Fusking = using a program to extract files names from a website that would seem obvious. Like 1.jpg, 2.jpg, etc. http://fusking.urbanup.com/3995415#.VVNxIdIMi54.
How hackers built software to steal naked photos from hundreds of women automatically
The Dark Art Of “Fusking”
Fusking: Photobucket Fights Back Against Peeping Toms, Sends Takedown Notice To Reddit Pages
A Bried History of BIG Data
Volume, Velocity, Variety
Internet of Things
privacy, security, intellectual property
Sizing Up Wearable Tech and IoT in the Enterprise
Kayla Bittner 358 842 843 Twitter:#smartoffice
Det Ansinn speaker
Android Wear (java)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature
limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance
opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)
GOod wearable Design: Recognizes immediacy, leverages context of the wearer
challenging to develop good experiences for these devices.
802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.
Frank Schloendorn, Fiberlink, speaker
build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available
Do you currently own smartwatch
no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)
new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.
Commit to a password manager to make your online life easier and more secure.
A password manager stores the passwords for your various online accounts and profiles and saves you from having to remember and enter each one each time you visit a password-protected site. Instead, your passwords are encrypted and held by your password manager, which you then protect with a master password. Since you are saved from having to remember all of your passwords, you will be less tempted by the dangerously poor idea of using the same password for all of your accounts. With a password manager, you can create strong passwords for all of your accounts and keep all of those passwords saved behind a stronger master password, leaving you to remember but a single password.
With PasswordBox, you can sign up for an account via its mobile app or the PasswordBox website on a computer. I chose the latter and downloaded PasswordBox from its website, which turned out to be a browser extension.
Plan for today, Mon, Nov 17 class session:
Parent involvement in their children’s social emotional and academic development.
- Introduce myself, who I am, who do I work with. Why is it good to know IMS and consider working with IMS. How to contact us – 5 min
- Start with a video from the following IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/ :
http://youtu.be/d5kW4pI_VQw – 2 min. What is the video about, how do students think it relates to their class (parent involvement in their children’s social emotional and academic development) – about 5 min
- Group work assignment – what is digital literacy and why is it important to people of all ages:
Students work in groups and outline a definition of digital literacy and a list of 5 reasons about the importance – 5 min
Study and discuss the following infographic (5 min)
For and against children spending time with technology. Gaming, social media, and computer use in general as addiction. “Disconnect/Unplugged” (Sherry Turkle) versus contemplative computing and similar meditative and contemplative practices: http://blog.stcloudstate.edu/ims/2013/11/05/getting-unplugged/
- Discussion on how does digital literacy vary between age groups; how do people from different ages communicate. How do they work together and help each other when learning about digital literacy. Who is the best source for students to learn about digital literacy (hint – IMS ;)) – 10 min
Suggested source for more information: The SlideShare presentation on the IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/: http://www.slideshare.net/dajbelshaw/etmooc-t3-s1-digital-literacies-with-dr-doug-belshaw
- Discussion on digital identity, digital citizenship, privacy and security. – 10 min
- Questions and suggestions regarding