Chris Voll

Target Wake Time Explained

3 min read

What is Target Wake Time?

Target Wake Time (TWT), one of WiFi 6’s most clever features, helps devices conserve power, and prevents channel contention. Here’s why enterprises should pay attention.

Read More

3 min read

How OFDMA Will Transform Enterprise Wireless Connectivity

WiFi 6 is coming out at the end of 2019, and it’s going to be a gamechanger. The secret weapon? OFDMA. WiFi 6, also known as the 802.11ax standard,...

Read More

2 min read

How to Supercharge Your Business’ Network with 802.11ax (WiFi 6)

You’ve heard about the latest WiFi standard set to be completed by 2019, but how will its benefits translate into real results for your business? By...

Read More

3 min read

3 Reasons Why Your Hospital Needs a Network Site Survey

Hospitals present networking professionals with a wide range of unique challenges, which is why comprehensive site surveys are so essential in the...

Read More

3 min read

Could Threat Hunting Be the Answer to Global Cybercrime?

In the midst of a record-breaking cybercrime wave, companies are starting to take a proactive approach to detecting and repelling network security...

Read More

2 min read

Avoid These Enterprise WiFi Mistakes

Employees expect to have access to WiFi at work, but delivering a sufficiently powerful and secure network on an enterprise scale is easier said than...

Read More

2 min read

Are Criminals Winning the Cybersecurity War?

All enterprises should be equipped with the tools and know-how to combat modern cybercrime. With new hacks and malicious attacks perpetrated against...

Read More

3 min read

Check Out These Major Trends in Large Venue Connectivity

Emerging wireless technologies promise to provide networking administrators at large public venues with a powerful set of tools they can use to...

Read More

3 min read

Balance Network Performance and Network Security with These Best Practices

Cybersecurity is a critical part of every enterprise’s success, but if executed poorly, it can compromise network performance. The average North...

Read More

2 min read

Enterprises Are Starting to Decentralize Their Network Architectures

The steady rise of cloud computing has compelled many enterprises to pivot away from data center hyper-consolidation and toward more decentralized...

Read More

2 min read

Cloud and Mobile Are Replacing the LAN Infrastructure — What You Need to Know

The emergence of smartphones and cloud computing have redefined network security for enterprise IT teams. With the growing popularity of cloud...

Read More