Given the pervasiveness of wireless networks, the proliferation of mobile devices, and the demand for mobility in all aspects of IT today, it's no wonder that mobile computing is now at the core of so many IT strategic plans. Just as everyday life without mobile devices would be limiting, enterprises and organizations that operate without optimizing their infrastructure, products, and services for mobility face a distinct disadvantage.
|Featured Mobility Sessions|
|Building the Wi-Fi On-Ramp to the Internet of Things
The current evolution of Wi-Fi is driven by the rising need to enable machine-to-machine communication. These new devices place completely different demands on the network. These devices will vastly outnumber users as they enable building automation, physical security, and many forms of wearable technology. To cope with all these new devices, IT departments need to build wireless networks supporting higher density and more differentiated security. In this session, we'll talk about current and future technology developments to build robust networks that support IoT deployments.
Speaker: Matthew Gast, Director of Product Management, Aerohive Networks
|But My 802.11n is Only 2 Years Old
Many organizations have recently finished expensive 802.11n deployments, just to see the explosion of wireless devices and 802.11ac render these designs obsolete. It is painful and expensive to completely redesign these wireless networks all over again, but we also have to satisfy user requirements and anticipate future needs. If you've already built an 802.11n network, how do you support the ever-increasing number of wireless devices on your networks? If you're considering a change, should you adopt 802.11ac Wave 1, hold out for Wave 2, or continue deploying 802.11n? How do you design your WLAN as it pertains to your standards choice? What effect will it have on wired network requirements? How do these decisions affect capital and operating expenses? This session will share lessons learned from the speaker's experiences in university settings, including how to approach migrating to 802.11ac, how to redesign networks to support -65dB in the 5Ghz band, and how to creatively minimize costs as the number of APs on campus doubles over the next three years. Matthew will discuss what worked, what didn't, and where he plans to go in the future.
Speaker: Matthew Williams, Network & Telecommunications Services, Kent State University
|Demystifying Wireless Security Using Open Source Options
Wireless LANs are often the soft underbelly of an organization’s network. Users and guests demand easy access, but corporate resources still need to be protected. An enterprise could break the bank with expensive tools and consultants trying to maintain compliance and minimize risk. The good news is that there are lots of excellent, well-documented open source (i.e., free) tools available to test and monitor your wireless network. And they don't even require a tin-foil hat.
Speaker: Michele Chubirka, Senior Security Architect, Postmodern Security
|Designing Today’s Wi-Fi Network For Tomorrow’s Applications
Wireless design often gets short-changed in the rush to roll out or upgrade a wireless network. Just add more APs and you’re all set, right? Wrong. Thoughtless designs result in uneven performance, user frustration, and extra troubleshooting for you. Proper WiFi design starts with understanding user expectations, application requirements, and device requirements. It also requires a good understanding of RF behavior and some competence with a common set of tools. George will share practical design tips for four WLAN use cases: data, voice, location, and high density. He will also recommend useful tools to get the job done, and provide insights into RF that will enhance your understanding of WLAN design.
Speaker: George M Stefanick Jr., Wireless Network Architect, Houston Methodist Hospital
|Effective WLAN Troubleshooting
WLAN performance can directly affect employee productivity, which means engineers and administrators need to find and solve problems quickly. This session shares detailed steps to minimize and sometimes eliminate the majority of problems that generate trouble tickets on your wireless LAN. We’ll cover tips, techniques, and the tools used to keep your Wi-Fi running as smoothly as possible. You can take these field-proven plans home and apply them to your network right away to minimize downtime (and end-user complaints) associated with common Wi-Fi issues. Join me to learn how you can have Wi-Fi that just works!
Speaker: Keith Parsons, Managing Director, Institute for Network Professionals
|How to Harness the Mobile Payments Boom
Mobile payments are poised for rapid growth: Global in-store mobile transactions will balloon from $55 billion in 2014 to $570 billion in 2018, according to 451 Research forecasting. We’ll identify strategies for merchants and enterprises as they work to harness this fast-growing opportunity and lay the foundation for a mobile payment infrastructure. Drawing on 451 Research’s latest consumer and IT-decision maker survey data, we’ll provide a snapshot of the mobile payment landscape today, and cover the gamut of mobile payment technologies, from mobile wallets to coupons to NFC. We’ll also describe key implementation challenges and outline the fundamental drivers that will inevitably make mobile the de facto commerce-enablement technology.
Speaker: Jordan McKee, Senior Analyst, Mobile Payments, 451 Research
|Innovative Uses of NFC in the Enterprise
Near Field Communications (NFC) is quickly gaining traction as mobile device manufacturers implement it to facilitate mobile payments. But the technology that enables two devices to communicate with each other has a multitude of additional uses within mid-size and large enterprises. NFC can enable inventory and resource tracking, streamline onboarding of new devices or even automate office tasks and equipment functionality. This session will explore the ways that forward-looking businesses and manufacturers are integrating NFC beyond mobile payments. We will discuss how to implement NFC, share working examples of useful features, and outline how to mitigate NFC risks.
Speaker: Imran Ansari, Senior Product Manager, SOTI Inc.
|Mobile Advantages, Mobile Challenges: Lessons Learned On Applications, Budgets & Device Management
Abilene Christian University has been on the forefront of integrating mobile technology and learning since launching a one-to-one mobile learning initiative in 2008. Today the university has over 900 access points that cover 7.1 million square feet and accept an average of 250,000 connections a day. Over the last six years, ACU has seen its fair share of challenges supporting a dynamic mobile environment and learned many lessons along the way. In this session, we’ll share what we’ve learned about developing our own mobile apps and supporting third-party apps for faculty and students; how to structure funding to balance costs while keeping our wireless infrastructure up to date; and how we meet WiFi challenges such as new standards, the effect of campus construction and remodeling on WLAN design and performance, and the growth and variety of device types we support.
Speaker: Arthur Brant, Director, Enterprise Infrastructure, Abilene Christian University
|Practical Strategies For Stress-Free Mobile Management
IT organizations are being driven by executives, employees, and their partners to provide a seamless way to access business systems from mobile devices. Rather than design different technical approaches for common use cases, this session proposes a single architecture to support BYOD/COPE (Corporate Owned, Personally Enabled) while providing a security model that reduces risks associated with mobile deployments. This approach is independent of the device, the OS platform, and form factor, and both personal and corporate devices can be deployed and managed with common mobile architecture.
This session draws on lessons learned from the speaker’s experiences leading multiple large enterprise mobile deployments.
Speaker: Tony Winston, Senior Manager, EY Advisory Services
|Privacy Implications of Mobile Advertising Location Data
Many mobile apps and services rely on a consumer's location information. At the same time, the FTC, legislators, privacy advocates and others have identified location information as a particularly sensitive category of data. This presentation covers the latest issues in location and privacy laws and regulations, with an eye toward developers and IT managers. How is location information gathered? How does data flow from device, to app to, third party? How is it shared and how is it used in mobile advertising today? When is consent required and how can different stakeholders obtain such consent? Are today's mobile platform level controls sufficient? What role does self-regulation play? We’ll address these questions to help developers and organizations navigate the tricky waters of using, aggregating and processing location information.
Speaker: David Adler, Attorney/Founder, Adler Law Group
|Want Effective Mobile Security? Build Partnerships With Employees
Employees can be cavalier about security and privacy, particularly when it comes to mobile devices. They’ll put company data or applications in danger because they don’t know the risks, or because they assume their behaviors are safe when they aren’t. At the same time, employers regard their workers almost like children, and add layers of restrictive security around mobile devices to keep employees from harming themselves and the company. But rather than enhancing protection, restrictive security measures often encourage employees to find workarounds so they can get their jobs done. A better way is to educate employees to understand security and privacy risks, and enlist them as partners in the effort to guard company information. This education must cover both corporate and personal information, in part because employees use personal devices for work, and because protecting personal data gives employees a stronger stake in positive outcomes. This partnership will also help create new levels of trust between employers and employees. This session will share survey data on employees’ attitudes about security and privacy, and provide practical lessons to help employers engage their workers in the job of protecting corporate data. We’ll share tips and offer suggestions for building an effective educational program to transform recalcitrant employees into active participants in your organization’s security efforts.
Speaker: Melanie Seekins, Mobile Architect, Altria
|Where Will Your Apps Go Next?
Should you be designing an app for a smart watch? What about a car or a medical device? Organizations already wrestle with how to split development efforts between the Web and native apps for phones and tablets. As wirelessly connected devices proliferate, can your organization keep up? This panel will delve into the business opportunities and challenges that emerge alongside a multiplicity of mobile computing platforms and gadgets. It will help attendees identify viable trends, look at potential security risks, and offer insights into where and how to concentrate precious IT resources to ensure your organization can take advantage of new mobile opportunities without getting spread too thin.
Moderator: Tom Claburn, Editor-at-Large, InformationWeek
Panelists: Dan McFall, VP of Mobility Solutions, Mobile Labs
|More sessions will be announced shortly. Stay tuned on Twitter by following @Interop.|
|Featured Mobility Workshops|
|The Next-Gen WLAN: An Enterprise Roadmap
WiFi is now the prefereed access method for end users, partners, and customers. But new forces are propelling wireless networks into uncharted territory. This workshop provides a roadmap of emerging technologies and trends to help you navigate. We’ll start with 802.11ac. Phase one is here and phase two is on the horizon, and we’ll get you up to speed on what’s new and provide guidance on update strategies. But 11ac isn’t the only story. The “software-defined” movement is making its way to the wireless network, but is this just SDN-washing by vendors, or are there real benefits (and challenges) you should be prepared for? Efforts are underway to monetize WLAN investments, including social Wi-Fi, location-applications and beacons that aim to enhance the user experience (and perhaps wring a few more coins from pockets). We’ll examine these technologies to help you find the right approach for your business. Finally, the Internet of Things revolution is coming, and it will be wireless. IoT will touch every business, from healthcare to retail to manufacturing to facilities management and more. Wireless systems will need to support and protect more traffic, process more data, and monitor and manage more endpoints. Are you ready?
Instructor: Keith Parsons, Managing Director, Institute for Network Professionals
|The Mobile-Friendly Enterprise: From Apps to BYOD
Part One: Mobile Rules
The first half of the workshop will cover the most common questions and pitfalls that an organization experiences in building a mobile-friendly practice for new and legacy applications. The workshop will outline the main issues in the design, development, and deployment of a mobile application, and tools and techniques available to solve those issues. We'll discuss whether to build your own internal mobile development and design team or hire out. We'll also help you decide whether to build a native app, an HTML app, or a hybrid. And we'll address key decisions such as which platform to target initially, and whether you should develop for multiple OSs in parallel. Finally, we'll look at technologies that can reduce your time to market, including Backend as a Service (BassS) and Platform as a Service (PaaS) options. These options may shave off months of development and let you test your application with stake holders faster.
Part Two: BYOD In The Real World
BYOD seems like it IT's Kobayashi Maru: the ultimate no-win scenario. Users and executives want unlimited choice with devices and access, while IT has to protect corporate data and find some way to support a grab-bag of hardware and operating systems. Can IT really balance these competing demands, or are we being set up to fail? In fact, you can do BYOD right, but it requires some groundwork. In this workshop we'll cover the motivation behind BYOD, because it's important to understand why it becomes such a divisive issue in organizations.
Part 1 Instructor: Ravi Singh, Vice President of Mobile Engineering, MarkITx
Part 2 Instructor: Michele Chubirka, Senior Security Architect, Postmodern Security
The following passes will get you access to the Interop program:
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.