Sigh. I don’t know what this is even supposed to be anymore.
Sigh. I don’t know what this is even supposed to be anymore.
Whether it’s in our personal relationships or technical careers, honesty and transparency go a long way. None of us are perfect, and even our best efforts can be undermined by an errant cut and paste, a cocked connector, or any number of soft or hard goof-ups. You know the routine- fix it quick, own up to it, and have a talk with yourself (even if the boss gives you a free pass) about what you’ll do different next time to not repeat the error.
Transparency and honesty show character and confidence- you’re big enough to admit your snafus, because they hopefully don’t happen often. But take it in the opposite direction and your credibility goes in the toilet. Show that lack of transparency or repeat the offense too often, and there may be no salvaging your good name. None of this is news, right? And what does this have to do with networking?
Consider this message that many Meraki customers recently received:
In this case, I lost a handful of floor plans that had APs placed on them from just a couple of my many sites, other people lost more. Meraki came out with guns a’ blazin’, and basically said “we screwed up”. I like the approach, and I also value that the cloud dashboard provides a natural conduit for the vendor to push information in front of the customer.
Then there’s this sort of thing, from Aruba, Cisco, and other vendors:
That one came in my email, and the proactive notice is appreciated as it saves me from having to go out and dig around. But… vendors can do more. Even in the absence of the ability to push notifications as with a cloud dashboard, they can leverage email culled from support contracts to warn of catastrophic bugs ahead of customers hitting them.
I’m not inviting vendors to spam us with every bug that any customer hits, as that does nobody any good and wouldn’t be practical. But I can remember a day when my environment was ground zero for discovering a fairly catastrophic bug that had profound implications for the stated capabilities of a given hardware platform. As best as I can tell, pretty much no other customers were made privy to the information, and I saw at least half a dozen cases over the next couple of years where the same limitation was hit (the product data sheet should have been updated to reflect the discovery- it was that bad and blatant). Customers talk and share information. This situation felt real, real sleazy from where I sat, and seemed a natural candidate for sharing with anyone who had that component on paid support. Instead, vendor credibility was bludgeoned.
I like these from Cisco, released quarterly (some Cisco-sensitive content removed from attached):
This is something all vendors should be doing. At the same time- there is so much bad code out there, customers deserve better communications on what really shouldn’t be used. It’s just confusing as hell when the “recommended” code is several versions behind others that are out in the wild available for download. I propose crystal clear warning labels on the download page, and calling the non-recommended code versions “beta”, as they often feel as such.
In closing, whether “honesty is the best policy” is applicable, or “sunlight is the best disinfectant” seems more appropriate, you get the point. Enterprise systems just cost too much and budget-minded IT teams are being tasked with doing ever more with less resources. We need that transparency thing from vendors, now more than ever. It keeps us from making mistakes that can be prevented if we only knew what the vendor already knows, and keeps the vendor’s credibility in good standing- and that is one thing you can’t put a price on.
It’s not often that most of us get to spend time with product managers at big-name Silicon Valley network companies. I’ve been extremely fortunate in this regard through my participation in the Tech Field Day franchise, and recently had the opportunity to once again hang out for a bit with Netscout, in their own offices. The topic of this visit was the company’s super popular AirCheck G2, and our host was the awesome Chris Hinsz. (Chris makes the rounds at a lot of conferences and industry events, and is passionate about helping to make the WLAN world a better place. If you ever get the opportunity to talk with him, I guarantee it’ll be time well spent.)
If you are not familiar with the AirCheck G2 yet, let’s get you squared away.
The G2 is Generation 2, given that THIS AirCheck is the follow on to the original Fluke Networks AirCheck. The division of Fluke Networks that developed the AirCheck was bought by Netscout, hence the vendor name change along the way. If you’re interested in a unique way the original AirCheck was put into service for law enforcement, have a look at another Network Computing article I did back in the day. But alas, I digress…
Back to Mobility Field Day and the G2.
Hinsz did two sessions for MFD. In the first, he provided an intro to the tester and the handy Link-Live cloud service for those who may not be familiar with it. The video is here. He also provided insight into advanced tips and shortcuts on the G2, which you can review in this video. Even if you own and use a an AirCheck G2, you just might find something new to try via these videos.
Aside from the two sessions referenced here, it was a pleasure talking with Hinsz and his team about what else is going on with the AirCheck G2. This awesome unit is truly one of the favorite tools used by many a WLAN pro given it’s versatility and portability. It’s a safe bet that we’ll be hearing more about the AirCheck story as Netscout continues to listen to what it’s customers need, given that we’re only a couple of years into the life-cycle of this tester.
Mojo Networks never fails to provide an interesting presentation. Recently, I sat in Mojo’s conference room in San Jose for the fourth time in roughly as many years to hear what the company is up to, and what their vision for the future is. At Mobility Field Day 2 (MFD2) I found myself fairly riveted to CEO Rick Wilmer’s introductory session. Why? Because if Wilmer’s vision of WHAT COULD BE takes root, it could disrupt the WLAN industry (and beyond) in some profound ways.
Wilmer pulled no punches describing what the typical margin is for wireless access points sold to customers- 70%. That’s 70% per AP, times hundreds of thousands of APs generating much revenue for WLAN vendors. Wilmer sees a world where the advantage shifts to the customer when it comes to wireless access points, but we’ll get to that.
Then there’s vendor lock-in… I remember back in the early days of LWAPP (the thin AP protocol), I had very naive and childish visions of a protocol so sparkly-wonderful-special that I might be able to mix components from Vendor A and Vendor B on the same damn network. I was all a-tingle, for about 30 seconds. Then I was slapped with the reality that what comes out of the antennas might be mostly-standards-based, but there is and would continue to be zero compatibility between vendors under the hood. Ah well, I was a silly wireless child then. But Wilmer’s vision touches that as well.
If you watch the MFD2 Wilmer session, you’ll not hear a CEO harping on buzzy claims of Machine Learning and crazy wonderful feature sets. (That all comes later in Mojo’s other presentations, and even then what could be a Bucket o’ Buzzwords is really just incorporated into what Mojo does, versus the vendor hanging a bunch of impressive terminology in the air and hoping that you salivate over it.) Wilmer paints a vision of commodity-priced access points- and eventually switches and security appliances- being cloud managed in an open source framework where innovation is driven by the greater technical community instead of any single vendor’s skewed view of the feature world.
Cloud management, software-defined everything, and open hardware standards CAN replace bloated, proprietary systems as shown in different examples made by Wilmer’s team in presentations that came after his. The technical stuff is interesting, and you should watch Mojo’s story from MFD2 all the way through. But just as significant is Mojo’s idea of a new business model that flies in the face of convention, and could capitalize on the success of the Open Compute Project (OCP) in building white box data center components as that model stretches into wireless access.
It’s a fairly bold premise, and I applaud Mojo for taking a truly unique and interesting path. Hopefully they find some big allies soon to help push this vision along.
Some of my past coverage of Mojo Networks (and Airtight)
In a mind-blowing release of leaked intelligence reports this week orchestrated by Archimedes McGeraldo-Fitzperhume, the head of WifiLeaks, the WLAN community is scrambling to digest and to react to a series of shocking revelations.
This tight-knit ecosystem of designers, engineers, installers, vendors, and salespeople is no doubt dumbfounded to it’s core over secrets that are no more, and it’s a safe bet many are scrambling to come up with damage-control strategies in the face of these shocking allegations.
Among the most salacious bombshells:
This story continues to unfold, and it will no doubt get worse before it gets better.
<WTF did I just read? This was actually an April 1 (April Fools’ Day in the US) draft that I started, and never published. Just found it, and pushing it out for giggles.>
It’s always refreshing when a truly original story comes along in the WLAN world. Mist Systems isn’t quite brand new (I wrote about them for Network Computing back in 2016) but their approach is fresh enough to cause some good energy in the room when you do get the chance to hear a briefing from the company’s top dogs, and I recently got that chance again at Mobility Field Day 2.
Here’s the thing about Mist, now- today: if you’re not careful, their story can sound like another one of the many from network vendors where terms like AI and Machine Learning are bandied about like the Buzzword Flavors of the Month. But Mist was talking this language well ahead of the current curve. Where established vendors are largely painting their long-running gear up in a coating of hype and APIs, Mist is actually new magic built by data scientists and proven network visionaries. It’s heady, exciting stuff.
But can Mist make a legitimate go of it as new player in the Big Customer Kickball Game where most current potential customers have already chosen a side? Here, only time will tell as Mist’s marketing paradigm is put to the test. I can share my own opinions and gut reactions from the Mobility Field Day for you to consider, and welcome any dissenting opinions or comments:
In Mist’s Favor
I really enjoyed what I saw and heard from Mist, and it’s obvious that the company’s leaders truly believe in their baby’s potential. And- you don’t just have to hear my opinion… form your own after watching the Mist MFD session here.
The “Tech Field Day” series of events has been an important part of my professional development life for the last several years. I’ve had the good fortune to be a frequent delegate, and I have watched Wireless Field Day (WFD) morph into Mobility Field Day (MFD) in parallel with the changing nature of the WLAN industry. As we get ready to descend upon Silicon Valley for MFD2, I can’t help but think about what this round of vendor participants says about the general state of WLAN things.
This go round, you won’t see the usual suspects many folks think of when contemplating enterprise Wi-Fi. MFD2 is more about performance measurement and alternatives to the WLAN same-old with Mist Systems, Nyansa, Cape Networks, Mojo Networks, and another performance measurement vendor to be announced soon.
So why no bigtime flashy AP makers?
Here’s my take on that, and there are a few contributing factors:
By now, WLAN is so tightly integrated with the rest of the network (in most environments) it doesn’t command the stand-alone Wow Factor it once did. But… in the rush to build feature-heavy (I’d even say “gratuitously bloated”, but I can be a wanker about these things) super systems, the big guns haven’t done all that well in natively providing many of the capabilities that MFD 2’s vendors will be briefing us (and those tuning in live) on.
From innovative ways of showing what’s really going on with a given WLAN to to fresh approaches to WLAN architecture (as opposed to butting an API into years’ old code and declaring it new SDN), MFD2 will be interesting.
If you tune in live and would like to get a question to the vendors as they present their stuff, make sure to hit up a Delegate or two via Twitter so we can ask on your behalf.