Wi-Fi, being cost-effective and efficient, is increasingly becoming a key mobility enabler all across the world, and therefore, recently, businesses, small or large, are looking to deploy Wi-Fi infrastructure for various reasons varying from promoting business, enhancing customer experience, increasing customer engagement to boosting operational efficiency. But, owning and planning a Wi-Fi solution could take considerable time and capital expenditure. Further, the management of Wi-Fi infrastructure solution can also add considerably to the operational business expenditure. Moreover, a budget constrained Wi-Fi infrastructure/deployment might have performance, reliability and scalability issues, further, it might lack advance capabilities such as business analytics, ...Read more
Every business enterprise – big or small, aims to achieve enhanced productivity. Information Technology, Internet Connectivity and Applications on the web are becoming the enablers for enhanced utilization of corporate resources. The shift from routine IT infra structure that enabled classic way of doing business to more web based, online is not overnight. It has gone through a series of transitions, none more important than mindset. Lets explore the most prominent transitions that enterprises IT have gone through and IT evolution business in last 10 years. Tactical to Strategic With the advent of mobile devices – laptops, tablets and phones, ...Read more
CAPWAP networking protocol (RFC #5415) protocol as all Wi-Fi engineers would know is a widely used networking protocol that enables a central WLAN controller to manage a collection of Wireless Access Points, and most of the WLAN industry is using the CAPWAP in their solutions the same way. However, if we see little more into the CAPWAP semantics, CAPWAP networking protocol is designed very flexibly, and can be leveraged advantageously in multiple wireless scenarios and deployments. One such deployment scenario, I can think of is selective data path forwarding from an edge WLAN controller to a remote WLAN controller. But, ...Read more
It was only a few years ago that most western technology companies would think “software development” when asked “what does India represent to you?” While it certainly holds true today that India is a great source of software engineering talent, the bigger opportunity for western technology companies is to look at India in a comprehensive manner. India today represents many things to a western technology company. Beyond being a source of software engineering talent, India is a massive market opportunity for technology products of all kinds, a regional or even global hub of advanced customer support and professional services ...Read more
Surprise leads to dissatisfaction. This leads to the lowering of expectations. If the expectations dip so low that the value created by the vendor does not justify the cost, then that is the end of the customer-vendor relationship. Success in any customer engagement comes down to No SURPRISES in software engineering. The surprise can occur at any stage of customer engagement. For starters, there is a sticker shock when the vendor delivers the proposal. A meeting describing the functions and schedules is in order, before the vendor submits the proposal. This can also be discussed in initial introductory meetings. Once ...Read more
I bought a suit costing twenty thousand rupees last year same time and I was trendy and “with it”. This year when I wore it, my son called me old fashioned! Investments in IT systems are quite like that. First it takes time for you to understand what it is all about, and then when you take the plunge, you are faced with obsolescence. Better options seem to come up just as you are printing the purchase order. Lets talk Unified Communications. Unified Communications (UC) is a much touted term that no one can really completely define. Everybody has a ...Read more
IP REPUTATION IP Reputation is critical for email delivery. IP reputation list is the list of IP addresses that are suspected of being untrustworthy. The IP Reputation list is used by most of the worldwide mailing software to identify, reject or flag spam emails. The list is also referred as “Blacklist” or “Blocklist”. The IP addresses in IP Reputation list could be: The Systems that are observed sending spam on the internet Zombies (compromised machines) that send spam Open proxies that allow untrusted email to pass through them There are many of such IP Reputation lists, operated by companies such ...Read more
With evolving technological advancements every day, cellular operators around the globe are faced with a challenge of constantly upgrading their network. In view of that, technologies like UMTS, HSPA, HSPA+, LTE, LTE-A become more significant with ever increasing hunger for data consumption by users. A Significant data consumption is done by mobile devices like Smartphones and Tablets, mostly by business users and younger generation below 35 years of age. As per a recent study, overall mobile data traffic is expected to grow to 15.9 Exabyte per month by 2018, nearly an 11-fold increase over 2013. Not much far seen, technologies ...Read more
In my previous blog Why Support is the ...
Technology-enabled education is peeping deep into the classrooms, paving a ...
Video Conferencing has knitted the world closely. Now, geographical ...