Posts Tagged ‘security’

Wearable Tech

Sizing Up Wearable Tech and IoT in the Enterprise

https://fiberlinkcorp.webex.com/fiberlinkcorp/onstage/g.php?d=358842843&t=a

Kayla Bittner  358 842 843 Twitter:#smartoffice

Det Ansinn speaker

Android Wear (java)
Pebble (C)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature

limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance

opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)

GOod wearable Design: Recognizes immediacy, leverages context of the wearer

challenging to develop good experiences for these devices.

802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
Addon –
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.

Frank Schloendorn, Fiberlink, speaker

build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available

Do you currently own smartwatch

Do you currently own smartwatch

no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone

Best practices:
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)

new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.

bricksimple.com
MaaS360.com/trial

password manager

How and why to set up and use a password manager

Commit to a password manager to make your online life easier and more secure.

http://www.cnet.com/how-to/how-and-why-to-set-up-and-use-a-password-manager/

A password manager stores the passwords for your various online accounts and profiles and saves you from having to remember and enter each one each time you visit a password-protected site. Instead, your passwords are encrypted and held by your password manager, which you then protect with a master password. Since you are saved from having to remember all of your passwords, you will be less tempted by the dangerously poor idea of using the same password for all of your accounts. With a password manager, you can create strong passwords for all of your accounts and keep all of those passwords saved behind a stronger master password, leaving you to remember but a single password.

With PasswordBox, you can sign up for an account via its mobile app or the PasswordBox website on a computer. I chose the latter and downloaded PasswordBox from its website, which turned out to be a browser extension.

technology for early childhood students

Plan for today, Mon, Nov 17 class session:

Parent involvement in their children’s social emotional and academic development.

  1. Introduce myself, who I am, who do I work with. Why is it good to know IMS and consider working with IMS. How to contact us – 5 min
  2. Start with a video from the following IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/ :
    http://youtu.be/d5kW4pI_VQw – 2 min. What is the video about, how do students think it relates to their class (parent involvement in their children’s social emotional and academic development) – about 5 min
  3. Group work assignment – what is digital literacy and why is it important to people of all ages:
    Students work in groups and outline a definition of digital literacy and a list of 5 reasons about the importance – 5 min
    Study and discuss the following infographic (5 min)
    http://blog.stcloudstate.edu/ims/2014/10/16/early-learners-tech-use/
    For and against children spending time with technology. Gaming, social media, and computer use in general as addiction. “Disconnect/Unplugged” (Sherry Turkle) versus contemplative computing and similar meditative and contemplative practices: http://blog.stcloudstate.edu/ims/2013/11/05/getting-unplugged/
  4. Discussion on how does digital literacy vary between age groups; how do people from different ages communicate. How do they work together and help each other when learning about digital literacy. Who is the best source for students to learn about digital literacy (hint – IMS ;)) – 10 min
    Suggested source for more information: The SlideShare presentation on the IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/: http://www.slideshare.net/dajbelshaw/etmooc-t3-s1-digital-literacies-with-dr-doug-belshaw
  5. Discussion on digital identity, digital citizenship, privacy and security. – 10 min
    http://blog.stcloudstate.edu/ims/2013/10/03/digital-identity-and-digital-citizenship/
  6. Questions and suggestions regarding

1 2