Tag Archives: Lee Badman

Hamina, bitches…

So, how long HAS it been since a new WLAN design tool hit the market? Arguably, this has been a space long-dominated by de facto monopoly. And sure, most of us in WLAN Land created and supported the monopoly. It was working for everyone. But then circumstances changed. Companies were bought. People changed. And people have a way of making things great, or laying waste to years-cultivated credibility. Such is life.

But wait- I was talking about WLAN design tools. There’s a new one out there, you realize… Now, I know that you know that I know that a whole bunch of us already know about Hamina. It’s really a rather small community of wireless professionals, and people talk to each other. They share. And Hamina is definitely a hot topic right now.

Beyond just being weary of what an incumbent tool vendor might be doing under new management, I think many of us are ready for a more lightweight design experience. Lighter on the wallet, lighter on the hardware required to run the tool, and lighter on the fable that Wi-Fi design is something akin to rocket science that requires razor precision. After a while, some stories start to collapse under their own weight. That’s not to say existing tools aren’t still effective, but paying ever more to use to use them is in no way a privilege. The notion of who is working for who sometimes gets blurred,

So why look at Hamina? To start with, it is feature-packed for WLAN design, on par with any leading tool. It’s in version 1.0 currently, and feels very intuitive to use. Everything you’d expect to see for 2.4, 5 and 6 GHz are there. Bring in the CAD files if you’d like or do your walls and such manually. You can model your designs, and then model what a client (using various device types) would experience in the environment as they move around. It works well in my experience, so far as a design tool.

Differentiators? Hamina is browser-based. Run it on Windows, run it on Mac without installing software. Run it on a locked down corporate machine. And for me at least, the 12-month cost for the WLAN-only version is a fraction of what the competitor charges just for renewal after purchase. Add in 4G/5G features, and the cost is still quite comfortable for the higher tier. And it all seems to work well in my experienced opinion- even in the early versions. There are other niceties in the mix that I may or may not personally use- BLE and LoRaWAN planning, planning for cable runs and network switches and such.

Take a look at Hamina, says I.

Hamina, bitches!

We Shouldn’t Need Wyebot, But We Do

Just a taste of the Wyebot UI

Wireless network systems are expensive- like insanely expensive- and they are only one part of a given enterprise network environment. You can spend top dollar on market-leading WLAN hardware, switches, RADIUS servers, DNS and DHCP systems, Active Directory resources, security stuff and more You can have veteran IT craftspeople design, install and configure it all- and still have problems that are not only hard to solve but also hard to even start looking at when an end user tells you they aren’t happy. It is what it is, and many of the built-in tools that SHOULD help don’t do a particularly good job when you most need them.

Enter Wyebot.

I’ve been dipping toes in the Wyebot waters for a few years now, and was happy to see the Massachusetts-based company presenting at Mobility Field Day 8. Through the years I have been less than impressed after testing other 3rd party sensors and monitoring overlays (excluding 7signal, whose methodology I find to be quite effective), as false alarms are the norm and the systems frequently become just another high-cost glass of pain to ignore shortly after implementation.

I’ve personally found Wyebot to work well in effectively characterizing the WLAN space it operates in, exposing all of the WLAN-oriented details a wireless admin needs to know about. What’s there? How are the SSIDs configured? Where is contention and the potential for trouble? Which Wi-Fi networks are deviating from best practices? That’s the easy stuff. It also does highly-reliable synthetic testing that you define (one area where other sensors just don’t get it right) to help tell when any of the non-WLAN parts of the network are misbehaving in ways that frequently tarnish the WLAN’s reputation. I like the information delivered from the monitoring of spectrum, client behavior, and testing of upstream network resources. I find Wyebot to be a force multiplier in that it watches and ACCURATELY reports on what I care about when my pricey wireless system can’t natively get it done.

All network problems feel wireless to wireless users.

I particularly like that Wyebot not only has a robust packet capture capability for problem analysis, but you can also import wireless pcap files taken outside elsewhere using Wireshark on a laptop (just one example) and display that capture through the graphical Wyebot UI for Wyebot’s analysis of that capture. I also like that I can do wireless backhaul from the Wyebot sensors if needed.

The company is generous with free trials, and has some interesting case studies that show how organizations are using the solution.

Have a look at the Mobility Field Day 8 presentations by Wyebot. Also, see my past blogs about Wyebot here,

Well-designed and maintained wireless networks ought to not need outside tools to help keep them running well. Unfortunately, WLAN professionals know that we live in a very imperfect world. Unfortunately, not all of those outside tools are particularly effective, but I personally like what I get out of Wyebot.

The Thing About Ventev

Having just participated in Mobility Field Day 8, I got to spend some quality time with Ventev– during which I had an epiphany of sorts. We’ll get to that in a moment.

I’ve been fortunate enough to participate in many of the Field Day events through the years. They know me out there in Silly Valley where vendors and Field Day delegates come together and discuss industry trends, new products, what works and what sucks, and so on.

Being a veteran Field Day-er, I understand the routine. Vendors present what they want the world to know, delegates ask questions and make comments to dig deeper or provide criticism (some constructive, some because often the vendors can be decoupled from the reality of what end users actually need). How effective a Field Day is depends on (in my opinion) how effective the vendors are at following the guidance given to them for their presentations by Field Day management, and the quality of the delegate’s questions and comments. There are human beings involved on both sides of the table, and sometimes one side or the other just makes a given presentation laborious. Maybe boring content is offered a mile wide and an inch deep, or perhaps a given delegate just cannot shut up as they enjoy the sound of their own voice as they redesign the vendor’s product for them in real time. Again, the human factor.

One prevailing theme from the vendor side is this: WE THINK THIS FEATURE OR THINGY IS TRULY INNOVATIVE AND SO WE WILL NOW TRY TO CONVINCE YOU DELEGATES AND THE FOLKS AT HOME SO YOU WILL PAY US LOTS OF MONEY FOR THE HARDWARE AND A SHITLOAD OF LICENSES BUT YOU MAY NOT IMMEDIATELY SEE THE VALUE SO WE GOTTA WALK YOU THROUGH IT WHILE WE HOPE YOU DON’T ASK TOO MANY QUESTIONS THAT COULD CUT INTO OUR STORY AND HENCE OUR BOTTOM LINE.

Nothing new here.

Let’s get back to Ventev, shall we? I promised you an epiphany.

So I’m listening to their Mobility Field Day 8 presentations about specialty enclosures, solar powered network “stations” (my word, not theirs) and antennas when a tidal wave of realization came over me. While network equipment vendors work hard to convince you that their often murky magic is worth the constantly elevating costs for what I often feel ought to be largely commoditized by now, Ventev sells fact. Ventev sells tangible reality. Ventev sells physics.

Whether it’s their Venvolt battery packs for survey work and temporary power needs or providing solutions for wireless access points to function out in the middle of Frozen Friggin Nowhere, Ventev doesn’t need to convince anyone of anything. When they talk about specialty antennas, their situational benefits are obvious and the physics of it all is instantaneously provable.

The Ventev narrative isn’t one of trying to out-AI or out-dashboard the other guy. They just make wireless environments better (or in some cases, even POSSIBLE). The Ventev story is end-to-end real, with no hype to sort through. No hyper-granular, squeeze-you-until-it-hurts-then-do-it-again-in-three-years-because-we-got-your-wallet–by-the-nuts-now licensing bullshit to hold your nose and pay for.

That is pretty sweet. And all too rare these days.

I suggest you get to know Ventev. Their presentations from Mobility Field Day 8 and earlier events are all found here.

A Wi-Fi Look at the GoPro MAX

That’s right, I said MAX. A hip guy like me isn’t going to have something called MIN junking up my life. I’m top shelf all the way. The GoPro MAX is a fascinating action camera that does what other GoPro cameras like the Hero 10, 9, 8, 7… all can do (which is a lot) PLUS lets you get freaky, like so:

You can do a heck of a lot more with a 360 camera- like Google street view kinda stuff. And… you can also control the camera via GoPro’s Quick app with a combination of Bluetooth and Wi-Fi (it’s also got GPS in there, and voice command capability. It just impresses the heck out of me, but each one of these works against the battery life.)

So… what does it actually DO for Wi-Fi?
Being a wireless professional, I can’t leave well enough alone and simply enjoy the magic. I gotta know what’s in play with the MAX and it’s Wi-Fi capabilities. Anything and everything you’d like to know is here, but stay with me and I’ll boil it down for you.

It’s dual-band- works in both 5 GHz (.11ac) and 2.4 (.11n). It appears to default to 5 GHz, and it uses a whopping 80 Mhz channel width. That’s right, I said 80… Don’t believe me? Well maybe this will change your doubting mind:

For giggles, here’s the 2.4 GHz side of the MAX doing it’s thing:

It’s always interesting to me to see how they craft the WLAN antennas in various tight squeeze products, and the MAX is definitely a tight squeeze product. The complete take-it-apart views are here, but this is the antenna view from that series:

What about about power? This little guy isn’t as skimpy in that department as I expected it to be, at least not in some frequency slices:

I see no way to manually manipulate channel, channel width, or power output settings. So far I love the control via Wi-Fi, but I can also see where if you get a number of these and other late-model GoPros also doing wireless ops together at an event, they certainly could impact the business/visitor WLAN in a noticeable way. Such is Wi-Fi life.

Now if you’ll excuse me, I need to make a bunch of goofy round pictures that only I find interesting…


Wanna Blog? Then Blog Already

This post was created for a ten-minute talk for the Wireless LAN Professionals Conference (2018). Want help getting started in blogging? Hopefully this blog lights a little fire for you, and I’m always happy to answer questions if you reach out.

Want to blog about Wi-Fi?

1. Take the first step. Writing, like public speaking, puts you “out there” for praise and criticism. If you’re gonna do it, do it.

2. Be yourself. Your words, your thoughts, your style. It’s OK to be inspired by others, but the world needs YOU, not you copying someone else. Write from YOUR experiences and discoveries.

3. Have something to say, but don’t force it. When the time is right to get your shareable thoughts out, you’ll feel it.

4. Put a fresh angle on the topic, whatever it is. Find something else to lead with that others aren’t discussing, some under-told feature or use case, etc. It’s OK to write about what others are writing about, but find some way to make it fresh, even if just subtly so.

5. Write often enough to stay relevant. If you last wrote back in 2015, chances are you’ve fallen off of most people’s radar. Every few weeks is OK, every few months is acceptable. Beyond that, don’t expect a lot of readers. Bonus- the more you write, the better you will get at writing.

6. Blogs aren’t novels- people have limited reading time. Don’t write more than you need to on a topic.

7. Promote, and be promoted. Get proofreading help early on if you need it; your blogging “advisor” will likely promote your blog.

8. Don’t be thin-skinned, and keep your ego in check. BTW- none of us know everything. And “experts” aren’t omnipotent- know the difference when interacting with people.

9. Any comments/feedback are worth responding to (almost). Stay respectful, and try to foster healthy dialogue. But it’s better to delete hyper-caustic comments than to reply with rancor.

10. Money can be made writing for the right outlet (or company) but generally it takes a while to build up to that- and you might have to know someone to get in the game. Unless you’re truly gifted, you won’t get rich with blogging. But you might develop a nice side income, and get other writing gigs.

In Appreciation of White Box Guest Access

“Guest Access” means different things to different people, and organizations. Certainly if you’re a traveler using hotel or conference Wi-Fi, you have a general set of expectations and desires. If you’re a company or a school, the guest wireless service you provide is likely shaped by organizational policy. And for many of us, the guest environment also tends to act a s a catch-all for client devices that don’t fit on our secure WLANs- a place for “free passes” and MAC exceptions. But the devil is in the details, and I have found finding the right guest access feature set can be difficult.

What you WANT may not be what you can HAVE

Having designed a number of guest environments for large and small networks, I’m always astounded to engage a WLAN vendor on the topic and to find how far their guest offering is from what I’m looking for (more on that in a bit). Worse, seldom do I hear “what are your requirements?” as it tends to be more like “this is what we think everyone should want and accept”.

Simplicity? Fat chance… 

Guest access can also have a lot of moving parts, depending on how it’s implemented. Overall functionality tends to be broken up and scattered across access points, controllers, RADIUS servers, credential stores, web servers, and sometimes switches. It all has to click, or you have problems. And for me, despite the typical complexity of guest services, I still find myself frustrated at features that are not included.

What worked for my environments

Years ago, for my big honkin’ 3,000 AP environment (and our small branches alike), we arrived at a desired feature set that went more or less like this:

  • Our guest SSID would equal a single dedicated guest VLAN
  • 24-hour individual self-sponsoring is a must
  • Alternatively, ANYONE authorized to use our wired or secure wireless network could sponsor a guest
  • For self-sponsoring, a ten-digit mobile number capable of accepting a text must be provided and within seconds a password would be sent
  • For large events, a shared account could be generated
  • All accounts were time limited with role-granularity
  • The system would have easily configurable firewall rules and (generous) rate limiting capabilities
  • On the admin side, we could add MAC exceptions and login-bypass
  • The system would provide NAT to preserve public IP addresses
  • Reporting would be easy, as would user quarantine (rarely used)
  • ALL OF THIS WOULD HAPPEN UNDER ONE HOOD-VIA A SINGLE INTERFACE
  • A programmer would not be needed to stitch it all together
  • Ideally, it would have vendor support (for a number of reasons, open source not desirable)

Going back those several years, our WLAN vendor (Cisco) didn’t come close to being able provide what we wanted. In their defense, nor did any other market leaders at the time. We heard that Colubris Networks had a gateway that might fit the bill, but they had just been bought by HP and try as we might, we couldn’t locate anyone that could talk with us about what we were looking for.

Then we found Bluesocket (now Adtran) and their BSC Controllers. When I first contacted Bluesocket, we came to the mutual realization that they could do about 75% of what I wanted. They weren’t really initially open to developing the self-sponsored texting and “anyone authorized can sponsor a guest” features. So… we thanked each other for our time, and I kept searching. Then a week or so later Bluesocket called back, and said they were game for a bit of development, and saw the value in what would become a feature set that they were able to market to others. They were able to do everything I was looking for in a single, kick-ass box in a matter of hours.

What Bluesocket was able to deliver after actually listening to our requirements has been in play for us for lots of years. We’ve served thousands and thousands of guests with it, along with using it as a mechanism for supporting wonky devices like Google Glass (turn head, spit) that weren’t built with enterprise security support, and so can’t be on the WLANs we’d rather they used.

It’s been absolutely great, and I know of at least three other schools that pursued the same guest access model after experiencing ours.

Looking forward

Our old Bluesocket boxes are getting, well… old. They are appliances, and Adtran seemingly has no desire to virtualize what we need into an OVA or the like. In fact, on newer Adtran wireless products, what we appreciate about the BSC has been moved to Adtran APs that we’ll never buy, so the research for a suitable replacement starts again.

The thing is, we absolutely love what we get out of our aging guest solution, and in a perfect world, I’ll find a similar third-party, one-box bolt-on for our big Cisco WLAN. (I will give Cisco another chance to catch me up on how their native guest access services have improved, but I also know that my requirements are firm). I have also inquired to Adtran one last time about the possibility of somehow preserving this wonderful magic, but the silence thus far is pretty telling.

Which brings me to Meraki. The features I need for my guest environment are pretty much included in the WLAN side of the Meraki product line, and we use it with great success in our Meraki-enabled branch sites. But… to bolt the Meraki capability up to my Cisco WLAN in a way that would replace Bluesocket, I’d need the guest features made available in the Meraki MX security appliances and not just in the AP feature set. I’m hoping to get Meraki’s ear on this anyway, because guest access needs also do tend to pop up on the wired side occasionally, too. Right now, wired guest needs are a gap in the MX.

If Meraki can accommodate, a big MX would snap in nicely where my Bluesocket sits now for guest access. If not, I’ll have to consider things like pfSense, Packetfence and other one-offs that I’d rather not get into after being happy with a commercial solution. Or, I’ll have to rethink our requirements, which would really suck, as they really are what we consider requirements, not just nice-to-haves.

There will obviously be more to follow to this evolution.  I am curious if anyone else is facing a similar situation, and how you might be approaching it.

(Please- I’d love your comments, just don’t blast me with pointless “you should switch to vendor X for your WLAN!” type feedback.) 

Starting 2015 With No More Clarity On 802.11ac Wiring Than 2014

Wireless networking has never been an arena for absolutes. There’s always wiggle room, a list of exceptions, and the “under lab conditions, but will be different in your environment” factor. To the uninitiated, it can sound like we’re either trying to make excuses or that we suffer from the inability to commit when we can’t promise discreet quantity (35 users should all get 12 Mbps at 75 feet from this access point, unless any one of these very likely things is in play…). To our our fellow Wi-Fi professionals, this frequent moving tartgetism is just a way of life that we both accept and pride ourselves on being able to bring order from as we ply our craft. The wireless half of WLAN has always been fraught with permutation, but prior to 11ac, the wired uplink was straightforward. Now that we’re well into 11ac’s tenure, we’re finding that even the notion of planning for getting APs connected to switches has gotten potentially confusing- and the WLAN industry isn’t exactly helping itself in this regard.

The Confusion Is Understandable To A Point

Where managers and non-techie money folks are trying to plan for future WLAN expenditures, you can appreciate the assumption that big, big capacity uplinks might be needed for a new wireless standard that promises to around 7 Gbps. Forget about the “data rate versus real throughput” paradigm for a minute- 7 Gbps is data center-grade connectivity in the minds of many, and so it’s no surprise that people map available Ethernet speeds to what it would take to support the promise of 11ac. Remember here that 802.11ac, as with 11n before it, is WAY OVERMARKETED as ambitious glossy goes right to the we-may-never-get-there high end of the standard. Under that lens, and combined with innocent ignorance of the nuances of real-world wireless, you can sympathize with those who think “hmmm, 100 Mbps ain’t gonna cut it. And standard Gig ports are way too slow. We better plan for 10 Gbps per AP.”

Thankfully, this incorrect conclusion is fairly easy to walk ’em back from.

After Ruling Out 10 Gbps Uplinks, It Gets Uglier

So we get past the point where 10 Gbps is being chatted up for AP uplinks, and we get closer to reality. But in this case, reality seems to be in the eye of the beholder, and there are lots of beholders with their own realities. Unfortunately, they also happen to be many of the same folks that customers turn to for technical guidance in these issues. Right now, about all you can safely say is that the WLAN industry agrees that for 11ac, 100 Mbps uplnks are too slow and 10 Gbps uplinks aren’t needed. Beyond this, it’s pretty wild and woolly. Different though leaders have different opinions, and as bizarre as it seems, they all sound viable. Oy vay.

The short version: given all of the variables of the contemporary complex business Wi-Fi setting, many environments won’t be able to achieve aggregate demand of 1 Gbps or higher even on the latest 11ac hardware. Or maybe they will. But they won’t, and you can count on that. Except where you can’t. So all you need is a a 1 Gbps uplink. But you better run two cables. And burn two switchports. But you don’t need to. And because 1 Gbps won’t be enough (or will it?), a new class of switches is being developed to put multiple Gigabits of throughput on a single UTP run.

<OK, breathe deep… In, out… there. Feel better?>

Yes it’s all a bit crazy. And those perpetuating the craziness likely mean well, they just don’t seem to agree on what’s really “needed” when asked by customers how to cable for 11ac going forward. That lack of unified message really does a disservice to customers in a number of ways:

  • 11ac is frequently overmarketed. There is a delta between promise (or implied promise) and what reality will be.
  • We’ve seemingly entered a period where everyone accepts “oh, that’s just marketing- let an SE or VAR explain what this REALLY amounts to”
  • I don’t think that some in the WLAN industry get that cabling isn’t trivial in many buildings, and even a single cable run can exceed the price of a top-end AP in many cases. Pathway concerns are huge where conduit is in use, and some of us have to get our cable designs right to serve many, many years.
  • This status quo makes the industry look a bit disjointed, and kinda silly at times. Wireless is complicated, sure. But a common message on how to cable for it shouldn’t be.

What They Said On The Topic In 2014

…what many people don’t know, is that second-wave 802.11ac APs will require two, not one, Gigabit Ethernet ports. That just doubled your need for switch ports and cable runs. Oh boy!


…11ac is a radical change; if you go by emerging WLAN guidance on prepping for and implementing the latest wireless standard, your to-do lists get significantly complicated.

The short version: 11ac will require two switch ports and two cable runs per access point. Simple AP uplinks now become port channels. Port channels need careful configuration, and can be a nightmare to troubleshoot should one of the four RJ-45 connectors involved with each 11ac port channel get cocked or not sit straight in its port.


In the first wave of 802.11ac, a single 1 Gbps link is sufficient. Wave 1 is 1.3 Gbps, but that includes the substantial 802.11 protocol overhead and is a bidirectional number because 802.11 is half-duplex. For any new wiring for 802.11ac, I’d put in two cat 6 cables for maximum flexibility going forward, though.

Cat6 versus 6a isn’t what’s important, it’s getting two cables into the cable plant. The second wave of products will potentially reach 3.5 Gbps, so you’ll want sufficient backhaul capacity to accommodate that. I wouldn’t stress about the exact specification; just make sure you have two cables that can support Gig Ethernet plus power.


Stressing about the new 802.11ac standard seems to be the industry’s new pastime.

Now that Wave-1 of 802.11ac is here with vendors promising 1.3 Gbps in 5 GHz, 1.75 Gbps aggregate per AP, and world peace, suddenly the industry has focused in the potential bottleneck of AP backhaul links. In other words, is a single Gigabit Ethernet uplink enough for each AP?

The answer is just plain “yes,” and applies not only to Wave-1, but also to Wave-2 11ac…


The IEEE 802.11ac Wave 1 standard has already delivered 1 Gigabit wireless speeds to enterprise access networks. Soon, the industry will introduce 802.11ac Wave 2 products that could deliver wireless speeds up to 6.8Gbps


Earlier in October, Aquantia announced its development of AQrate technology—the silicon that enables the delivery of 2.5- and 5-G over Category 5e and Category 6 cabling. In that announcement and in the current announcement of the NBase-T Alliance, the bandwidth requirements of 802.11ac “wave 2” devices were heavily referenced.


There’s certainly plenty out there to confuse, amuse, and ponder on the topic of planning for cabling for 11ac. This is one of those topics that is arguably more of concern for bigger networks and customers with challenging cabling paradigms than it is for others. And it’s also pretty fascinating to see the different takes and spins put on the subject by those in the vendor/VAR space versus those on the customer end (you know… where the dollars are).

One thing is for sure, at least to me- as 2014 draws to a close, we’re no closer to clarity on this discussion than we were earlier in the year, and it will be interesting to see what develops in 2015 as 11ac continues to explode and we see the front end of Wave 2.

I’d love to hear your thoughts on the notion of cabling for 11ac in different environments. Please drop a comment below, and Happy New Year to all.

The Wirednot Year-Ending Drone Blog

It’s been a busy year for drone-related articles from your’s truly. But that’s only because there’s a lot to talk about- and it’s far from over as drone technology gains a bigger foothold in the practical world. In this piece, I’ll hit on a somewhat disjointed list of drone-related points, and then review what else we’ve looked at on the subject to date here at wirednot.

  • Berkeley Varitronics Systems (BVShas been in the wireless tools/security game for a long time (they pre-date many of the bigger names in this space.)  The company is takng a page out of Fluke Networks’ playbook and describing how their Yellowjacket tool can help you track down an intruding drone and it’s operator. Check out the video:


  • Amazon  is demanding that the FAA accommodate the company’s desire to test drones for package delivery, under the threat of taking their efforts overseas. I don’t like Gizmodo’s characterization of Amazon as throwing a tantrum on the issue, but they do a decent job of telling the story here. (Hint for the FAA- Amazon may be researching more than package delivery- it would suck to see this kind of innovation and research leave the US.)

  • One company that is making a go at profitable use of drone technology is Aeryon Labs, Inc. With military, public safety, and commercial applications, Aeryon is a fascinating example of how drones can be used in a number of real-life use cases. Give their site a look and you’ll find your imagination getting quite piqued as you just know that this is just the start of bigger things for similar companies in the future.

  • One of my children is soon to graduate high school, and is considering going to college at Embry-Riddle Aeronautical University (my own alma mater). What does this have to do with drones? It just so happens that ERAU has a major in Unmanned Aircraft Systems Science. And when you graduate, there are jobs out there…

It should be obvious that the drone paradigm will continue to gain in both magnitude and dimension. There will certainly be more to talk about in the coming months, but here’s my drone year in review:

Network Computing Magazine

Drones- the Next WLAN Menace
Drones Take On Cell Tower Maintenance 

Wirednot

Fluke Networks Enables Drone-Centric Tower Operations
A Bit More About Drones, Wi-Fi, and Beyond

Others of Interest

Hak5 is doing a lot with drones
Adam Conway at Aerohive Networks is also doing a lot with drones

Am I the only one in the WLAN community thinking this is just fascinating tech to follow? Please let me know of any other IT-related or otherwise significant drone happenings.

Thanks for reading!

Some Gimmicks Get A Lot Further Than They Should

Man oh man, people can come up with really goofy shit sometimes when it comes to technology, wild claims, and the quest for big dollars. Let me give you two examples that will make your head spin a bit, especially if you know anything about wireless networking.

Bizarre Gimmick #1: LightSquared

We don’t really need all those GPS satellites to work, do we? This article I wrote for Network Computing in 2012 tells the tale of technical lunacy that, thankfully, seems to have failed hard. But it’s important to get familiar with LightSquared because the same FCC that let it gain far more traction than common sense dictates it should have is now considering another gazillion-dollar steaming pile of foolishness- which brings us to….

Bizarre Gimmick #2: TLPS (from the fine folks at Globalstar)

Just so all you misguided idiots out there doing WLAN for a living know: 5 GHz isn’t very good for Wi-Fi. The great hope lies with channel 14 in the 2.4 GHz band.

uh, right. Gimme some of what yer tokin’ there, Globalstar.

You just can’t make this stuff up.

I thought Kerrisdale Capital did a pretty good job making the case for why TLPS is a pie-in-the-sky wet dream, and put together a number of good, reasonably accurate summaries on contemporary wireless technology, like this one.

But Globalstar and friends are sticking to the premise that Kerrisdale, wireless experts, and pretty much the entire WLAN industry is clueless. (Hello, black kettle, said the pot.)

How long can Globalstar cling to it’s weird strategy when Wi-Fi industry bigwigs of impeccable credibility like Devin Akin also publicly voice crystal-clear skepticism about TLPS?

We’ll have to see where this one goes. But in a perfect world, the FCC would get a better handle early on when it comes to differentiating viable innovationfrom make-a-few-people-wealthy gimmickry.