Sizing Up Wearable Tech and IoT in the Enterprise
Kayla Bittner 358 842 843 Twitter:#smartoffice
Det Ansinn speaker
Android Wear (java)
Samsung Tizen (HTML5)
Apple Watch WatchKit (Swift, Objective-C support is buggy)
WatchKit is the least mature
limitations: no keyboard, no mouse, no touch screen, battery life, limited usable screen real estate, CPU performance
opportunities: hands-free, speech for text input, sensors (gyro, camera, accelerometer), gesture-based input, BLE (bluetoothSmart)
GOod wearable Design: Recognizes immediacy, leverages context of the wearer
challenging to develop good experiences for these devices.
802.11 will eat short battery life, in addition to bluetooth. Samsung Gear S will get notification even from afar, but usually smartwatch notification is paired only in immediate proximity of the bluetoothed device.
industrial uses of wearable: tag and quickmessages, not occupying hands.
keyboard is with swipe gestures.
Frank Schloendorn, Fiberlink, speaker
build in security is limited. Jailbroken / rooted devices are at higher risk> Open to hacking, still in infancy. No real MDM (Mobile Device Management) type solutions available
Do you currently own smartwatch
no management solutions exist today. OS: Tizen, Android, PebbleOS, Apple Watch OS etc
Cameras and other sensors cant be managed, monitored (spy scenario)
Is wearable an independent device or an extension of a smartphone
manage the connected device, not the wearable
be aware of what data can “leak” to a wearable device
if necessary, take more extreme measures (block bluetooth, ban devices)
new security options for mobile devices linked to wearables. bypass lock screen with presence of wearable, content sensitive security.
Plan for today, Mon, Nov 17 class session:
Parent involvement in their children’s social emotional and academic development.
- Introduce myself, who I am, who do I work with. Why is it good to know IMS and consider working with IMS. How to contact us – 5 min
- Start with a video from the following IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/ :
http://youtu.be/d5kW4pI_VQw – 2 min. What is the video about, how do students think it relates to their class (parent involvement in their children’s social emotional and academic development) – about 5 min
- Group work assignment – what is digital literacy and why is it important to people of all ages:
Students work in groups and outline a definition of digital literacy and a list of 5 reasons about the importance – 5 min
Study and discuss the following infographic (5 min)
For and against children spending time with technology. Gaming, social media, and computer use in general as addiction. “Disconnect/Unplugged” (Sherry Turkle) versus contemplative computing and similar meditative and contemplative practices: http://blog.stcloudstate.edu/ims/2013/11/05/getting-unplugged/
- Discussion on how does digital literacy vary between age groups; how do people from different ages communicate. How do they work together and help each other when learning about digital literacy. Who is the best source for students to learn about digital literacy (hint – IMS ;)) – 10 min
Suggested source for more information: The SlideShare presentation on the IMS blog entry: http://blog.stcloudstate.edu/ims/2013/05/01/on-digital-literacy/: http://www.slideshare.net/dajbelshaw/etmooc-t3-s1-digital-literacies-with-dr-doug-belshaw
- Discussion on digital identity, digital citizenship, privacy and security. – 10 min
- Questions and suggestions regarding
Plan for Sylvester Lamin’s course:
- introduce myself – 5 min
- discuss with students how they see the impact of technology on their work – 5 min
- discuss with students the implications of technology on their work – 15
email as unreliable medium
- discuss with students the possibilities, which SCSU resources and Internet resources can provide for collaboration, creativity and streamlining the work of the social worker – 15
File space at SCSU versus other free resources
keeping data in the cloud
collaborating on documents and policies
sharing data with clients
- Other issues, ideas – 10
1. User and Data Access control security policies for the end user
2. Access Through Secured Connection ( TLS/SSL and HTTPS)
3. Network Security
4. Disaster Recovery, Environmental Safeguards and Physical Access Security Policies
5. Third-party Certificates
2-Step Verification for your Google Account to provide an additional layer of security when signing in. With 2-Step Verification, signing into your account will require both your password and a verification code you can generate with this app. Once configured, you can get verification codes without the need of a network or cellular connection.
take care of the most common tasks from anywhere you are. Add users, reset passwords, manage groups, contact support, and view domain setting changes.
Obama Adviser John Podesta: ‘Every Country Has a History of Going Over the Line’
Instead of a no-spy deal, the US has begun a Cyber Dialogue with Germany. In a SPIEGEL interview, John Podesta, a special adviser to President Barack Obama, speaks of the balance between alliances and security and says that changes are being made to NSA espionage practices.
Pls consider the following additional resources on the topic:
Power, Privacy, and the Internet
- Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen:
- The Internet and the Future of the Press
- The Internet, Repression and Dissent
Merkel calls for separate EU internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
Why Aren’t More Schools Using Free, Open Tools?
Teachers were complaining that they wanted a simple way to share files and links within the classroom, like a private Twitter app. Rather than having IT professionals respond to the request, Reisinger’s students programmed a solution that they call Paper Plane. ”Those kids have code up on GitHub [a site for open-source code] right now that they’re sharing out,” Reisinger said. Students also designed the help ticketing software that their peers use to request IT support.
oh, my, what a blasphemy; what do we do about SECURITY?…
A lot of people are scared away from open-source software or operating systems like Linux because of the belief that they are harder for teachers and students to use, and are more challenging to support.
a bigger reason people don’t go open-source is that the devices and software aren’t as shiny and exciting as iPads or Chromebooks.
recent concerns regarding third party providers and privacy are less of an issue
10 technology hallmarks for every campus
1. High-speed wireless broadband.
According to the Center for Digital Education’s recent “2013 Yearbook: Technology Innovation in Education,” over 80 percent of education institutions surveyed said that wireless broadband was their “top priority for IT investment.”
2. 24/7 IT support.
We have 24/7 support for emergencies and much of our staff, just like at a hospital, are on call. That’s not a perk for the campus, it’s a necessity.
3. The cloud.
The cloud can also: acquire and implement the latest software and application updates; streamline enrollment and admissions processes; and turn to subscriptions that are scalable and provide options, says Edudemic.
4. Digital textbooks.
Planning for digital textbooks means not only boosting mobile device capabilities on campus, but helping faculty learn to implement digital resources into their course.
5. 21st Century PD for faculty and admin.
From offering a MOOC on classroom management online solutions, to hosting a PD session on Twitter, campus admin should offer multiple options for PD delivery, just like how faculty should offer students multiple options for learning–there’s no better way to teach something than to model it first!
[Read: “3 pros and 3 cons of MOOCs.”]
7. Online course management system.
From sending in-class emails to checking grades, course management systems, like Blackboard, offer faculty and students a fairly intuitive way to manage courses more efficiently.
8. Big Data…
Future-proofing universities are beginning to deploy storage solutions to help manage the unstructured data in physical, virtual and cloud environments. More modern storage solutions are also open source for a high learning curve but low cost.
precautions can range from scanning existing databases on the university’s servers to determine where personal information is located and then, depending on the database, destroy the personal information or add more digital security; as well as put cybersecurity systems through a series of penetration tests to highlight security shortcomings.
[Read: “University data breach prompts ‘top-to-bottom’ IT review.”]
10. Social media done well.
of the major ways campuses use social media well is by serving up both “cake” and “broccoli,” or balancing the content that is important and good for the school (broccoli) and the content that is fun and delicious (cake). “If you share enough cake, your audience will consume the occasional broccoli,” she advises.
Big Data and Privacy
April 17, 2014
Big data has been generating big hype for a while. In January, the White House jumped into the fray, launching a big data and privacy review. CDT participated in all three public workshops convened in connection with the review and submitted written comments.
CDT’s Big Data and Privacy Comments
In our comments, we focused on three main areas: applying the Fair Information Practice Principles (FIPPs) to both private sector and government big data programs; exploring technical measures such as de-identification to safeguard privacy; and reforming existing privacy laws, most notably the Electronic Communications Privacy Act, to account for rapid changes in the ways that digital data is collected, stored, and used.
CDT stressed that, as entities collect more data to offer innovative products and more efficient services, they must still be guided by purpose specification, consent, security, and the other elements of the FIPPs framework.
Government and Big Data
|“Strong consensus is forming that the bulk collection of phone records should end.”
|The Administration says that it will end its bulk collection of telephony metadata, although the details of what will replace it remain unsettled. Meanwhile, CDT is pointing out that the laws the government has used to justify bulk collection are not limited just to phone records. Instead, they could be used to justify collection of location data, Internet browsing history, financial records, and more. CDT has been vocal in advocating the end of all forms of bulk collection, and we endorse the USA FREEDOM Act as the best legislation to do just that.
A report from the White House review is due before the end of April, but it is expected to present more questions than answers. In this complex and unsettled space, CDT will continue to work with companies and other stakeholders to develop workable approaches that will protect privacy while pursuing the benefits promised by advanced data analytics.
Check Out CDT’s New Website
CDT has launched a totally revamped website: http://www.cdt.org. It has a fresh new look and tools that should make our content more easily accessible. Thanks to our partners at iStrategy Labs for their creative and technical efforts on the new site.