« September 2016 | Main | November 2016 »

October 26, 2016

Will That Wall Secure Your Network Like Cloudpath?



By: Abhi Maras, Product Line Manager


We’re finally in the home stretch of the 2016 Presidential Election here in the U.S. While it has been the most interesting election season for better or worse, one candidate’s view of a specific problem and a simplified solution to build a wall has done nothing but arouse attention. It all goes back to how we as humans have viewed security when it comes to protecting things near and dear to us. To protect our homes we use fences, to protect monuments there are barriers, and to protect countries, well there could be a wall. The same thought has been applied to our networks; fortunately, Cloudpath is delivering a truly simplified approach to secure networks.

In the past, networks have been built on top of existing platforms over the years. As the security risks went up, there was a new security perimeter added to the network in order to secure the data and the devices within. History-china-great_wall_of_china-wall-invasion-invades-gra050701_low

There are couple of problems with this approach:

  • First, the user behavior has changed: gone are the days when users were shackled to an RJ-45 cable. The devices are more mobile than ever and the users are not within these perimeters that supposedly gives them the protection that they need. While network administrators are adding perimeter after perimeter in their networks, users are no longer within those perimeters; they’re staying mobile and connecting from anywhere they can. Security can no longer be restricted within those confines, but rather extended to anywhere the device goes.
  • Second, the problem with this approach is while new perimeters and new solutions are added in the name of security, the complexity and the cost of deploying and managing a secure network is Those who do not have the appetite for it give up and end up with a less than secure of a network, which is quite harmful to them and to their end users.

We at team Cloudpath saw these challenges and took on the sacred mission to secure the network while keeping it less complex and affordable. We also see the value in taking a device-centric approach, i.e.Employee/IT devices, guest devices, BYOD devices or shared/IoT devices.

What is Cloudpath and how does it solve this you ask? Cloudpath is a security and policy management platform designed to simplify the deployment of several services that are typically disparate and complex to manage. Cloudpath makes the best security more accessible to lean IT teams.

To learn more about how Cloudpath can help your network, please visit here.

October 17, 2016

OpenG Rap: Unlicensed to Ill

Indoor cell signal feels so wack! Do not worry though, MC Ruckus and the Dawgs (aka Ruckus OpenG engineers) will set you straight with this funky gold-teeth-laden introduction to new technology. We got your back, yo! #OpenG #WhatDidIJustWatch

Read more about OpenG...


Catch OpenG in the Wild

Juan Santiago


By: Juan Santiago, Director of Product Management


In partnership with Dell/EMC, Ruckus, now a Brocade company, will be showing its first live demo of OpenGTM at Dell EMC World this week.  OpenG is a solution that greatly improves in-building cellular coverage and capacity at a much lower cost than DAS or traditional small cells.  Because OpenG uses the newly-released US 3.5GHz CBRS coordinated shared radio spectrum, enterprises and venues can finally deploy a single in-building cellular solution to serve subscribers of all mobile operators.  To learn more about OpenG technology and why it’s the best approach to answer the indoor cellular coverage problem, visit https://www.ruckuswireless.com/openg Openg_dellworld blog post

The Dell EMC World demo highlights the Quality-of-Service (QoS) advantages of the 3.5GHz CBRS spectrum versus the existing Unlicensed 2.4GHz ISM or 5GHz UNII spectrum, especially in crowded Wi-Fi environments like the Dell EMC World conference.  A high-quality video stream and a video conference call are shown simultaneously over wired Ethernet, Unlicensed and CBRS.  Whereas, Unlicensed degrades as traffic increases and more users tune in. CBRS uses a central coordination service to assign a clean channel base on the exact location of the base transmitter.  In addition, Ruckus OpenG small cells use LTE technology on the CBRS spectrum, resulting in truly cellular-like QoS, mobility and seamless roaming. 

The demo will also include different components from key industry players, including:

  • Dell - Servers, NFV software, laptops
  • Brocade - Virtual Enhanced Packet Core, Ruckus CBRS LTE access points
  • Qualcomm - CBRS LTE modems
  • Federated Wireless - CBRS spectrum allocation database service

Look for me and check out the live demo at the Emerging Client Technologies area of the Dell Customer Solution Center, Booth C6, at the Austin Convention Center, October 18-20.

Can’t make it to Dell EMC World? Don’t worry, you can also visit Booth #C44 at Futurecom to learn more about how OpenG will solve today’s in-building cellular challenges.


October 13, 2016

WiFi data – The new gold mine!

Udaya Padmanabhuni


By: Udaya Padmanabhuni, Sr. Principal Product Manager


The number one role of network data is to improve the operational performance of the network and ultimately drive business objectives. Data analytics provide insights on network functionality and user habits that network managers have never had before. With these insights, enterprises can make decisions network infrastructure, uncover answers for hard-to-solve problems and use IT resources more effectively.

Let’s look at how service providers and enterprises are leveraging data and analytics to run and improve different aspects of their business.

For Service Providers, Business Runs on WiFi

Wi-Fi has become critical element for Service Providers world-wide. Five 9’s availability is expected, along with sufficient speeds to support various business critical applications. The demand for Wi-Fi speed is ever increasing. Service Providers are expected to provide affordable Wi-Fi access to businesses and consumers, and to be profitable. Businesses rely on customer satisfaction and maintaining acceptable levels of service. Service Providers are using the data from Wi-Fi networks to monitor the health of the network, and measure the Wi-Fi KPIs and quality of service. If customers experience degraded service, their businesses are impacted immediately. Data from Wi-Fi networks is used as a feedback loop to ensure that Wi-Fi service is up and running and adequate network SLAs are maintained. SCI

Service Providers are also using Wi-Fi data to improve operational efficiency. Service Providers would like to deploy an optimal number of APs to ensure SLAs, but not over provision (or under provision) the network resources. By collecting the Wi-Fi data and analyzing user patterns and behaviors, traffic and volume of data, Service Providers are optimizing the deployment of Wi-Fi access points and other related network infrastructure. This data is also used to configure Tx power levels on access points to minimize the interference and improve the Wi-Fi performance.

When data collection and analysis has to be done manually it is a huge challenge to service providers. While the market for service providers is robust, the Wi-Fi demand is growing, the number of access points is ever increasing, and new applications are being deployed.

Enterprises Need Increased Efficiency and Reduced Cost

IT departments are tasked to ensure the health of Wi-Fi infrastructure, reduce the IT costs, and maintain the Wi-Fi service, among other things. Wi-Fi has become critical service to run the business. Data is collected from Wi-Fi networks to monitor, maintain health of the network and ensure the availability of Wi-Fi network. Wi-Fi networks are ever growing, while IT staff and budgets are remaining constant or more often, being reduced.

Enterprises are challenged to maintain the health of Wi-Fi infrastructure, while demand for higher SLAs is growing continuously. With fewer IT staff tasked with many projects, IT departments are under tremendous pressure to increase efficiency and reduce costs of Wi-Fi infrastructure. This is creating more and more challenges for IT department.

Enter Ruckus SmartCell Insight (SCI)

SCI is a reporting and analytics engine that provides visible insights into Ruckus Wi-Fi infrastructure. These insights will help drive key business decisions and improve operational efficiency of Ruckus Wi-Fi infrastructure. SCI enables decision makers to make informed and intelligent decisions about Wi-Fi infrastructure. When SCI is deployed in conjunction with Ruckus controllers and access points, businesses will be able to achieve operational efficiency of Wi-Fi infrastructure, reduce Wi-Fi costs and improve the overall profitability of business.

Check it out for yourself. SCI comes with 90-day built-in trial. More information about can be found here

October 11, 2016

What’s Scarier, Halloween or Applying for E-Rate?



By: Carly Botelho, Marketing Communications Manager @carly_botelho


Although applying for E-Rate can be a very terrifying task, we know at the very least that it cannot be nearly as scary as the crazy clown phenomenon sweeping the nation. It’s time to conquer your fear and tackle your E-Rate filing process before it is too late.

The federal government offers billions of dollars in E-Rate discounts to US K-12 schools for broadband delivery every year. This includes investments in wired and wireless infrastructure- technologies which can help transform your school into a digital-first learning model, while also keeping your student data safe. Unfortunately, the process to apply for these funds can be a little complicated, and if you accidentally miss a step, or file a form incorrectly, you could be waiting until the following year to start your important technology projects. And that is a nightmare we don’t want to become a reality. Banner_Halloween_Erate

As an approved E-Rate vendor, Ruckus Wireless has developed several resources to help you seamlessly get through the E-Rate process, so that you can focus on carving pumpkins, drinking apple cider, and trick-or-treating, instead of getting hung-up in tedious processes.

To get you started, here are the 6 steps you need to follow in order to have a not-so-terrifying E-Rate season. You can see detailed descriptions of each of these steps, with links on where to find the applicable documentation, on our website.

Step 1: Determine Technology Investments

Step 2: Start the E-Rate Process! File your form 470.

Step 3: Choose a Bidder! File your form 471

Step 4: Compliance Review – Program Integrity Audit (PIA)

Step 5: File your form 486. Start Your Project!

Step 6: Time for E-Rate to Pay Up! File your form 472 or 474

Don’t be forced to wait. Use this year’s E-Rate funding to update your wired and wireless infrastructure to increase network capacity for scalability, protect student data for increased privacy, and launch new digital learning models to improve student performance.

Want to learn more about how to apply for E-Rate, and what’s new in the process this year? Join us for an exclusive webinar with E-Rate expert, Jim Kerr, Principal at KB & Associates LLC, (who we promise is not at all spooky!) to get your toughest questions answered about E-Rate FY17. Reserve your spot here.