https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • WHY ATTEND
    • Exhibitor Listings
    • Floor Plan
    • Exhibiting Information
    • Registration Opens April 2019-Join Our Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Enterprise


News

Hotspotio provides new method for enterprises to share Wi-Fi with customers

Hotspotio provides new method for enterprises to share Wi-Fi with customers

Customers connect to protected networks without actually accessing passwords; solution is designed to enable enterprises to establish closer relationships with their clients.
  • Written by
  • 10th October 2013

From restaurants to retail outlets to corporations, enterprises often are asked by customers, clients and visitors how they can access the enterprise’s Wi-Fi network—a request that requires constant sharing  of passwords or a decision to remove security access to the network altogether. But New York-based startup Hotspotio has developed software that lets enterprises share secure Wi-Fi networks in a manner more beneficial to the enterprise.

If the Wi-Fi network owner—for instance, an enterprise–and a mobile-device user both use Hotspotio, access to the Wi-Fi network can be requested and provided without having to go through the often cumbersome process of finding and sharing the password to the Wi-Fi network, Hotspotio co-founder Simon Schultz said.

 “Hotspotio was an outcome of us being annoyed about not really having access to all of the Wi-Fi [networks] that you can see on your phone or laptop that are available out there but are locked with passwords,” Schultz said during an interview with Urgent Communications. “Most of the time, if you ask for the password, people are quite happy to share it … so, we’re just facilitating what people are already doing—granting each other access to their available Wi-Fi networks.”

In return for providing Wi-Fi access, the network owner can ask the user for something in exchange, such as a Facebook “like” or a Twitter reference, Schultz said, using a restaurant as an example.

“You press the network name and decide what you want to give in return,” he said. “For instance, you can say, ‘I want to like [the Wi-Fi owner’s] Facebook page,’ and when that Facebook page has been liked, you will automatically be logged onto their Wi-Fi network without entering the password.

“On a more technical level, what happens is that, when the restaurant shares their network, we’re encrypting the password, storing it in our backend, and then—when someone connects to it—we’re sending it encrypted from our backend to the user’s application system, and then inserting it into the Wi-Fi management system on the Android device. That’s how we allow people to connect to protected networks without actually entering the password.”

As a startup, Hotspotio currently is not charging for its software solution, which is available to all Wi-Fi owners and mobile users with Android tablets and smartphones, Schultz said. The company is focused on getting Wi-Fi operators to adopt Hotspotio and on developing versions of the application that will work on all types of devices and all operating systems, he said.

“The long-term business plan is to set up premium services for the business-to-consumer market, giving them some more tools to help them create a closer relationship with their existing customers,” Schultz said.

Tags: Enterprise Local Area Network Management Software Security Enterprise News Policy Software Tracking, Monitoring & Control Wireless Networks News

Related


  • Customers connect to protected networks without actually accessing passwords; solution is designed to enable enterprises to establish closer relationships with their clients.
  • Customers connect to protected networks without actually accessing passwords; solution is designed to enable enterprises to establish closer relationships with their clients.
  • Customers connect to protected networks without actually accessing passwords; solution is designed to enable enterprises to establish closer relationships with their clients.
  • Customers connect to protected networks without actually accessing passwords; solution is designed to enable enterprises to establish closer relationships with their clients.

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Broadband expansion part of American Jobs Plan to rebuild country's infrastructure
  • IoT Cybersecurity Act places security onus on device makers
  • UC-Berkeley survey shines light on cybersecurity concerns surrounding smart-city technologies
  • Intel on the outside: Chips giant, Google, Microsoft the latest to quit MWC

Commentary


Unlocking the power of ESInets: Different NG911 provisioning approaches exist; level of control is key differentiator

7th April 2021

Ransomware? Let’s call it what it really is: extortionware

21st February 2021

Redefining communications for today’s mobile workforces

18th February 2021
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Want to stay up-to-date on the latest #criticalcommunications and #publicsafety trends? Sign up for IWCE's Urgent C… twitter.com/i/web/status/1…

15th April 2021
UrgentComm

Ubiquiti’s latest hack highlights troubled security path for operators dlvr.it/RxkzLj

15th April 2021
UrgentComm

Dependency problems increase for open-source components dlvr.it/RxkffD

15th April 2021
UrgentComm

How smart environments will take shape post-COVID-19 dlvr.it/RxkVPH

15th April 2021
UrgentComm

RootMetrics 5G report puts AT&T in first place dlvr.it/RxkVKD

15th April 2021
UrgentComm

Newscan: Cincinnati to pay $6 million to settle suit in death of Kyle Plush who called 911 dlvr.it/RxfsSd

14th April 2021
UrgentComm

First NENA i3-compliant NG911 call to be delivered today in California, officials say dlvr.it/RxffG7

14th April 2021
UrgentComm

Look for @krehbehn to speak at #IWCE2021 September 27-30 taking place this year in the new West Hall of the #LVCC twitter.com/UrgentComm/sta…

14th April 2021

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X