Common use cases for the deployment of Wi-Fi in the classroom as well as utilizing location and Wi-Fi analytics to enhance graduation rates, test scores, academic success, and student/faculty safety.
by: Dennis C. Holmes
Senior Technology Advisor, Mobility and IoT Solutions
About Dennis:
Dennis Holmes is the Senior Technology Advisor for Mobility and IoT Solutions at Internetwork Engineering (IE) and has been involved with Wi-Fi for over 18 years.
How WiFi and mobility technology can improve the safety of schools and campuses. Presented by Dennis Holmes, Senior Technology Advisor, Mobility and IoT Solutions, Internetwork Engineering (IE)
CompTIA’s 3rd Annual Trends in Enterprise Mobility study was conducted to build on previous CompTIA research in the mobility space and further explore mobility trends, challenges, and opportunities.
BYOD is an acronym that stands for bring your own device. It has been defined as an IT policy that facilitates for employees to utilize their personal mobile devices such as smart phones and tablets at work (Singh, 2012). Bring your own device can be viewed as a policy because any organization planning to adopt it needs to specify rules and regulations for the introduction and use of personal mobile devices at the workplace.
It can also be defined as an emerging trend that involves employees carrying their personal mobile devices to work for usage and connectivity to an enterprise network (Ravindra & Sadana, 2013). A trend can be defined as a novel (new) and fashionable way of doing something. In this context, a bring your own device trend can be viewed as a new cost effective and convenient way or method used by organizations to enable employees access the company infrastructure.
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
Beyond the PC: Combating Unmanaged Threats Security
Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
De Kade was facing a few network challenges amongst others: (1) With locations distributed throughout the Brugge region, needed a new solution for remote locations that was simple to manage
(2) Wanted to minimize the amount of networking equipment deployed without installing a wireless controller on-site
How WiFi and mobility technology can improve the safety of schools and campuses. Presented by Dennis Holmes, Senior Technology Advisor, Mobility and IoT Solutions, Internetwork Engineering (IE)
CompTIA’s 3rd Annual Trends in Enterprise Mobility study was conducted to build on previous CompTIA research in the mobility space and further explore mobility trends, challenges, and opportunities.
BYOD is an acronym that stands for bring your own device. It has been defined as an IT policy that facilitates for employees to utilize their personal mobile devices such as smart phones and tablets at work (Singh, 2012). Bring your own device can be viewed as a policy because any organization planning to adopt it needs to specify rules and regulations for the introduction and use of personal mobile devices at the workplace.
It can also be defined as an emerging trend that involves employees carrying their personal mobile devices to work for usage and connectivity to an enterprise network (Ravindra & Sadana, 2013). A trend can be defined as a novel (new) and fashionable way of doing something. In this context, a bring your own device trend can be viewed as a new cost effective and convenient way or method used by organizations to enable employees access the company infrastructure.
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
Beyond the PC: Combating Unmanaged Threats Security
Gain insights about how to protect your vital information against security threats by viewing this presentation from the Optimist TV webinar.
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
De Kade was facing a few network challenges amongst others: (1) With locations distributed throughout the Brugge region, needed a new solution for remote locations that was simple to manage
(2) Wanted to minimize the amount of networking equipment deployed without installing a wireless controller on-site
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
For video, check us out at https://youtu.be/mYrM5SPQVlg
You'll learn how to:
- Optimize your information for digital transformation.
- Leverage technology for improved emergency response.
- Instantly access information to enhance the workplace environment.
- Use technology to anticipate issues before they become a problem.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
A Primer on iOS Management and What's ChangingIvanti
Ivanti UEM is fully integrated with our OS partners including iOS. We provide a seamless and native iOS user experience while also establishing the foundation for customer's zero-trust journey. Join us to learn how Ivanti UEM can help you fully manage iOS devices, capabilities and security features.
How to Manage the Great BlackBerry MigrationTroy C. Fulton
BlackBerry might be forcing the migration issue for many organizations, but this is the new normal. The demands of users and the breakneck speed of IT consumerization driven by mobile, and now applications, have made that clear. Technically, this is not difficult. So what is the real issue? A deepening opportunity cost in innovation (lack of) that drives enterprise agility.
Tackle the key points of consideration and methodologies required for a successful platform migration both before and after implementation.
The Biggest Mistake you can make with your Data Center LicensesIvanti
IT is spending more on software than ever before. This most likely leaves you looking for ways to make the most of the software licenses you already have. On top of that, increasingly complex data center environments compound spending on software assets. Limited visibility into those assets could expose your most valuable business-critical applications to significant risk and additional cost.
See how data center discovery ninja Matt Reardon, takes an aggressive approach to gain visibility on complex software licenses so you can start making the most of your IT investments.
The borders of enterprise network infrastructure are porous at best. It’s too late to close them, and it’s probably best that you don’t. Cloud services, mobility, and technology adopted by lines-of-business (also known as shadow IT) may erode much of the control you once had over your infrastructure, but your business is using these technologies for a reason. They get the job done.
What you need to do is gain as much visibility and management as possible over these networks and services. The Borderless Enterprise enables this transformation.
These slides - based on the webinar featuring Shamus McGillicuddy, research director at Enterprise Management Associates (EMA), Doug Roberts, director of products at Fluke Networks, and Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists - cover:
- How enterprise IT organizations are succeeding with these new technologies
- Real-world examples of how IT can be an enabler and a partner in this new era
- Insights from new EMA research on the borderless enterprise
Bridging the gap between business intelligence, IT network management, and security with Purview, a network-powered application analytics solution. Purview is a Network-Powered Application, Analytics and Optimization solution that helps CIOs make faster and more effective decisions. Purview also enables you to gain 100% visibility of your network traffic. It does this all from a centralized command and control center that combines Network Management with Business Analytics, and at unprecedented scale (100M sessions) and scope.
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
For video, check us out at https://youtu.be/mYrM5SPQVlg
You'll learn how to:
- Optimize your information for digital transformation.
- Leverage technology for improved emergency response.
- Instantly access information to enhance the workplace environment.
- Use technology to anticipate issues before they become a problem.
How to develop an effective strategy, framework and support model to enable BYOD or mobility in your organisation. Martin Lindeman, a Logicalis solutions consultant and ex-Cisco consulting systems engineer, goes through a 5-step process that provides a practical methodology for implementing BYOD.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
A Primer on iOS Management and What's ChangingIvanti
Ivanti UEM is fully integrated with our OS partners including iOS. We provide a seamless and native iOS user experience while also establishing the foundation for customer's zero-trust journey. Join us to learn how Ivanti UEM can help you fully manage iOS devices, capabilities and security features.
How to Manage the Great BlackBerry MigrationTroy C. Fulton
BlackBerry might be forcing the migration issue for many organizations, but this is the new normal. The demands of users and the breakneck speed of IT consumerization driven by mobile, and now applications, have made that clear. Technically, this is not difficult. So what is the real issue? A deepening opportunity cost in innovation (lack of) that drives enterprise agility.
Tackle the key points of consideration and methodologies required for a successful platform migration both before and after implementation.
The Biggest Mistake you can make with your Data Center LicensesIvanti
IT is spending more on software than ever before. This most likely leaves you looking for ways to make the most of the software licenses you already have. On top of that, increasingly complex data center environments compound spending on software assets. Limited visibility into those assets could expose your most valuable business-critical applications to significant risk and additional cost.
See how data center discovery ninja Matt Reardon, takes an aggressive approach to gain visibility on complex software licenses so you can start making the most of your IT investments.
The borders of enterprise network infrastructure are porous at best. It’s too late to close them, and it’s probably best that you don’t. Cloud services, mobility, and technology adopted by lines-of-business (also known as shadow IT) may erode much of the control you once had over your infrastructure, but your business is using these technologies for a reason. They get the job done.
What you need to do is gain as much visibility and management as possible over these networks and services. The Borderless Enterprise enables this transformation.
These slides - based on the webinar featuring Shamus McGillicuddy, research director at Enterprise Management Associates (EMA), Doug Roberts, director of products at Fluke Networks, and Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists - cover:
- How enterprise IT organizations are succeeding with these new technologies
- Real-world examples of how IT can be an enabler and a partner in this new era
- Insights from new EMA research on the borderless enterprise
Bridging the gap between business intelligence, IT network management, and security with Purview, a network-powered application analytics solution. Purview is a Network-Powered Application, Analytics and Optimization solution that helps CIOs make faster and more effective decisions. Purview also enables you to gain 100% visibility of your network traffic. It does this all from a centralized command and control center that combines Network Management with Business Analytics, and at unprecedented scale (100M sessions) and scope.
Manufacturing today requires mobility. But mobility can bring with it a complex supporting infrastructure. It requires networking hardware and software, devices to connect to the infrastructure, applications to run on the devices, and processes and procedures to work effectively, safely and securely. Mark T. Hoske, content manager and editor with Control Engineering, will explain mobility trends based on Control Engineering research and discuss the types of mobile engineering applications available among 225 categorized in editorial coverage. Harry Forbes, senior analyst at ARC Advisory Group, will explain basic wireless mobility infrastructures, types of hardware and software needed, and the challenges and advantages wireless mobility offers to end-users, providing examples.
University of the Highlands and Islands extents ubiquitous Wi-Fi services acr...Juniper Networks UKI
The University of the Highlands and Islands is unusual in that it covers an
extended geographic region (about half of Scotland, or a sixth of the land
area of the UK). It has almost 100 campus locations supporting about 7,500
Higher Education students and 25,000 Further Education students, and is
based across a wide range and variety of sites, from large campuses supporting
thousands of students, down to single room locations in remote rural areas and
on remote islands.
These broad-ranging geographic variations leave the university with
some unique IT challenges. Available bandwidth can vary hugely between
locations—some close to fiber-optic infrastructure and others in remote
corners of the region where even broadband speeds are low. Resiliency of
those communication links can be another challenge, as diverse routes can
be impractical, and sub-sea cables or radio links are more exposed than
land-based communication systems. Not least, the university must provide a
consistent service across all of its locations, whether they support a handful of
students or thousands.
Awareness campaign and roadshow presentation titled "How Tomorrow Moves" after Aruba's acquisition by Hewlett Packard Enterprise. Gotta admit, quite proud of this 3-hour deck (supported by 20+ customer stories and 10+ tech demos).
Cisco Meraki's powerful cloud platform provides simple management for their wireless, routing, security and switching platforms. This solution guide covers the Meraki platform and products.
Voyager Networks is a managed services and solutions provider based in the UK. For more information on how Voyager Networks can help with your Meraki project, please visit:
http://www.voyager.net.uk
We're also on Twitter at:
https://twitter.com/voyagernetworks
LinkedIn:
https://www.linkedin.com/company/voyager-networks
Facebook:
https://www.facebook.com/VoyagerNetworks
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
Mobility is no longer about the provisioning of remote access or BYOD. Mobility is about enabling organisations to communicate with customers in different ways, create new revenue streams, reduce infrastructure costs and obtain a competitive advantage in the market, without compromising on security or manageability.
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
The slides includes the IOT Architecture introduction and how that is being used in certain use cases around the industries.
Topics include :
Introduction
Trends and Hype cycle
Major IOT Players
Real World Problems
IOT Architecture and variations
Challenges and Tools
Difference between M2M and IOT practice.
KPI and Criteria
Evaluation and Decision
Conclusion
MT16 Future-Ready Networking for the CampusDell EMC World
Enterprise mobility and multimedia are having a profound impact in the Campus, redefining the desktop experience while driving greater requirements for performance and security. Learn how a Dell One Network solution can help boost performance, simplify management and enhance visibility.
Successful Strategies for Secure, Private and Reliable Wireless Networksjimrapoza
With the rise of mobile platforms, the increasing numbers of smartphones or tablet endpoints, and increasing needs for secure and private wireless connectivity, building and managing the networks that make it possible to control the mobile onslaught is key for any successful organization. This webinar will detail the course that leading organizations take in optimizing the performance of their wireless networks, securing both the network edge and core, accommodating the influx of tablets and smartphones (including the trend of BYOD or Bring Your Own Device), and smoothly integrating with next-generation wireless broadband LTE and 4G networks. We’ll also find out how one organization used Best-in-Class practices to implement and manage their own secure private wireless network.
Cisco Meraki's powerful cloud platform provides simple management for their wireless, routing, security and switching platforms. This presentation provides an overview of the Meraki platform.
Voyager Networks is a managed services and solutions provider based in the UK. For more information on how Voyager Networks can help with your Meraki project, please visit:
http://www.voyager.net.uk
We're also on Twitter at:
https://twitter.com/voyagernetworks
LinkedIn:
https://www.linkedin.com/company/voyager-networks
Facebook:
https://www.facebook.com/VoyagerNetworks
Similar to Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Session - 2018 UNC Cause (20)
WiFi 6, 802.11ax, 5G, LTE & How They'll Coexist: A discussion of current and future mobile technologies, how they're alike, how they'll complement one another and coexist, and how they'll enable the future IoT Network and the Network of Everything.
We began to see renewed innovation in the threat actor space in mid to late 2018. This trend has continued to surface in 2019. Threat actors (black hat hackers) have increasingly leveraged prior attacks, data collection and mining, and likely AI to create a new type of highly targeted, very sophisticated cyber attacks. Explore this new threat technique, prevention and detection strategies, and some of the most effective strategies to balance compliance and customer requirements with practical cyber security.
Jason Smith shared cyber security trends from 2018 into the beginning of 2019 at the SCTBA Convention, how the threat actor model has changed, and what businesses should do.
Special guests from McGriff and INSUREtrust joined the March 21, 2019 Triangle Security User Group to help attendees eliminate the confusion surrounding Cyber Insurance.
Cyber attacks continue to increase in number and sophistication level. Recently, we've seen new types of malware and attack coordination; unfortunately, prevention and detection can only go so far. It’s time to get prepared for the high likelihood that cyber incidents will happen.
This slide deck provides an overview of the recent cyber attacks where we've assisted in organizational recovery and prevention, as well as new best practice ideas and techniques based on current cyber risk that should allow an organization to prevent many types of breaches and recovery faster
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Session - 2018 UNC Cause
1. WiFi as-a-Service:
Delivering an exceptional wireless
wireless experience without the
hassle
October 2nd 2018, Dennis Holmes, Senior Technology Advisor, Mobility
and IoT Solutions
2. Today, wireless is a must-have
• Gradually,WiFi has moved from a “nice-
to-have” to a “must-have” part of a
school’s IT infrastructure that’s used by
administration, students, teachers, and
guests.
• Most organizations provide a wireless
network but they usually stink from an
end user’s perspective
• Because they are unreliable, they give IT
a bad reputation frustrating students and
teachers.
3. Why is that?
Challenges with “today’s” technology IT’s ability to meet rising wireless expectations
• Most wireless networks have dead zones
• End users often become your “monitoring tool”
• Incorporating advanced location based services is
difficult, hindering your ability to unlock the business
value in your wireless network.
• Users believe wireless should be uninterrupted
• Trying to do it all with less engineering resources
• Wireless network design, implementation, and support all take time
away from projects that directly impact the business
4. Potential use cases
Along with delivering reliable WiFi and a great user experience, WiFi as a Service offers a variety of
potentially high impact use cases
Gain user or
device intelligence
Leverage
Location-based analytics
Engage with
customers in new ways
Internet ofThings
(IoT) applications
Understand the types of
devices on your wireless or
Bluetooth network and what
users are doing
Track people or
things and fine-tune services
based on their location
Provide a high-bandwidth public
WiFi network and tailor content
to users based on their location
APIs and optional apps deliver
reliableWiFi AND enable
advanced IoT solutions
5. What are some use cases in education?
• One to One Laptop Initiatives
• Location Based Analytics
• RFID Based IDTags
• Video Surveillance and ActiveThreat Safety
6. One to One Laptop Initiatives
• Support for High Density
• SLE Based on User Experience
• Managing Baseline Changes
• Deeper Impact for Distance Based Learning
7. Location Based Analytics and RFID
IdentificationTags
• Leveraging Location for Better
Graduation Rates
• Better Control of Capital Assets
• Better Visitor Control
• Location Based Facilitation of Faculty
Convergence for Critical Events
8. Extending safety and security beyond the campus
• All-day security monitoring
• Cost savings on fleet
management
• Enhanced communication
with immediate community
• Extended learning
environment
Consolidated
video surveillance
and safety
Student learning
wireless
access
Location
services for
parents and
students
Vehicle
telematics
dashboard
9. Video Surveillance and ActiveThreat Safety
• Correlate Student and Faculty Location withThreats
• Video Surveillance via WiFi Cameras
• Integration with Acoustic Systems
• Integration with Law Enforcement
• Safe Routing of People Away fromThreats
10. Core Principles—Improving Safety in Education
Listen to safety
experts and
leverage best
practices
Protect against all
hazards
Department of
Homeland
Security model
Build on the core
safety platform
with
interoperable,
extensible
solutions
Optimize
efficiency with
single pane of
glass, easy access
to every device
Maximize existing
network and
incorporate
leading-edge
technologies
Ensure Safety
investment also
help fuel next
generation
learning solutions
11. Typical campus security deployments
1
Siloed
systems
Visitor screening,
badging/access controls,
communication, and video
surveillance run as separate
systems
None/outdated
equipment
Hidden risks around potential
critical points of
communication failure
2
Reactive
functionality
Unclear policy and inability to
identify early indicators of
potential risks
3
Inadequate :: Costly :: Slow in Responsiveness
12. Preparation for All Safety Risks and Hazards: DHS Model
Preventions
Deter events through over-watch
presence and vigilance of authority.
Identify possible threats before they
can take shape.
Protection
Control access and monitor
assets and public behavior.
Leverage data sources for
awareness and mitigate issues
before they can occur.
Mitigation
Detect critical events and direct
people, resources, and processes
to minimize risk. Direct potential
victims away from harm and
toward safety.
Response
Optimize response to threats,
save lives, and protect the public.
Enable collaboration within and
across functional groups e.g.
facilities staff, administrators,
police, fire, medical, and public.
Recovery
Aid in the recovery process information
management and situational awareness.
Before an Event During an Event
After an Event
13. • Unify - Isolate physical security
systems, video and data across
the school district
• Visualize - Command and
control across all physical
security systems with full
immersion and real-time alerts
• Locate and Notify - Dynamic
heat Map and building floor plan
indicating sensor locations, live
video and alerts
• Integrate real-time social media
feeds to improve situational
awareness & aid first
A unified view of school or campus alerts and actions
14. WhatYou Should Be Looking For?
WiFi as a Service features Business, technical, and financial benefits
User or device fingerprinting
Reliable and secureWiFi connectivity
Customizable splash page for guest users
PerWLAN, user, and application bandwidth control
Easy to interpret management portal
Location based services*
Open API for custom application development
Rapid deployment to accelerate ROI
Exceptional end user WiFi experiences
Simple employee and guest on-boarding
Indoor location tracking of people and things*
Lower the expense of keeping wireless expertise in-house
Eliminate the cost of a separate Bluetooth network (optional)
A simple cost per square foot pricing model with CapEx or OpEx options
15. Our OnDemand
Services provide
greater customer IRR
and ROI
Our I2E methodology
ensures every technology
project is aligned to
business goals
We proudly employ
a customer-first
support model
Highest certifications
in today’s modern
networking
architectures
IE’s differentiators
At Internetwork Engineering, we are wireless experts and proud to be people that truly connect people
Top-notch wireless
expertise across
many industries
16. Connect with IE!
Visit us online at: www.ineteng.com
Follow us on social media:Twitter | LinkenIn
Join us at one of our next events
Editor's Notes
Perform introductions
Qualification questions
WiFi Qualification Process - Determine customers desired outcomes (from the WiFiaaS Standard Operating Procedures document)
What’s your strategy to increase revenue? (acquire new customers vs sell more to existing customers)?
What are your plans to improve the customer experience?
How are you engaging customers to determine their needs and experience with your products, store, etc.? (what channels, social, website, call center, etc. and what tools)?
What use cases have you considered for engaging customers on their mobile devices while at your establishment?
In what order have you prioritized the use cases and why?
What solutions do you currently have or are you considering to address these use cases?
Do your use cases need the ability to “push” information to a mobile device or also receive information back…like with a blue dot wayfinding map or something similar?
If any use cases require location mapping, how accurate does it need to be and why? (1 meter, 3+ meters)
WiFI is now expected everywhere. Unfortunately most networks are not designed or maintained to the level that would grant a good end user experience. This creates doubts and concerns about the IT team.
How are you currently staffed for IT infrastructure, particularly network and wireless. (over staffed, under staffed, etc. by how much)?
What Key Performance Indicators (KPIs) does the business use to measure IT and how are you performing against them, particularly for network access?
Do you have the advanced skills and/or desire to manage your wireless network?
What use cases has the business considered for engaging customers on their mobile devices while at your establishment?
Determine WiFi needs, coverage, through put, device types and quantities, etc.
Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
And our solution doesn’t just end at the campus – you can apply our solution set more broadly like student school buses as well
Note location based services are and overlay. Device intelligence is included in the base price. The base is the platform and the launching point for additional subscription services. Location based asset tracking, location based end cutomers analytics, wayfinding, application development are all on my roadmap
That’s the ideal – but in reality, what we find when we begin working with customers is:
They’re using siloed security systems – access control systems that they may have put in place 2 years ago, video surveillance systems that were installed 5 years ago and no communication system that can be triggered or integrated by either system
In addition, so much of the equipment schools are using vary in age and capability. In a 25-school district, each school may have installed video cameras and varying capability at different times, so some are brand new but more often, many are 8-10 years old.
And finally, all schools have processes and technology that are reactive – so if a crisis happens, they can go back and look at access logs, or video frames of incidents but no systems in place that could alert them of potential issues before they happen – e.g., more students or foot traffic in particular area that is substantially higher than normal or an individual that has been banned or suspect has now entered a campus.
The result is we find that the systems and processes most campuses have in place are inadequate, costly to maintain and monitor, and slow in aiding them to respond quickly during and after events.
[Note: this is a good place to pause to ask questions about what systems they have in place today? How old? How do they maintain the equipment? What are the resources required? How do their access controls and IP cameras communicate together today? Can they?]
When we talk our customers, campus safety and security is a concern for students, parents, faculty, and school officials. Recent events have brought attention to specific policies, procedures and technology that needs to be in place.
And of course, everyone is looking for systems and technology that can help:
Before an event: Provide prevention capability to identify potential issues or threat and ongoing protection that provide capabilities such as campus access controls and monitoring systems to keep watch on campus activity and behavior
During an event: Providing contextual, relevant information to first responders and other key personnel to minimize response times and enabling them to implement the most appropriate course of action
After an event: Enabling real-time information to facilitate communication with broader community