SlideShare a Scribd company logo
1 of 25
Download to read offline
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 1
The Inevitable ‘Appification’ of Wi-Fi
From transport to application & service delivery
Tweet your comments with #WiFun
Devin Akin
Chief Evangelist
AirTight Networks
Devin@AirTightNetworks.com
@AirTight
@DevinAkin
http://blog.airtightnetworks.com/
Appi-Fi
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 2
Devin ‘Devinator’ Akin
Chief Evangelist at AirTight Networks
• @DevinAkin
• Devin@AirTightNetworks.com
2001 - 2009 2009 - 2013
2013 - Present
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Source: Forbes, July 2012
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 4
User Experience
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Mobile-First User Interface Strategy
5
Modern, Simple
Accessible on any smart mobile device
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Logical & Intuitive Usability
6
Freeform search in location tree
Folders represent logical
grouping (geographic, brands,
other attributes)
Nodes are at the lowest level in
the tree and represent floors
Controls to add, rename, move,
delete folders/nodes
Wireless networks & security management
in logical context
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 7
Cloud. Yes, cloud.
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Cost Competitiveness
8
The cloud leverages resources sharing and
economies of scale
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Public Cloud Private Cloud VMware Appliance
Flexible Deployment Options
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
“Zero-Touch” Provisioning
10
Scale without adding IT resources
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
SMAC: Cloud-based Social Wi-Fi and Analytics
11
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Cloud Footprint
12
Massively scalable, multi-tenant, fault-tolerant cloud architecture
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Managed Service Provider (MSP) Enablement
13
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Pricing Models
Avoid feature based licensing
Avoid user seat based licensing
üPure OPEX
üBundled
üCAPEX
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 15
Application.
What Application?
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 16
Does Your Wi-Fi Match Your Business?
Retail/Hospitality:
Guest Wi-Fi
Captive portals
Analytics
PCI compliance
WIPS
Loss prevention
Education:
Guest Wi-Fi
Social integration
CIPA
BYOD onboarding
No Wi-Fi zones
Cellular detection
Banking:
Guest Wi-Fi
WIPS
PCI compliance
Identity
management
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Social Wi-Fi and Analytics
17
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Social Wi-Fi Flow
18
1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Social Analytics for Opt-in Customers
19
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Sample Presence Analytics (Anonymous)
20
No.ofvisitorsNo.ofvisitors
Dwell Time
Total Foot Traffic
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 21
Why Should IT Care?
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
New Businesses Forces: SMAC!
22
Convergence of
social, mobile,
information
(analytics), and
cloud will
transform
business and IT
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Collaborate or Die
23
© 2013 AirTight Networks, Inc. Proprietary and Confidential.
Collaborate or Die
© 2013 AirTight Networks, Inc. Proprietary and Confidential. 25
Are We Having #WiFun Yet?
Tweet your comments with #WiFun

More Related Content

What's hot

Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...NetworkCollaborators
 
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...Tanaza
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesAllSeen Alliance
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressFelipe Lamus
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalSarah Reinbolt, MBA
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
Hypervault Sensitive Data Manager
Hypervault Sensitive Data ManagerHypervault Sensitive Data Manager
Hypervault Sensitive Data ManagerThierryDupont20
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki NetworkCollaborators
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...NetworkCollaborators
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
Cisco aironet 1815 series access points
Cisco aironet 1815 series access pointsCisco aironet 1815 series access points
Cisco aironet 1815 series access pointsIT Tech
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsToufik Zemri
 

What's hot (20)

Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
 
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
A DISRUPTIVE APPROACH TO SMART WI-FI INFRASTRUCTURES to enable Smart Cities a...
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn Devices
 
Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
A stepped approach to unified access
A stepped approach to unified access A stepped approach to unified access
A stepped approach to unified access
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview Final
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
Hypervault Sensitive Data Manager
Hypervault Sensitive Data ManagerHypervault Sensitive Data Manager
Hypervault Sensitive Data Manager
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Introduction to Volansys Technologies
Introduction to Volansys TechnologiesIntroduction to Volansys Technologies
Introduction to Volansys Technologies
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Cisco aironet 1815 series access points
Cisco aironet 1815 series access pointsCisco aironet 1815 series access points
Cisco aironet 1815 series access points
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
NG EXPERTS Services and Solutions
NG EXPERTS Services and SolutionsNG EXPERTS Services and Solutions
NG EXPERTS Services and Solutions
 

Viewers also liked

Flurry App Circle Mobile Monday
Flurry App Circle Mobile MondayFlurry App Circle Mobile Monday
Flurry App Circle Mobile Mondayspgalligan
 
Google既有商業模式的破壞者
Google既有商業模式的破壞者Google既有商業模式的破壞者
Google既有商業模式的破壞者guestaaa2f4
 
Спортивная площадка
Спортивная площадкаСпортивная площадка
Спортивная площадкаalexzaw71
 
BD Lysander
BD LysanderBD Lysander
BD LysanderSSHF
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...AirTight Networks
 

Viewers also liked (6)

Flurry App Circle Mobile Monday
Flurry App Circle Mobile MondayFlurry App Circle Mobile Monday
Flurry App Circle Mobile Monday
 
Melek yatirimcilar
Melek yatirimcilarMelek yatirimcilar
Melek yatirimcilar
 
Google既有商業模式的破壞者
Google既有商業模式的破壞者Google既有商業模式的破壞者
Google既有商業模式的破壞者
 
Спортивная площадка
Спортивная площадкаСпортивная площадка
Спортивная площадка
 
BD Lysander
BD LysanderBD Lysander
BD Lysander
 
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
WLPC: Staying on Top of Security and Spectrum Rules in WIPS Deployments by He...
 

Similar to The Appification of Wi-Fi: Cloud-Based Social Analytics

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013AirTight Networks
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Networks, Inc.
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseJason Boud
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT GamesMike Kavis
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Xirrus
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing InnoTech
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointMaureen Donovan
 
Aruba_Mobile_Engagement for Developer Partners
Aruba_Mobile_Engagement for Developer PartnersAruba_Mobile_Engagement for Developer Partners
Aruba_Mobile_Engagement for Developer PartnersDiana Laboy-Rush
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Claudia Sträter
 
Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Jason Boud
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityCyren, Inc
 

Similar to The Appification of Wi-Fi: Cloud-Based Social Analytics (20)

Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013AirTight Corporate Presentation _ July2013
AirTight Corporate Presentation _ July2013
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial Enterprise
 
Extreme IoT Games
Extreme IoT GamesExtreme IoT Games
Extreme IoT Games
 
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
Did Your Wi-Fi Performance Expire Before the Warranty Did? | Steps to Providi...
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
 
Aruba_Mobile_Engagement for Developer Partners
Aruba_Mobile_Engagement for Developer PartnersAruba_Mobile_Engagement for Developer Partners
Aruba_Mobile_Engagement for Developer Partners
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014Cisco presentatie 25 juni 2014
Cisco presentatie 25 juni 2014
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0Airheads main conference slideshare v1.0
Airheads main conference slideshare v1.0
 
IDC Aruba Webinar - 3 Feb 15
IDC Aruba Webinar - 3 Feb 15IDC Aruba Webinar - 3 Feb 15
IDC Aruba Webinar - 3 Feb 15
 
Webinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud SecurityWebinar: Dispelling the Myths about Cloud Security
Webinar: Dispelling the Myths about Cloud Security
 

More from AirTight Networks

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon DeploymentAirTight Networks
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareAirTight Networks
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiAirTight Networks
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014AirTight Networks
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23AirTight Networks
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTSAirTight Networks
 

More from AirTight Networks (7)

iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check  _ Essential Considerations for an iBeacon DeploymentiBeacon Reality Check  _ Essential Considerations for an iBeacon Deployment
iBeacon Reality Check _ Essential Considerations for an iBeacon Deployment
 
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via SlideshareThe Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
The Impact of IoT on Enterprise Wi-Fi by AirTight Networks via Slideshare
 
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-FiMarriott Fined 600K by FCC for Blocking Guests Wi-Fi
Marriott Fined 600K by FCC for Blocking Guests Wi-Fi
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
 
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23SMAC - Presentation from RetailWeek Technology Summit, Sept 23
SMAC - Presentation from RetailWeek Technology Summit, Sept 23
 
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
SMAC _ Can It Maximise Staff and Customer Engagement?  RWTSSMAC _ Can It Maximise Staff and Customer Engagement?  RWTS
SMAC _ Can It Maximise Staff and Customer Engagement? RWTS
 
Cafe Latte
Cafe LatteCafe Latte
Cafe Latte
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

The Appification of Wi-Fi: Cloud-Based Social Analytics

  • 1. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 1 The Inevitable ‘Appification’ of Wi-Fi From transport to application & service delivery Tweet your comments with #WiFun Devin Akin Chief Evangelist AirTight Networks Devin@AirTightNetworks.com @AirTight @DevinAkin http://blog.airtightnetworks.com/ Appi-Fi
  • 2. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 2 Devin ‘Devinator’ Akin Chief Evangelist at AirTight Networks • @DevinAkin • Devin@AirTightNetworks.com 2001 - 2009 2009 - 2013 2013 - Present
  • 3. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Source: Forbes, July 2012
  • 4. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 4 User Experience
  • 5. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Mobile-First User Interface Strategy 5 Modern, Simple Accessible on any smart mobile device
  • 6. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Logical & Intuitive Usability 6 Freeform search in location tree Folders represent logical grouping (geographic, brands, other attributes) Nodes are at the lowest level in the tree and represent floors Controls to add, rename, move, delete folders/nodes Wireless networks & security management in logical context
  • 7. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 7 Cloud. Yes, cloud.
  • 8. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Cost Competitiveness 8 The cloud leverages resources sharing and economies of scale
  • 9. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Public Cloud Private Cloud VMware Appliance Flexible Deployment Options
  • 10. © 2013 AirTight Networks, Inc. Proprietary and Confidential. “Zero-Touch” Provisioning 10 Scale without adding IT resources
  • 11. © 2013 AirTight Networks, Inc. Proprietary and Confidential. SMAC: Cloud-based Social Wi-Fi and Analytics 11
  • 12. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Cloud Footprint 12 Massively scalable, multi-tenant, fault-tolerant cloud architecture
  • 13. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Managed Service Provider (MSP) Enablement 13
  • 14. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Pricing Models Avoid feature based licensing Avoid user seat based licensing üPure OPEX üBundled üCAPEX
  • 15. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 15 Application. What Application?
  • 16. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 16 Does Your Wi-Fi Match Your Business? Retail/Hospitality: Guest Wi-Fi Captive portals Analytics PCI compliance WIPS Loss prevention Education: Guest Wi-Fi Social integration CIPA BYOD onboarding No Wi-Fi zones Cellular detection Banking: Guest Wi-Fi WIPS PCI compliance Identity management
  • 17. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Social Wi-Fi and Analytics 17
  • 18. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Social Wi-Fi Flow 18 1. Custom branded captive portal 2. Customers turn loyal promoters 3. Engage your customers
  • 19. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Social Analytics for Opt-in Customers 19
  • 20. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Sample Presence Analytics (Anonymous) 20 No.ofvisitorsNo.ofvisitors Dwell Time Total Foot Traffic
  • 21. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 21 Why Should IT Care?
  • 22. © 2013 AirTight Networks, Inc. Proprietary and Confidential. New Businesses Forces: SMAC! 22 Convergence of social, mobile, information (analytics), and cloud will transform business and IT
  • 23. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Collaborate or Die 23
  • 24. © 2013 AirTight Networks, Inc. Proprietary and Confidential. Collaborate or Die
  • 25. © 2013 AirTight Networks, Inc. Proprietary and Confidential. 25 Are We Having #WiFun Yet? Tweet your comments with #WiFun