4 min read

How can a survey be so significant to the future of education?

By Martin Jones @ LAN3 on January 13, 2021

We’ve all been asked to fill out forms, or complete a short survey and let’s be honest, even the most conscientious of us don’t usually do so unless there’s an incentive involved and certainly not without knowing its purpose. And it’s for this reason we at LAN3 wanted to be really transparent about why we seek the opinions and expertise of people in the education sector through our State of IT in Education’ survey.

Topics: Security Wi-Fi Education Technical
2 min read

The Nuts and Bolts of Wi-Fi6 & Wi-Fi6E

By Martin Jones @ LAN3 on April 24, 2020

Capacity, efficiency, and performance for advanced connectivity

Topics: Wi-Fi Technical
2 min read

Video Blog:- Aerohive User Profiles, a Closer Look

By Neil Harrison on December 10, 2018

In a previous video blog we looked at how organisations can gain control over who can access their network using one of 802.1x or a private pre-shared key.

Sitting behind either of these solutions are user profiles, which are stored on either a RADIUS server, access point or Aerohive's HiveManager.

In this video blog we take a closer look at user profiles, and how they can be provisioned to help network managers give each wireless user a unique experience, while increasing security.

Topics: Technical
3 min read

Could The Performance of Your Business Network Cost You Your Job?

By Paul Sweeney on July 07, 2017

Your network works, right? So what’s there to worry about? Well actually, quite a lot.

It goes without saying that these days, almost all businesses and organisations rely on their IT for virtually everything. And the network is the backbone on which all their IT services depend. 

Despite this, many businesses and organisations have either inappropriate hardware and/or software, or appropriate infrastructure that has not been optimally configured, secured or managed.

One of the main reasons for this is that IT is a fast-moving world, and today’s networks - and the context they are operating in - are substantially different from those of even a decade ago.

Topics: Security Technical