Archive of ‘technology literacy’ category

privacy and social media

Yik Yak Users Not So Anonymous After All

By Dian Schaffhauser 10/20/16

https://campustechnology.com/articles/2016/10/20/yik-yak-users-not-so-anonymous-after-all.aspx

yakkers had add personal handles and profiles starting last August. users of mobile app Yik Yak face the ignominy of being truly discoverable. At least that’s what a research team at New York University’s Tandon School of Engineering suggests in a new paper.

You Can Yak but You Can’t Hide: Localizing Anonymous Social Network Users,” being presented at the upcoming ACM Internet Measurements Conference next month, describes how the research team was able to determine the geographical origin of a comment or “yak” and possibly even the person who made the post, thereby making the program susceptible to “localization attacks,” putting the user at risk of being identified.

if a student posted a disparaging remark about a fellow student or a faculty member, “it wouldn’t be difficult” for the victim of the insult to figure out where the offensive commentary was posted from and then pinpoint the probable yakker from there.

++++++++++++++++

more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

private versus government

Hayden calls Russian email hack ‘honorable state espionage’

By Matt Leonard Oct 18, 2016

https://fcw.com/articles/2016/10/18/hayden-email-espionage.aspx?

The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.

“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”

Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.

And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.

+++++++++++++++++

more on surveillance, government in this IMS blog:

https://blog.stcloudstate.edu/ims?s=surveillance

3D Printing Project-Based Curriculum

Inside WIT’s 3D Printing Project-Based Curriculum

Who better to learn about incorporating 3D printing into instruction than from an instructor who taught the curriculum?

Join us on October 26th to hear directly from Assistant Professor Steve Chomyszak who used Stratasys 3D Printing Curriculum to teach a “Special Topics” 3D printing course at the Wentworth Institute of Technology.

During this complimentary webcast, you’ll gain valuable insight into the successes and lessons learned, including:

  • Overview of the 14-week project-based 3D printing curriculum
  • How an interactive learning environment impacted and inspired WIT students
  • How the WIT 3D printing lab went from crickets to buzzing
  • How curriculum measured up according to students
  • And so much more!
 

IoT for Product Managers

Internet of Things: A Primer for Product Managers

https://medium.com/@delizalde/internet-of-things-a-primer-for-product-managers-5b6bef0a8b9b#.aitrbiy0h

The first step to becoming an IoT Product Manager is to understand the 5 layers of the IoT technology stack.

5 layers of IoT

1. Devices

Devices constitute the “things” in the Internet of Things. They act as the interface between the real and digital worlds.

2. Embedded software

Embedded software is the part that turns a device into a “smart device”. This part of the IoT technology stack enables the concept of “software-defined hardware”, meaning that a particular hardware device can serve multiple applications depending on the embedded software it is running.

Embedded Operating System

The complexity of your IoT solution will determine the type of embedded Operating System (OS) you need. Some of the key considerations include whether your application needs a real-time OS, the type of I/O support you need, and whether you need support for the full TCP/IP stack.

Common examples of embedded OS include Linux, Brillo (scaled-down Android), Windows Embedded, and VxWorks, to name a few.

Embedded Applications

This is the application(s) that run on top of the embedded OS and provide the functionality that’s specific to your IoT solution.

3. Communications

Communications refers to all the different ways your device will exchange information with the rest of the world. This includes both physical networks and the protocols you will use.

4. Cloud Platform

The cloud platform is the backbone of your IoT solution. If you are familiar with managing SaaS offerings, then you are well aware of everything that is entailed here. Your infrastructure will serve as the platform for these key areas:

Data Collection and Management

Your smart devices will stream information to the cloud. As you define the requirements of your solution, you need to have a good idea of the type and amount of data you’ll be collecting on a daily, monthly, and yearly basis.

Analytics

Analytics are one of they key components of any IoT solution. By analytics, I’m referring to the ability to crunch data, find patterns, perform forecasts, integrate machine learning, etc. It is the ability to find insights from your data and not the data alone that makes your solution valuable.

Cloud APIs

The Internet of Things is all about connecting devices and sharing data. This is usually done by exposing APIs at either the Cloud level or the device level. Cloud APIs allow your customers and partners to either interact with your devices or to exchange data. Remember that opening an API is not a technical decision, it’s a business decision.

Related post: The Business of APIs: What Product Managers Need to Plan For

5. Applications

This is the part of the stack that is most easily understood by Product teams and Executives. Your end-user applications are the part of the system that your customer will see and interact with. These applications will most likely be Web-based, and depending on your user needs, you might need separate apps for desktop, mobile, and even wearables.

The Bottom Line

As the Internet of Things continues to grow, the world will need an army of IoT-savvy Product Managers. And those Product Managers will need to understand each layer of the stack, and how they all fit together into a complete IoT solution.

++++++++++++++

more on Internet of Things in this blog:

https://blog.stcloudstate.edu/ims?s=internet+of+things

1 32 33 34 35 36 66