Google and Apple Should Be Giving Network Admins A Cut

It’s a bit curious how at least part of the relationships between device providers and customers are catalyzed by unsung heroes in the equation: wireless network administrators. The contemporary model seems to go like this:

  • Big company teases out an upcoming product release with well placed leaks and sneak-peaks
  • Media fan-boys and fan-girls promote the living bajeezus out of the new devices before and after release, rarely mentioning   their technical shortcomings in any meaningful way
  • Customers fall in love with the new toys; usually the romance starts on the home network
  • Customers high on their new-found gadget love rush into the work environment with their slick new products.  And banking on the accuracy of incomplete articles like this, get frustrated when said gadget doesn’t spring to life on the business network
  • A call goes out to the WLAN admin, who has to decide whether a one-off work-around and likely violation of  organizational policy is in order to get the device in service

Let’s talk about the Chromecast specifically. First and foremost, I love mine. It gets a tremendous amount of use at home. On the work WLAN, it’s not so pretty. Many enterprises disallow ad hoc wireless networks, and the Chromecast needs ad hoc connectivity for at least some of it’s functionality. Then there’s the same issue that Google Glass, early AppleTVs, cheap wireless printers (and not so cheap wireless printers), and a raft of other popular devices that users want to bring to work suffer from; they don’t do any sort of real wireless network security. If you have a mechanism in place to provide MAC exceptions on open or PSK-based network (which isn’t always the case), you can accommodate some of the toys. Unless, like with Bonjour-based devices, mDNS requirements and home-centric network requirements cause you to jump through more hoops on your carefully-designed WLAN. We won’t even get into legacy client chipsets that need data rates that most of us vacated five years ago to gain better performance from our expensive wireless networks.

No matter the exact tech details that lead to tension between consumer devices and business WLANs, there are only two paths to resolution:

  1. Device makers stop screwing over network admins, and bake in compatibility for ALL networks, not just the one behind my cheesy little Linksys router. Or…
  2. Wireless network solutions come with enough sophistication to let toy-toting users get their own limited devices on the air, while also preventing the devices that can use real security from following the toys down the same logical path, while bridging multiple operational realms so the full-blown secure client can interoperate with gadget that has to be handled differently.

Hats’ off to WLAN vendors that are moving their own cheese closer to #2, but that sort of sophistication comes with a lot of cost to the customer and complexity that wouldn’t be required if #1 was simply provided by the Googles and Apples of the world.

As it is, there are a lot of WLAN admins out there right now struggling to accommodate wonderful new devices that we should all be celebrating for what they bring to our users, but we really are getting the short end of the stick. If we can’t accommodate the Chromecast or whatever, we’re viewed as obstructionists that can’t appreciate disruptive new tools. If we can get them going onesy-twoseys, we stand on a slippery slope of support nightmares when the devices misbehave (or lose their settings on power down), or when all of the sudden we’re making MAC exceptions and special ACL/firewall rules all over the place and bypassing our own security perimeter to accommodate the inadequate devices.

So uh, Google and Apple- please pick up a WLAN calendar- the industry is fast entering the 5th generation of WLAN technology. So why are two of the richest companies on the planet still putting out products that can’t go past 2nd generation security?

If you’re not gonna spend the bucks on finishing  development on the products that you absolutely must know are going to find their ways onto our business WLANs, how ’bout putting us WLAN  admins on your payroll? After all, your success frequently comes down to our creativity in addressing your shortcomings. 

7 thoughts on “Google and Apple Should Be Giving Network Admins A Cut

    1. wirednot Post author

      Same as any other- you only use pre-share security, change your design to allow broadcast, etc. In other words… you’re not likely to get it to work without creating a lot of problems along the way.

  1. Dale Buckey

    With regards to your Chromecast example. Are you familiar with @Airtame? (Supposedly Chromecast on steroids) Airtame claims their HDMI connection can be password protected and NOT interfere with existing internet connections. (It’s in their software)

    It looks like it could be a valuable tool in the classroom?

    Dale Buckey @WiFiConnections

    *Disclaimer- I am an early investor with Airtame. Translation- I bought a unit with IndieGoGo

      1. dbuckey

        You are correct. For now-

        From Airtame-
        “Mirroring an Airtame-equipped PC onto an iOS or Android device would be possible through the use of an app, but at this stage in development Airtame is focusing purely on desktop and laptop screen sharing. There are no immediate plans for an iOS or Android app, though one is on the roadmap and ought to be forthcoming later in 2014.”


      2. wirednot Post author

        Our typical model- faculty walks into room with a mobile device and wants to project their display to the projector that is tethered to the podium computer. This is where Mersive shines, and kicks Apple’s ass as it works on any and all Apple/Windows/Android. It’s pricey, but you’re also not hosing the network up to accommodate the Apple-only Bonjour mindset. Airtame looks really nice, but laptops don’t tend to be the problematic device form factor for us. I’d way rather invest in something that works the same way for all clients, requires one set of instruction documents, one operational paradigm, etc.

Tell me what YOU think.

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s