iPhone Unfairly Blamed For Network HiccupsiPhone Unfairly Blamed For Network Hiccups
Along with <a href="http://money.cnn.com/news/newsfeeds/articles/newstex/IBD-0001-18205063.htm">Investor's Business Daily</a>, the Associated Press, and several dozen other journalists, I got suckered late last week by reports that the Wi-Fi network at Duke University had been <a href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201200299">overwhelmed by iPhones</a> automatically seeking an Internet connection. Turns out that the problem lay not in the iPhone but <a href="htt
July 23, 2007
Along with Investor's Business Daily, the Associated Press, and several dozen other journalists, I got suckered late last week by reports that the Wi-Fi network at Duke University had been overwhelmed by iPhones automatically seeking an Internet connection. Turns out that the problem lay not in the iPhone but in the network itself. Late on Friday (after our print edition had shipped), Duke posted a statement on its Web site saying that "A particular set of conditions made the Duke wireless network experience some minor and temporary disruptions in service."Oops. The problem (which, it must be said, wasn't that huge to begin with) apparently specifically had to do with Duke's deployment of a "very large" network based on Cisco infrastructure. "Cisco has provided a fix that has been applied to Duke's network and the problem has not occurred since," the networking company said in a written statement.
What's interesting here (assuming that my editor doesn't fire me for reporting this as fact, which would be really interesting) is that the story spread so quickly and got so much attention, considering it was essentially a series of minor network outages. The reason? It was the iPhone, of course, and anything iPhone-related -- particularly related in a potentially negative way -- is big news in the tech-business world. My larger point -- that IT managers should be prepared for the iPhone phenomena and should make the appropriate adjustments to their wireless networks and to their mobile-device deployments -- still stands. I just wish I'd found an example that was actually true.
About the Author(s)
You May Also Like
The Era of generative AI-enabled Security
Oct 2023 Threat Horizons Report
The Definitive Guide to Understanding IP Addresses, VPNs and their Implications for Businesses
Solution Brief: Fortinet FortiFlex Delivers Usage-Based Security Licensing That Moves at the Speed of Digital Acceleration
The New Frontier of Cyber Security: Securing the Network Edge