure that’s used by
administration, students, teachers, and
guests.
• Most organizations provide a wireless
network but they usually stink from an
end user’s perspective
• Because they are unreliable, they give IT
a bad reputation frustrating students and
teachers.
Why is that?
Challenges with “today’s” technology IT’s ability to meet rising wireless expectations
• Most wireless networks have dead zones
• End users often become your “monitoring tool”
• Incorporating advanced location based services is
difficult, hindering your ability to unlock the business
value in your wireless network.
• Users believe wireless should be uninterrupted
• Trying to do it all with less engineering resources
• Wireless network design, implementation, and support all take time
away from projects that directly impact the business
Potential use cases
Along with delivering reliable WiFi and a great user experience, WiFi as a Service offers a variety of
potentially high impact use cases
Gain user or
device intelligence
Leverage
Location-based analytics
Engage with
customers in new ways
Internet ofThings
(IoT) applications
Understand the types of
devices on your wireless or
Bluetooth network and what
users are doing
Track people or
things and fine-tune services
based on their location
Provide a high-bandwidth public
WiFi network and tailor content
to users based on their location
APIs and optional apps deliver
reliableWiFi AND enable
advanced IoT solutions
What are some use cases in education?
• One to One Laptop Initiatives
• Location Based Analytics
• RFID Based IDTags
• Video Surveillance and ActiveThreat Safety
One to One Laptop Initiatives
• Support for High Density
• SLE Based on User Experience
• Managing Baseline Changes
• Deeper Impact for Distance Based Learning
Location Based Analytics and RFID
IdentificationTags
• Leveraging Location for Better
Graduation Rates
• Better Control of Capital Assets
• Better Visitor Control
• Location Based Facilitation of Faculty
Convergence for Critical Events
Extending safety and security beyond the campus
• All-day security monitoring
• Cost savings on fleet
management
• Enhanced communication
with immediate community
• Extended learning
environment
Consolidated
video surveillance
and safety
Student learning
wireless
access
Location
services for
parents and
students
Vehicle
telematics
dashboard
Video Surveillance and ActiveThreat Safety
• Correlate Student and Faculty Location withThreats
• Video Surveillance via WiFi Cameras
• Integration with Acoustic Systems
• Integration with Law Enforcement
• Safe Routing of People Away fromThreats
Core Principles—Improving Safety in Education
Listen to safety
experts and
leverage best
practices
Protect against all
hazards
Department of
Homeland
Security model
Build on the core
safety platform
with
interoperable,
extensible
solutions
Optimize
efficiency with
single pane of
glass, easy access
to every device
Maximize existing
network and
incorporate
leading-edge
technologies
Ensure Safety
investment also
help fuel next
generation
learning solutions
Typical campus security deployments
1
Siloed
systems
Visitor screening,
badging/access controls,
communication, and video
surveillance run as separate
systems
None/outdated
equipment
Hidden risks around potential
critical points of
communication failure
2
Reactive
functionality
Unclear policy and inability to
identify early indicators of
potential risks
3
Inadequate :: Costly :: Slow in Responsiveness
Preparation for All Safety Risks and Hazards: DHS Model
Preventions
Deter events through over-watch
presence and vigilance of authority.
Identify possible threats before they
can take shape.
Protection
Control access and monitor
assets and public behavior.
Leverage data sources for
awareness and mitigate issues
before they can occur.
Mitigation
Detect critical events and direct
people, resources, and processes
to minimize risk. Direct potential
victims away from harm and
toward safety.
Response
Optimize response to threats,
save lives, and protect the public.
Enable collaboration within and
across functional groups e.g.
facilities staff, administrators,
police, fire, medical, and public.
Recovery
Aid in the recovery process information
management and situational awareness.
Before an Event During an Event
After an Event
• Unify - Isolate physical security
systems, video and data across
the school district
• Visualize - Command and
control across all physical
security systems with full
immersion and real-time alerts
• Locate and Notify - Dynamic
heat Map and building floor plan
indicating sensor locations, live
video and alerts
• Integrate real-time social media
feeds to improve situational
awareness & aid first
A unified view of school or campus alerts and actions
WhatYou Should Be Looking For?
WiFi as a Service features Business, technical, and financial benefits
User or device fingerprinting
Reliable and secureWiFi connectivity
Customizable splash page for guest users
PerWLAN, user, and application bandwidth control
Easy to interpret management portal
Location based services*
Open API for custom application development
Rapid deployment to accelerate ROI
Exceptional end user WiFi experiences
Simple employee and guest on-boarding
Indoor location tracking of people and things*
Lower the expense of keeping wireless expertise in-house
Eliminate the cost of a separate Bluetooth network (optional)
A simple cost per square foot pricing model with CapEx or OpEx options
Our OnDemand
Services provide
greater customer IRR
and ROI
Our I2E methodology
ensures every technology
project is aligned to
business goals
We proudly employ
a customer-first
support model
Highest certifications
in today’s modern
networking
architectures
IE’s differentiators
At Internetwork Engineering, we are wireless experts and proud to be people that truly connect people
Top-notch wireless
expertise across
many industries
Connect with IE!
Visit us online at: www.ineteng.com
Follow us on social media:Twitter | LinkenIn
Join us at one of our next events

More Related Content

What's hot

Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
VMware
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
ARC Facilities - 5 FM Tech Tips Webinar
ARC Facilities - 5 FM Tech Tips WebinarARC Facilities - 5 FM Tech Tips Webinar
ARC Facilities - 5 FM Tech Tips Webinar
ARC Facilities
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
Logicalis Australia
 
BYOD
BYODBYOD
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
Md Yousup Faruqu
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing Rollout
Raj Sambwani
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
Ivanti
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
Erick Solms
 
Byod
ByodByod
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
Troy C. Fulton
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 

What's hot (19)

Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
ARC Facilities - 5 FM Tech Tips Webinar
ARC Facilities - 5 FM Tech Tips WebinarARC Facilities - 5 FM Tech Tips Webinar
ARC Facilities - 5 FM Tech Tips Webinar
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
BYOD
BYODBYOD
BYOD
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
CamputS Wi-Fi Solution
CamputS Wi-Fi SolutionCamputS Wi-Fi Solution
CamputS Wi-Fi Solution
 
Learning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing RolloutLearning from an Enterprise Videoconferencing Rollout
Learning from an Enterprise Videoconferencing Rollout
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
Boca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game PlanBoca Chamber and Simplitfy - Work From Home Game Plan
Boca Chamber and Simplitfy - Work From Home Game Plan
 
Byod
ByodByod
Byod
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 

Similar to Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Session - 2018 UNC Cause

Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
Mark Boorman
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
Aruj Thirawat
 
Better Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme NetworksBetter Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme Networks
aliciasyc
 
AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018
James Sankar
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
ControlEng
 
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
Juniper Networks UKI
 
How Mobility Has Transformed the Classroom
How Mobility Has Transformed the ClassroomHow Mobility Has Transformed the Classroom
How Mobility Has Transformed the Classroom
Stuart Melnitsky
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdf
MuruEtti
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
미래웹기술연구소 (MIRAE WEB)
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company OverviewAISDC
 
Campaign Presentation
Campaign PresentationCampaign Presentation
Campaign Presentation
Özer Dondurmacıoğlu
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
Rowell Dionicio
 
Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014
NTS UK - Part of Capita
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
Logicalis Australia
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
Mayank Vijh
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
Dell EMC World
 
Successful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless NetworksSuccessful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless Networks
jimrapoza
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
ZoyaAli844417
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
NTS UK - Part of Capita
 

Similar to Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Session - 2018 UNC Cause (20)

Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 
Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.Extreme networks - Better Connections. Better Experiences. For Everyone.
Extreme networks - Better Connections. Better Experiences. For Everyone.
 
Better Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme NetworksBetter Connections.Better Experiences.For Everyone - Extreme Networks
Better Connections.Better Experiences.For Everyone - Extreme Networks
 
AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018AARNet Enterprise Services presentation at QUESTNET 2018
AARNet Enterprise Services presentation at QUESTNET 2018
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...
 
How Mobility Has Transformed the Classroom
How Mobility Has Transformed the ClassroomHow Mobility Has Transformed the Classroom
How Mobility Has Transformed the Classroom
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdf
 
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
[Sencha 엔터프라이즈 웹애플리케이션 세미나] BYOD - Sencha space
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
 
Campaign Presentation
Campaign PresentationCampaign Presentation
Campaign Presentation
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014Cisco Meraki Solution Brochure 2014
Cisco Meraki Solution Brochure 2014
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)Internet of things - Introduction and Variations (Architecture)
Internet of things - Introduction and Variations (Architecture)
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
Successful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless NetworksSuccessful Strategies for Secure, Private and Reliable Wireless Networks
Successful Strategies for Secure, Private and Reliable Wireless Networks
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 

More from Internetwork Engineering (IE)

2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
Internetwork Engineering (IE)
 
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Internetwork Engineering (IE)
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
Internetwork Engineering (IE)
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
Internetwork Engineering (IE)
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
Internetwork Engineering (IE)
 
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Internetwork Engineering (IE)
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Internetwork Engineering (IE)
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Internetwork Engineering (IE)
 

More from Internetwork Engineering (IE) (8)

2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
2019 Cybersecurity Threats & Trends: The Chart Toppers & One-hit Wonders
 
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
Re-inventing the Wireless Network | 2019 Tri-State Technology Conference Pres...
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Eliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber InsuranceEliminating the Confusion Surrounding Cyber Insurance
Eliminating the Confusion Surrounding Cyber Insurance
 
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...   Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
Lessons Learned from the Field: CyberSecurity that Works - Jason Smith Ses...
 
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster RecoveryAlphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
Alphabet Soup: A(utomation), BC (Business Continuity) and DR (Disaster Recovery
 
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
Building & Updating an Incident Response Plan - Jason Smith Session - 2018 Ch...
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Session - 2018 UNC Cause

  • 1. WiFi as-a-Service: Delivering an exceptional wireless wireless experience without the hassle October 2nd 2018, Dennis Holmes, Senior Technology Advisor, Mobility and IoT Solutions
  • 2. Today, wireless is a must-have • Gradually,WiFi has moved from a “nice- to-have” to a “must-have” part of a school’s IT infrastructure that’s used by administration, students, teachers, and guests. • Most organizations provide a wireless network but they usually stink from an end user’s perspective • Because they are unreliable, they give IT a bad reputation frustrating students and teachers.
  • 3. Why is that? Challenges with “today’s” technology IT’s ability to meet rising wireless expectations • Most wireless networks have dead zones • End users often become your “monitoring tool” • Incorporating advanced location based services is difficult, hindering your ability to unlock the business value in your wireless network. • Users believe wireless should be uninterrupted • Trying to do it all with less engineering resources • Wireless network design, implementation, and support all take time away from projects that directly impact the business
  • 4. Potential use cases Along with delivering reliable WiFi and a great user experience, WiFi as a Service offers a variety of potentially high impact use cases Gain user or device intelligence Leverage Location-based analytics Engage with customers in new ways Internet ofThings (IoT) applications Understand the types of devices on your wireless or Bluetooth network and what users are doing Track people or things and fine-tune services based on their location Provide a high-bandwidth public WiFi network and tailor content to users based on their location APIs and optional apps deliver reliableWiFi AND enable advanced IoT solutions
  • 5. What are some use cases in education? • One to One Laptop Initiatives • Location Based Analytics • RFID Based IDTags • Video Surveillance and ActiveThreat Safety
  • 6. One to One Laptop Initiatives • Support for High Density • SLE Based on User Experience • Managing Baseline Changes • Deeper Impact for Distance Based Learning
  • 7. Location Based Analytics and RFID IdentificationTags • Leveraging Location for Better Graduation Rates • Better Control of Capital Assets • Better Visitor Control • Location Based Facilitation of Faculty Convergence for Critical Events
  • 8. Extending safety and security beyond the campus • All-day security monitoring • Cost savings on fleet management • Enhanced communication with immediate community • Extended learning environment Consolidated video surveillance and safety Student learning wireless access Location services for parents and students Vehicle telematics dashboard
  • 9. Video Surveillance and ActiveThreat Safety • Correlate Student and Faculty Location withThreats • Video Surveillance via WiFi Cameras • Integration with Acoustic Systems • Integration with Law Enforcement • Safe Routing of People Away fromThreats
  • 10. Core Principles—Improving Safety in Education Listen to safety experts and leverage best practices Protect against all hazards Department of Homeland Security model Build on the core safety platform with interoperable, extensible solutions Optimize efficiency with single pane of glass, easy access to every device Maximize existing network and incorporate leading-edge technologies Ensure Safety investment also help fuel next generation learning solutions
  • 11. Typical campus security deployments 1 Siloed systems Visitor screening, badging/access controls, communication, and video surveillance run as separate systems None/outdated equipment Hidden risks around potential critical points of communication failure 2 Reactive functionality Unclear policy and inability to identify early indicators of potential risks 3 Inadequate :: Costly :: Slow in Responsiveness
  • 12. Preparation for All Safety Risks and Hazards: DHS Model Preventions Deter events through over-watch presence and vigilance of authority. Identify possible threats before they can take shape. Protection Control access and monitor assets and public behavior. Leverage data sources for awareness and mitigate issues before they can occur. Mitigation Detect critical events and direct people, resources, and processes to minimize risk. Direct potential victims away from harm and toward safety. Response Optimize response to threats, save lives, and protect the public. Enable collaboration within and across functional groups e.g. facilities staff, administrators, police, fire, medical, and public. Recovery Aid in the recovery process information management and situational awareness. Before an Event During an Event After an Event
  • 13. • Unify - Isolate physical security systems, video and data across the school district • Visualize - Command and control across all physical security systems with full immersion and real-time alerts • Locate and Notify - Dynamic heat Map and building floor plan indicating sensor locations, live video and alerts • Integrate real-time social media feeds to improve situational awareness & aid first A unified view of school or campus alerts and actions
  • 14. WhatYou Should Be Looking For? WiFi as a Service features Business, technical, and financial benefits User or device fingerprinting Reliable and secureWiFi connectivity Customizable splash page for guest users PerWLAN, user, and application bandwidth control Easy to interpret management portal Location based services* Open API for custom application development Rapid deployment to accelerate ROI Exceptional end user WiFi experiences Simple employee and guest on-boarding Indoor location tracking of people and things* Lower the expense of keeping wireless expertise in-house Eliminate the cost of a separate Bluetooth network (optional) A simple cost per square foot pricing model with CapEx or OpEx options
  • 15. Our OnDemand Services provide greater customer IRR and ROI Our I2E methodology ensures every technology project is aligned to business goals We proudly employ a customer-first support model Highest certifications in today’s modern networking architectures IE’s differentiators At Internetwork Engineering, we are wireless experts and proud to be people that truly connect people Top-notch wireless expertise across many industries
  • 16. Connect with IE! Visit us online at: www.ineteng.com Follow us on social media:Twitter | LinkenIn Join us at one of our next events

Editor's Notes

  1. Perform introductions Qualification questions WiFi Qualification Process - Determine customers desired outcomes (from the WiFiaaS Standard Operating Procedures document) What’s your strategy to increase revenue? (acquire new customers vs sell more to existing customers)? What are your plans to improve the customer experience? How are you engaging customers to determine their needs and experience with your products, store, etc.? (what channels, social, website, call center, etc. and what tools)? What use cases have you considered for engaging customers on their mobile devices while at your establishment? In what order have you prioritized the use cases and why? What solutions do you currently have or are you considering to address these use cases? Do your use cases need the ability to “push” information to a mobile device or also receive information back…like with a blue dot wayfinding map or something similar? If any use cases require location mapping, how accurate does it need to be and why? (1 meter, 3+ meters)  
  2. WiFI is now expected everywhere. Unfortunately most networks are not designed or maintained to the level that would grant a good end user experience. This creates doubts and concerns about the IT team.  
  3. How are you currently staffed for IT infrastructure, particularly network and wireless. (over staffed, under staffed, etc. by how much)? What Key Performance Indicators (KPIs) does the business use to measure IT and how are you performing against them, particularly for network access? Do you have the advanced skills and/or desire to manage your wireless network? What use cases has the business considered for engaging customers on their mobile devices while at your establishment? Determine WiFi needs, coverage, through put, device types and quantities, etc.
  4. Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
  5. Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
  6. Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
  7. Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
  8. And our solution doesn’t just end at the campus – you can apply our solution set more broadly like student school buses as well
  9. Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
  10. That’s the ideal – but in reality, what we find when we begin working with customers is: They’re using siloed security systems – access control systems that they may have put in place 2 years ago, video surveillance systems that were installed 5 years ago and no communication system that can be triggered or integrated by either system In addition, so much of the equipment schools are using vary in age and capability. In a 25-school district, each school may have installed video cameras and varying capability at different times, so some are brand new but more often, many are 8-10 years old. And finally, all schools have processes and technology that are reactive – so if a crisis happens, they can go back and look at access logs, or video frames of incidents but no systems in place that could alert them of potential issues before they happen – e.g., more students or foot traffic in particular area that is substantially higher than normal or an individual that has been banned or suspect has now entered a campus. The result is we find that the systems and processes most campuses have in place are inadequate, costly to maintain and monitor, and slow in aiding them to respond quickly during and after events. [Note: this is a good place to pause to ask questions about what systems they have in place today? How old? How do they maintain the equipment? What are the resources required? How do their access controls and IP cameras communicate together today? Can they?]
  11. When we talk our customers, campus safety and security is a concern for students, parents, faculty, and school officials. Recent events have brought attention to specific policies, procedures and technology that needs to be in place. And of course, everyone is looking for systems and technology that can help: Before an event: Provide prevention capability to identify potential issues or threat and ongoing protection that provide capabilities such as campus access controls and monitoring systems to keep watch on campus activity and behavior During an event: Providing contextual, relevant information to first responders and other key personnel to minimize response times and enabling them to implement the most appropriate course of action After an event: Enabling real-time information to facilitate communication with broader community
  12. *additional to base WiFI as a Service