POPULARITY
Vi besöks i detta avsnitt av Annie Petersson och Mathias Huber från Exobe för att prata om de senaste trenderna från ISE i Barcelona. Vi gästas dessutom av Benny Andersson från Logitech som var med och arrangerade Video Installation World Cup. Barcelona | Logitech - VWC I detta avsnitt av Teamspodden diskuterar värdarna Linus och Mårten tillsammans med gästerna Annie och Mathias om den senaste ISE-mässan och trender inom AV-teknik. De utforskar hållbarhet, smarta arbetsplatser och integrationer mellan olika system. Diskussionen berör också marknadens mättnad och framtiden för mötesrum och digitala lösningar. I denna konversation diskuterades installationens utmaningar och tidsaspekter, byggstandarder och regler i olika länder, samt trender inom mötesrum och signaturer. Deltagarna reflekterade över MTR och Bring Your Own Device, AI:s roll i mötesrumsteknik, Microsofts närvaro och strategi på mässan, samt kameror och certifiering i AV-världen. Avslutningsvis berördes digital signage i MTR-perspektiv och framtiden för AV-professionella och mässor.
Eshan Mathur, Senior Product Manager at Microsoft, helps us understand the evolving Bring Your Own Device (BYOD) landscape within Microsoft Teams, focusing on Microsoft's aim to provide seamless user experiences and enhanced manageability for IT admins for BYOD.Eshan's unique career journey from game development, including 'Where's my water', to enterprise solutionsEnhancements in Microsoft Teams BYOD experiences, including automatic audio device selection Auto-association for managing shared devicesFuture BYOD developments and recommendations for organisations in BYOD scenariosThanks to Logitech, this episode's sponsor, for their continued support.
Was bedeutet eigentlich Bring your own Device (BYOD)?
Datenschutz im OHR - DSGVO Erste Hilfe für Solo-Selbstständige und Kleinunternehmen leicht gemacht
Privatgeräte der Mitarbeiter zu nutzen ist verlockend um die Geräteanschaffungskosten zu sparen. Warum das aber eine nicht so gute Idee ist und wo die Gefahren auch im Rahmen der DSGVO liegen, zeigen wir Dir in dieser Folge auf. Shownotes:
Joël recaps his time at RubyConf! He shares insights from his talk about different aspects of time in software development, emphasizing the interaction with the audience and the importance of post-talk discussions. Stephanie talks about wrapping up a long-term client project, the benefits of change and variety in consulting, and maintaining a balance between project engagement and avoiding burnout. They also discuss strategies for maintaining work-life balance, such as physical separation and device management, particularly in a remote work environment. Rubyconf (https://rubyconf.org/) Joël's talk slides (https://speakerdeck.com/joelq/which-time-is-it) Flaky test summary slide (https://speakerdeck.com/aridlehoover/the-secret-ingredient-how-to-understand-and-resolve-just-about-any-flaky-test?slide=170) Transcript: STEPHANIE: Hello and welcome to another episode of The Bike Shed, a weekly podcast from your friends at thoughtbot about developing great software. I'm Stephanie Minn. JOËL: And I'm Joël Quenneville. And together, we're here to share a bit of what we've learned along the way. STEPHANIE: So, Joël, what's new in your world? JOËL: Well, as of this recording, I have just gotten back from spending the week in San Diego for RubyConf. STEPHANIE: Yay, so fun. JOËL: It's always so much fun to connect with the community over there, talk to other people from different companies who work in Ruby, to be inspired by the talks. This year, I was speaking, so I gave a talk on time and how it's not a single thing but multiple different quantities. In particular, I distinguish between a moment in time like a point, a duration and amount of time, and then a time of day, which is time unconnected to a particular day, and how those all connect together in the software that we write. STEPHANIE: Awesome. How did it go? How was it received? JOËL: It was very well received. I got a lot of people come up to me afterwards and make a variety of time puns, which those are so easy to make. I had to hold myself back not to put too many in the talk itself. I think I kept it pretty clean. There were definitely a couple of time puns in the description of the talk, though. STEPHANIE: Yeah, absolutely. You have to keep some in there. But I hear you that you don't want it to become too punny [laughs]. What I really love about conferences, and we've talked a little bit about this before, is the, you know, like, engagement and being able to connect with people. And you give a talk, but then that ends up leading to a lot of, like, discussions about it and related topics afterwards in the hallway or sitting together over a meal. JOËL: I like to, in my talks, give little kind of hooks for people who want to have those conversations in the hallway. You know, sometimes it's intimidating to just go up to a speaker and be like, oh, I want to, like, dig into their talk a little bit. But I don't have anything to say other than just, like, "I liked your talk." So, if there's any sort of side trails I had to cut for the talk, I might give a shout-out to it and say, "Hey, if you want to learn more about this aspect, come talk to me afterwards." So, one thing that I put in this particular talk was like, "Hey, we're looking at these different graphical ways to think about time. These are similar to but not the same as thinking of time as a one-dimensional vector and applying vector math to it, which is a whole other side topic. If you want to nerd out about that, come find me in the hallway afterwards, and I'd love to go deeper on it." And yeah, some people did. STEPHANIE: That's really smart. I like that a lot. You're inviting more conversation about it, which I know, like, you also really enjoy just, like, taking it further or, like, caring about other people's experiences or their thoughts about vector math [laughs]. JOËL: I think it serves two purposes, right? It allows people to connect with me as a speaker. And it also allows me to feel better about pruning certain parts of my talk and saying, look, this didn't make sense to keep in the talk, but it's cool material. I'd love to have a continuing conversation about this. So, here's a path we could have taken. I'm choosing not to, as a speaker, but if you want to take that branch with me, let's have that afterwards in the hallway. STEPHANIE: Yeah. Or even as, like, new content for yourself or for someone else to take with them if they want to explore that further because, you know, there's always something more to explore [chuckles]. JOËL: I've absolutely done that with past talks. I've taken a thing I had to prune and turned it into a blog post. A recent example of that was when I gave a talk at RailsConf Portland, which I guess is not so recent. I was talking about ways to deal with a test suite that's making too many database requests. And talking about how sometimes misusing let in your RSpec tests can lead to more database requests than you expect. And I had a whole section about how to better understand what database requests will actually be made by a series of let expressions and dealing with the eager versus lazy and all of that. I had to cut it. But I was then able to make a blog post about it and then talk about this really cool technique involving dependency graphs. And that was really fun. So, that was a thing where I was able to say, look, here's some content that didn't make it into the talk because I needed to focus on other things. But as its own little, like, side piece of content, it absolutely works, and here's a blog post. STEPHANIE: Yeah. And then I think it turned into a Bike Shed episode, too [laughs]. JOËL: I think it did, yes. I think, in many ways, creativity begets creativity. It's hard to get started writing or producing content or whatever, but once you do, every idea you have kind of spawns new ideas. And then, pretty soon, you have a backlog that you can't go through. STEPHANIE: That's awesome. Any other highlights from the conference you want to shout out? JOËL: I'd love to give a shout-out to a couple of talks that I went to, Aji Slater's talk on the Enigma machine as a German code machine from World War II and how we can sort of implement our own in Ruby and an exploration of object-oriented programming was fantastic. Aji is just a masterful storyteller. So, that was really great. And then Alan Ridlehoover's talk on dealing with flaky tests that one, I think, was particularly useful because I think it's one of the talks that is going to be immediately relevant on Monday morning for, like, every developer that was in that room and is going back to their regular day job. And they can immediately use all of those principles that Alan talked about to deal with the flaky tests in their test suite. And there's, in particular, at the end of his presentation, Alan has this summary slide. He kind of broke down flakiness across three different categories and then talked about different strategies for identifying and then fixing tests that were flaky because of those reasons. And he has this table where he sort of summarizes basically the entire talk. And I feel like that's the kind of thing that I'm going to save as a cheat sheet. And that can be, like, I'm going to link to this and share it all over because it's really useful. Alan has already put his slides up online. It's all linked to that particular slide in the show notes because I think that all of you would benefit from seeing that. The talks themselves are recorded, but they're not going to be out for a couple of weeks. I'm sure when they do, we're going to go through and watch some and probably comment on some of the talks as well. So, Stephanie, what is new in your world? STEPHANIE: Yeah. So, I'm celebrating wrapping up a client project after a nine-month engagement. JOËL: Whoa, that's a pretty long project. STEPHANIE: Yeah, that's definitely on the longer side for thoughtbot. And I'm, I don't know, just, like, feeling really excited for a change, feeling really, you know, proud of kind of, like, all of the work that we had done. You know, we had been working with this client for a long time and had been, you know, continuing to deliver value to them to want to keep working with us for that long. But I'm, yeah, just looking forward to a refresh. And I think that's one of my favorite things about consulting is that, you know, you can inject something new into your work life at a kind of regular cadence. And, at least for me, that's really important in reducing or, like, preventing the burnout. So, this time around, I kind of started to notice, and other people, too, like my manager, that I was maybe losing a bit of steam on this client project because I had been working on it for so long. And part of, you know, what success at thoughtbot means is that, like, we as employees are also feeling fulfilled, right? And, you know, what are the different ways that we can try to make sure that that remains the case? And kind of rotating folks on different projects and kind of making sure that things do feel fresh and exciting is really important. And so, I feel very grateful that other people were able to point that out for me, too, when I wasn't even fully realizing it. You know, I had people checking in on me and being like, "Hey, like, you've been on this for a while now. Kind of what I've been hearing is that, like, maybe you do need something new." I'm just excited to get that change. JOËL: How do you find the balance between sort of feeling fulfilled and maybe, you know, finding that point where maybe you're feeling you're running out of steam–versus, you know, some projects are really complex, take a while to ramp up; you want to feel productive; you want to feel like you have contributed in a significant way to a project? How do you navigate that balance? STEPHANIE: Yeah. So, the flip side is, like, I also don't think I would enjoy having to be changing projects all the time like every couple of months. That maybe is a little too much for me because I do like to...on our team, Boost, we embed on our team. We get to know our teammates. We are, like, building relationships with them, and supporting them, and teaching them. And all of that is really also fulfilling for me, but you can't really do that as much if you're on more shorter-term engagements. And then all of that, like, becomes worthwhile once you're kind of in that, like, maybe four or five six month period where you're like, you've finally gotten your groove. And you're like, I'm contributing. I know how this team works. I can start to see patterns or, like, maybe opportunities or gaps. And that is all really cool, and I think also another part of what I really like about being on Boost. But yeah, I think what I...that losing steam feeling, I started to identify, like, I didn't have as much energy or excitement to push forward change. When you kind of get a little bit too comfortable or start to get that feeling of, well, these things are the way they are [laughs], -- JOËL: Right. Right. STEPHANIE: I've now identified that that is kind of, like, a signal, right? JOËL: Maybe time for a new project. STEPHANIE: Right. Like starting to feel a little bit less motivated or, like, less excited to push myself and push the team a little bit in areas that it needs to be pushed. And so, that might be a good time for someone else at thoughtbot to, like, rotate in or maybe kind of close the chapter on what we've been able to do for a client. JOËL: It's hard to be at 100% all the time and sort of always have that motivation to push things to the max, and yeah, variety definitely helps with that. How do you feel about finding signals that maybe you need a break, maybe not from the project but just in general? The idea of taking PTO or having kind of a rest day. STEPHANIE: Oh yeah. I, this year, have tried out taking time off but not going anywhere just, like, being at home but being on vacation. And that was really great because then it was kind of, like, less about, like, oh, I want to take this trip in this time of year to this place and more like, oh, I need some rest or, like, I just need a little break. And that can be at home, right? Maybe during the day, I'm able to do stuff that I keep putting off or trying out new things that I just can't seem to find the time to do [chuckles] during my normal work schedule. So, that has been fun. JOËL: I think, yeah, sometimes, for me, I will sort of hit that moment where I feel like I don't have the ability to give 100%. And sometimes that can be a signal to be like, hey, have you taken any time off recently? Maybe you should schedule something. Because being able to refresh, even short-term, can sort of give an extra boost of energy in a way where...maybe it's not time for a rotation yet, but just taking a little bit of a break in there can sort of, I guess, extend the time where I feel like I'm contributing at the level that I want to be. STEPHANIE: Yeah. And I actually want to point out that a lot of that can also be, like, investing in your life outside of work, too, so that you can come to work with a different approach. I've mentioned the month that I spent in the Hudson Valley in New York and, like, when I was there, I felt, like, so different. I was, you know, just, like, so much more excited about all the, like, novel things that I was experiencing that I could show up to work and be like, oh yeah, like, I'm feeling good today. So, I have all this, you know, energy to bring to the tasks that I have at work. And yeah, so even though it wasn't necessarily time off, it was investing in other things in my life that then brought that refresh at work, even though nothing at work really changed [laughs]. JOËL: I think there's something to be said for the sort of energy boost you get from novelty and change, and some of that you get it from maybe rotating to a different project. But like you were saying, you can change your environment, and that can happen as well. And, you know, sometimes it's going halfway across the country to live in a place for a month. I sometimes do that in a smaller way by saying, oh, I'm going to work this morning from a coffee shop or something like that. And just say, look, by changing the environment, I can maybe get some focus or some energy that I wouldn't have if I were just doing same old, same old. STEPHANIE: Yeah, that's a good point. So, one particularly surprising refresh that I experienced in offboarding from my client work is coming back to my thoughtbot, like, internal company laptop, which had been sitting gathering dust [laughs] a little bit because I had a client-issued laptop that I was working in most of the time. And yeah, I didn't realize how different it would feel. I had, you know, gotten everything set up on my, you know, my thoughtbot computer just the way that I liked it, stuff that I'd never kind of bothered to set up on my other client-issued laptop. And then I came back to it, and then it ended up being a little bit surprising. I was like, oh, the icons are smaller on this [laughs] computer than the other computer. But it definitely did feel like returning to home, I think, instead of, like, being a guest in someone else's house that you haven't quite, like, put all your clothes in the closet or in the drawers. You're still maybe, like, living out of a suitcase a little bit [laughs]. So yeah, I was kind of very excited to be in my own space on my computer again. JOËL: I love the metaphor of coming home, and yeah, being in your own space, sleeping in your own bed. There's definitely some of that that I feel, I think, when I come back to my thoughtbot laptop as well. Do you feel like you get a different sense of connection with the rest of our thoughtbot colleagues when you're working on the thoughtbot-issued laptop versus a client-issued one? STEPHANIE: Yeah. Even though on my client-issued computer I had the thoughtbot Slack, like, open on there so I could be checking in, I wasn't necessarily in, like, other thoughtbot digital spaces as much, right? So, our, like, project management tools and our, like, internal company web app, those were things that I was on less of naturally because, like, the majority of my work was client work, and I was all in their digital spaces. But coming back and checking in on, like, all the GitHub discussions that have been happening while I haven't had enough time to catch up on them, just realizing that things were happening [laughs] even when I was doing something else, that is both cool and also like, oh wow, like, kind of sad that I [chuckles] missed out on some of this as it was going on. JOËL: That's pretty similar to my experience. For me, it almost feels a little bit like the difference between back when we used to be in person because thoughtbot is now fully remote. I would go, usually, depending on the client, maybe a couple of days a week working from their offices if they had an office. Versus some clients, they would come to our office, and we would work all week out of the thoughtbot offices, particularly if it was like a startup founder or something, and they might not already have office space. And that difference and feeling the connection that I would have from the rest of the thoughtbot team if I were, let's say, four days a week out of a client office versus two or four days a week out of the thoughtbot office feels kind of similar to what it's like working on a client-issued laptop versus on a thoughtbot-issued one. STEPHANIE: Another thing that I guess I forgot about or, like, wasn't expecting to do was all the cleanup, just the updating of things on my laptop as I kind of had it been sitting. And it reminded me to, I guess, extend that, like, coming home metaphor a little bit more. In the game Animal Crossing, if you haven't played the game in a while because it tracks, like, real-time, so it knows if you haven't, you know, played the game in a few months, when you wake up in your home, there's a bunch of cockroaches running around [laughs], and you have to go and chase and, like, squash them to clean it up. JOËL: Oh no. STEPHANIE: And it kind of felt like that opening my computer. I was like, oh, like, my, like, you know, OS is out of date. My browsers are out of date. I decided to get an internal company project running in my local development again, and I had to update so many things, you know, like, install the new Ruby version that the app had, you know, been upgraded to and upgrade, like, OpenSSL and all of that stuff on my machine to, yeah, get the app running again. And like I mentioned earlier, just the idea of like, oh yeah, this has evolved and changed, like, without me [laughs] was just, you know, interesting to see. And catching myself up to speed on that was not trivial work. So yeah, like, all that maintenance stuff still got to do it. It's, like, the digital cleanup, right? JOËL: Exactly. So, you mentioned that on the client machine, you still had the thoughtbot Slack. So, you were able to keep up at least some messages there on one device. I'm curious about the experience, maybe going the other way. How much does thoughtbot stuff bleed into your personal devices, if at all? STEPHANIE: Barely. I am very strict about that, I think. I used to have Slack on my phone, I don't know, just, like, in an earlier time in my career. But now I have it a rule to keep it off. I think the only thing that I have is my calendar, so no email either. Like, that is something that I, like, don't like to check on my personal time. Yeah, so it really just is calendar just in case I'm, like, out in the morning and need to be, like, oh, when is my first meeting? But [laughs] I will say that the one kind of silly thing is that I also refuse to sign into my Google account for work. So, I just have the calendar, like, added to my personal calendar but all the events are private. So, I can't actually see what the events are [laughs]. I just know that I have something going on at, like, 10:00 a.m. So, I got to make sure I'm back home by then [laughs], which is not so ideal. But at the risk of being signed in and having other things bleed into my personal devices, I'm just living with that for now [laughs]. JOËL: What I'm hearing is that I could put some mystery events on your calendar, and you would have a fun surprise in the morning because you wouldn't know what it is. STEPHANIE: Yeah, that is true [laughs]. If you put, like, a meeting at, like, 8:00 a.m., [laughs] then I'm like, oh no, what's this? And then I arrive, and it's just, like [laughs], a fun prank meeting. So, you know, you were talking about how you were at the conference this week. And I'm wondering, how connected were you to work life? JOËL: Uh, not very. I tried to be very present in the moment at the conference. So, I'm, you know, connected to all the other thoughtboters who were there and connecting with the attendees. I do have Slack on my phone, so if I do need to check it for something. There was a little bit of communication that was going on for different things regarding the conference, so I did check in for that. But otherwise, I tried to really stay focused on the in-person things that are happening. I'm not doing any client work during those days that I'm at RubyConf, and so I don't need to deal with anything there. I had my thoughtbot laptop with me because that's what I used to give my presentation. But once the presentation was done, I closed that laptop and didn't open it again, and, honestly, that felt kind of good. STEPHANIE: Yeah, that is really nice. I'm the same way, where I try to be pretty connected at conferences, and, like, I will actually redownload Slack sometimes just for, like, coordinating purposes with other folks who are there. But I think I make it pretty clear that I'm, like, away. You know, like, I'm not actually...like, even though I'm on work time, I'm not doing any other work besides just being present there. JOËL: So, you mentioned the idea of work time. Do you have, like, a pretty strict boundary between personal time and work time and, like, try not to allow either to bleed into each other? STEPHANIE: Yeah. I can't remember if I've mentioned this on the show. I think I have, but I'm going to again because one of my favorite things that I picked up from The Bike Shed back when Chris Toomey and Steph Viccari were hosting the show is Chris had, like, a little ritual that he would do every day to signal that he was done with work. He would close his laptop and say, "Schedule shutdown complete," I think. And I've started adopting it because then it helps me be like, I'm not going to reopen my laptop after this because I have said the words. And even if I think of something that I maybe need to add to my to-do list, I will, instead of opening my computer and adding to my, like, whatever digital to-do list, I will, like, write it down on a piece of paper instead for the sake of, you know, not risking getting sucked back into, you know, whatever might be going on after the time that I've, like, decided that I need to be done. JOËL: So, you have a very strict divisioning between work time and personal time. STEPHANIE: Yeah, I would say so. I think it's important for me because even when I take time off, you know, sometimes folks might work a half day or something, right? I really struggle with having even a half day feel like, once I'm done with work, having that feel like okay, like, now I'm back in my personal time. I'd much prefer not working the entire day at all because that is kind of the only way that I can feel like I've totally reclaimed that time. Otherwise, it's like, once I start thinking about work stuff, it's like I need a mental boundary, right? Because if I'm thinking about a work problem, or, like, an interaction or, like, just anything, it's frustrating because it doesn't feel like time in my own brain [laughs] is my own. What do work and personal time boundaries look like for you? JOËL: I think it's evolved over time. Device usage is definitely a little bit more blurry for me. One thing that I have started doing since we've gone fully remote as the pandemic has been winding down and, you know, you can do things, but we're still working from home, is that more days than not, I work from home during the day, and then I leave my home during the evening. I do a variety of social activities. And because I like to be sort of present in the moment, that means that by being physically gone, I have totally disconnected because I'm not checking emails or anything like that. Even though I do have thoughtbot email on my phone, Gmail allows me to like log into my personal account and my thoughtbot account. I have to, like, switch between the two accounts, and so, that's, like, more work than I would want. I don't have any notifications come in for the thoughtbot account. So, unless I'm, like, really wanting to see if a particular email I'm waiting for has come in, I don't even look at it, ever. It's mostly just there in case I need to see something. And then, by being focused in the moment doing social things with other people, I don't find too much of a temptation to, like, let work life bleed into personal life. So, there's a bit of a physical disconnect that ends up happening by moving out of the space I work in into leaving my home. STEPHANIE: Yeah. And I'm sure it's different for everyone. As you were saying that, I was reminded of a funny meme that I saw a long time ago. I don't think I could find it if I tried to search for it. But basically, it's this guy who is, you know, sitting on one side of the couch, clearly working. And he's kind of hunched over and, like, typing and looking very serious. And then he, like, closes his laptop, moves over, like, just slides to the other side of the couch, opens his laptop. And then you see him, like, lay back, like, legs up on the coffee table. And it's, like, work computer, personal computer, but it's the same computer [laughs]. It's just the, like, how you've decided like, oh, it's time for, you know, legs up, Netflix watching [laughs]. JOËL: Yeah. Yeah. I'm curious: do you use your thoughtbot computer for any personal things? Or is it just you shut that down; you do the closing ritual, and then you do things on a separate device? STEPHANIE: Yeah, I do things on a separate device. I think the only thing there might be some overlap for are, like, career-related extracurriculars or just, like, development stuff that I'm interested in doing, like, separate from what I am paid to do. But that, you know, kind of overlaps a little bit because of, like, the tools and the stuff I have installed on my computer. And, you know, with our investment time, too, that ends up having a bit of a crossover. JOËL: I think I'm similar in that I'll tend to do development things on my thoughtbot machine, even though they're not necessarily thoughtbot-related, although they could be things that might slot into something like investment time. STEPHANIE: Yeah, yeah. And it's because you have all your stuff set up for it. Like, you're not [laughs] trying to install the latest Ruby version on two different machines, probably [laughs]. JOËL: Yeah. Also, my personal device is a Windows machine. And I've not wanted to bother learning how to set that up or use the Windows Subsystem for Linux or any of those tools, which, you know, may be good professional learning activities. But that's not where I've decided to invest my time. STEPHANIE: That makes sense. I had an interesting conversation with someone else today, actually, about devices because I had mentioned that, you know, sometimes I still need to incorporate my personal devices into work stuff, especially, like, two-factor authentication. And specifically on my last client project...I have a very old iPhone [laughs]. I need to start out by saying it's an iPhone 8 that I've had for, like, six or seven years. And so, it's old. Like, one time I went to the Apple store, and I was like, "Oh, I'm looking for a screen protector for this." And they're like, "Oh, it's an iPhone 8. Yikes." [laughs] This was, you know, like, not too long ago [laughs]. And the multi-factor authentication policy for my client was that, you know, we had to use this specific app. And it also had, like, security checks. Like, there's a security policy that it needed to be updated to the latest iOS. So, even if I personally didn't want to update my iOS [laughs], I felt compelled to because, otherwise, I would be locked out of the things that I needed to do at work [laughs]. JOËL: Yeah, that can be a challenge sometimes when you're adding work things to personal devices, maybe not because it's convenient and you want to, but because you don't have a choice for things like two-factor auth. STEPHANIE: Yeah, yeah. And then the person I was talking to actually suggested something I hadn't even thought about, which is like, "Oh, you know, if you really can't make it work, then, like, consider having that company issue another device for you to do the things that they're, like, requiring of you." And I hadn't even thought of that, so... And I'm not quite at the point where I'm like, everything has to be, like, completely separate [laughs], including two-factor auth. But, I don't know, something to consider, like, maybe that might be a place I get to if I'm feeling like I really want to keep those boundaries strict. JOËL: And I think it's interesting because, you know, when you think of the kind of work that we do, it's like, oh, we work with computers, but there are so many subfields within it. And device management and, just maybe, corporate IT, in general, is a whole subfield that is separate and almost a little bit alien. Two, I feel like me, as a software developer, I'm just aware of a little bit...like, I've read a couple of articles around...and this was, you know, years ago when the trend was starting called Bring Your Own Device. So, people who want to say, "Hey, I want to use my phone. I want to have my work email on my phone." But then does that mean that potentially you're leaking company memos and things? So, how do you secure that kind of thing? And everything that IT had to think through in order to allow that, the pros and cons. So, I think we're just kind of, as users of that system, touching the surface of it. But there's a lot of thought and discussion that, as an industry, the kind of corporate IT folks have gone through to struggle with how to balance a lot of those things. STEPHANIE: Yeah, yeah. I bet there's a lot of complexity or nuance there. I mean, we're just talking about, like, ways that we do or don't mix work and personal life. And for that kind of work, you know, that's, like, the job is to think really thoroughly about how people use their devices and what should and shouldn't be permissible. The last thing that I wanted to kind of ask about in terms of device management or, like, work and personal intermixing is the idea of being on call and your device being a way for work to reach you and that being a requirement, right? I feel very lucky to obviously not really be in that position. As consultants, like, we're not usually so embedded into a team that we're then brought into, like, an on-call rotation, and I think that's good for me. Like, I don't think that that is something I'd be interested in doing anytime soon. Do you have any experience with that? JOËL: I have not been on a project where I've had to be on call, and I think that's generally true for most of us at thoughtbot who are doing software development. I know those who are doing more kind of platformy SRE-type things are on call. And, in fact, we have specifically hired people in different regions around the world so that we can provide 24-hour coverage for that kind of thing. STEPHANIE: Yeah. And I imagine kind of like what we're talking about with work device management looks even different for that kind of role, where maybe you do need a lot more access to things, like, wherever you might be. JOËL: And maybe the answer there is you get issued a work-specific device and a work phone or something like that, or an old-school work pager. STEPHANIE: [laughs] JOËL: PagerDuty is not just a metaphoric thing. Back in the day, they used actual pagers. STEPHANIE: Yeah, that would be very funny. JOËL: So yeah, I can't speak to it from personal experience, but I could imagine that maybe some of the dynamics there might be a little bit different. And, you know, for some people, maybe it's fine to just have an app on your phone that pings you when something happens, and you have to be on call. And you're able to be present while waiting, like, in case you get pinged, but also let it go while you're on call. I can imagine that's, like, a really weird kind of, like, shadow, like, working, not working experience that I can't really speak to because I have not been in that position. STEPHANIE: Yeah. As you were saying that, I also had the thought that, like, our ability to step away from work and our devices is also very much dependent on, like, a company culture and those types of factors, right? Where, you know, it is okay for me to not be able to look at that stuff and just come back to it Monday morning, and I am very grateful [laughs] for that. Because I recognize that, like, not everyone is in that position where there might be a lot more pressure or urgency to be on top of that. But right now, for this time in my life, like, that's kind of how I like to work. JOËL: I think it kind of sits at the intersection of a few different things, right? There's sort of where you are personally. It might be a combination, like, personality and maybe, like, mental health, things like that, how you respond to how sharp or blurry those lines between work and personal life can be. Like you said, it's also an element of company culture. If there's a company culture that's really pushing to get into your personal life, maybe you need firmer boundaries. And then, finally, what we spent most of this episode talking about: technical solutions, whether that's, like, physically separating everything such that there are two devices. And you close down your laptop, and you're done for the day. And whether or not you allow any apps on your personal phone to carry with you after you leave for the day. So, I think at the intersection of those three is sort of how you're going to experience that, and every person is going to be a little bit different. Because those three...I guess I'm thinking of a Venn diagram. Those three circles are going to be different for everyone. STEPHANIE: Yeah, that makes complete sense. JOËL: On that note, shall we wrap up? STEPHANIE: Let's wrap up. Show notes for this episode can be found at bikeshed.fm. JOËL: This show has been produced and edited by Mandy Moore. STEPHANIE: If you enjoyed listening, one really easy way to support the show is to leave us a quick rating or even a review in iTunes. It really helps other folks find the show. JOËL: If you have any feedback for this or any of our other episodes, you can reach us @_bikeshed, or you can reach me @joelquen on Twitter. STEPHANIE: Or reach both of us at hosts@bikeshed.fm via email. JOËL: Thanks so much for listening to The Bike Shed, and we'll see you next week. ALL: Byeeeeeee!!!!!! AD: Did you know thoughtbot has a referral program? If you introduce us to someone looking for a design or development partner, we will compensate you if they decide to work with us. More info on our website at: tbot.io/referral. Or you can email us at: referrals@thoughtbot.com with any questions.
Welcome solo and group practice owners! We are Liath Dalton and Evan Dumas, your co-hosts of Group Practice Tech. In our latest episode, we're talking about Bring Your Own Device policies for group practices. We discuss pros and cons of BYOD for group practice; allowing team members to use their preferred operating system to increase efficiency and reduce errors; standards for device security; endpoint management software; personal smartphone use; BYOD in the context of client care; device security training as a staff benefit; and Group Practice Care, which includes our system for easily managing personal device security and documentation. Listen here: https://personcenteredtech.com/group/podcast/ For more, visit our website. PCT Resources Group Practice Care Premium for weekly (live & recorded) direct support & consultation service, Group Practice Office Hours + Step Step 5 (Manual & Materials) Support Forums assignable staff HIPAA Security Awareness: Remote Workspaces training for all team members + access to Remote Workspace Center with step-by-step tutorials & registration forms for securing documenting Remote Workspaces (for *all* team members at no per-person cost) assignable staff HIPAA Security Awareness: Bring Your Own Device training + access to Device Security Center with step-by-step device-specific tutorials & registration forms for securing documenting personal & practice-provided devices(for *all* team members at no per-person cost) And more! PCT's Computer & Smartphone HIPAA Security Checklist for Therapists PCT's HIPAA Risk Analysis & Risk Mitigation Planning service for mental health group practices -- care for your practice using our supportive, shame-free risk analysis and mitigation planning service. You'll have your Risk Analysis done within 2 hours, performed by a PCT consultant, using a tool built specifically for mental health group practice, and a mitigation checklist to help you reduce your risks. PCT's Group Practice PCT Way HIPAA Compliance Manual & Materials -- comprehensive HIPAA Security Policies & Procedures for the practice as HIPAA covered entity *and/or* Business Associate/MSO. Comprehensively covers the HIPAA P&Ps for contractor clinician structure group practices, employee structure group practices, and practices that are hybrid. Policies & Procedures include: Customizable templates that address each of the HIPAA Security Rule Standards. Ready for plug-and-play real practice application. Computing Devices and Electronic Media Technical Security Policy Bring Your Own Device (BYOD) Policy Communications Security Policy Information Systems Secure Use Policy Risk Management Policy Contingency Planning Policy Device and Document Transport and Storage Policy Device and Document Disposal Policy Security Training and Awareness Policy Passwords and Other Digital Authentication Policy Software and Hardware Selection Policy Security Incident Response and Breach Notification Policy Security Onboarding and Exit Policy Sanction Policy Policy Release of Information Security Policy Remote Access Policy Data Backup Policy Facility/Office Access and Physical Security Policy Facility Network Security Policy Computing Device Acceptable Use Policy Business Associate Policy Access Log Review Policy Forms & Logs include: Workforce Security Policies Agreement Security Incident Report PHI Access Determination Password Policy Compliance BYOD Registration & Termination Data Backup & Confirmation Access Log Review Key & Access Code Issue and Loss Third-Party Service Vendors Building Security Plan Security Schedule Equipment Security Check Computing System Access Granting & Revocation Training Completion Mini Risk Analysis Security Incident Response Security Reminder Practice Equipment Catalog Plus: Workforce Security Manual & Leadership Security Manual -- the role-based practical application oriented distillation of the formal Policies & Procedures (includes the prohibitions on non-HIPAA-acceptable personal services + defines what personal services *are* allowable.) 2 complimentary seats of the Security Officer Endorsement Training Program (1 for Security Officer; 1 for Deputy (or future Deputy) Security Officer. PCT's free "mini risk" tool, for needs identification related to what's within and what's outside your practice's Security Circle (including personal device use)
AVWeek 597: Tim Albright is joined by Taft Stricklin and Ron Callis talking about conferencing solutions. Taft starts off talking about the impact of Bring Your Own Device solutions for the conferencing space.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Willkommen bei unserer Mission New Work. New Rules. - du bist mittendrin! In unserer Un:zipped Reihe wollen wir euch in knapp 30-minütigen Kurzfolgen die M365-Anwendungen und damit verbundene Themen näher bringen. Diese Woche haben sich Nils Konersmann und Felicitas Manger das Thema "Bring your own device" und die Microsoft Anwendung "Intune" angeschaut und bringen euch die Benefits näher. Microsoft Intune ist eine Software zum Cloud Computing und dient der Verwaltung von PC und mobilen Endgeräten über das Internet. Ihr erhaltet also nützliche Tipps, wie Unternehmen das Verwenden von eigenen Geräten ermöglichen können und trotzdem der Schutz der Daten gewährleistet ist. Welche Möglichkeiten gibt es, wo liegen die Unterschiede beim managen und was für Besonderheiten sind bei Apple Geräten zu beachten? All das erfahrt ihr in kompakten 20 Minuten! Zitate aus der Folge Nils Auch ein gutes Beispiel: Wenn ich Microsoft Teams auf meinem Privatgerät offen habe und einem Kollegen etwas aus meinem privaten Fotoalbum auf dem iPhone schicken möchte. Dann werde ich feststellen, dass ich die Bilder garnicht angezeigt bekomme. Das liegt daran, dass die privaten Daten getrennt sind und das ist auch gut so. Fee Ich kann mithilfe von Microsoft Intune festlegen, welche Apps die Mitarbeiter definitiv auf ihrem Mobile Device haben sollen. Wie beispielsweise Outlook, Teams und den MFA für die Authentifizierung. Das alles kann ich über eine Bring your own Device Gruppe pushen und gebe es allen Geräten direkt mit. In den kommenden Podcast-Folgen bekommst du: Infos und Tipps rund um die M365-Welt und ihre Anwendungen wie Power BI und Power Apps Inspiration und praktische Tipps für den Kulturwandel für dich oder dein Unternehmen, um immer einen Schritt voraus zu sein Wertvolle Impulse für ein bewusstes Mindset Vorbilder, Themen und Ideen zu allen Facetten der New Work Tipps zu praktischen Tools, die deinen Change unterstützen können, egal ob persönlich oder als Unternehmen Viele weitere Einblicke in die Welt des New Work Let's connect Du hast Ideen, Themenvorschläge oder Anregungen zum Thema, dann teile gerne deine Gedanken mit uns und schick uns eine Nachricht an podcast@kom4tec.de oder auf Instagram @kom4tec Wir freuen uns von dir zu hören. Follow us! Facebook | https://www.facebook.com/KOM4TEC/ Instagram | https://www.instagram.com/kom4tec/ LinkedIn | https://www.linkedin.com/company/10407066/
Auf den ersten Blick ist es ein verlockender Gedanke für Arbeitgeber: Die Arbeitnehmer kümmern sich um ihre Arbeitsmittel selbst und nutzen die vorhanden privaten Geräte auch für dienstliche Zwecke. Selbst bei einer Ausgleichszahlung hierfür, ist die Ersparnis beträchtlich. Warum das dennoch keine so gute Idee ist und welche Risiken ganz konkret lauern, besprechen wir in dieser Folge. Mehr zu Arbeit und Arbeitsrecht: https://www.arbeit-und-arbeitsrecht.de?utm_campaign=Podcast-Backlink1021&utm_source=aua&utm_medium=ig&utm_content=txt
Grayshift wants to allow customers to remove limitations such as inadequate computers and the need to use expensive external units. VeraKey has delivered the ability for investigators to share evidence regardless of geographic boundaries. VeraKey is Grayshift's solution for commercial customers who want a GrayKey device, the collection tool used by law enforcement. Unlike GrayKey, VeraKey is a consent-based mobile forensic solution. It performs the same function in performing full file system collection from a device and providing that for forensic analysis. [01:50] Profile of this episode's Guest: Brian Fitch, Senior Product Manager - Grayshift Brian was instrumental in the development and release of VeraKey. He has been the Product Manager for a variety of companies. Twenty-five years ago, he started his cybersecurity career in customer support and transitioned into sales or systems engineering. [08:11] Endpoint Detection and Response(EDR) and Manage Detection and Response(MDR) EDR is what antivirus and anti-malware have morphed into today. It protects endpoints against the latest threats and gives customers information about what is happening at those endpoints. Sometimes something new can get into the system that isn't detected by anti-malware or antivirus. EDR reports against that. MDR ingests the alerts of EDR and sends them through software engineering and artificial intelligence to take out actionable security alerts for customers. [13:31] Brian's journey to Grayshift Brian had heard of the company and the positive outcomes it helped deliver, so he had been interested in joining Grayshift for a while. More and more people he knew and had good working relationships with had joined Grayshift. When a product management position opened, he pursued it and started with Grayshift last summer. [17:38] What is VeraKey? VeraKey is a consent-based mobile forensics solution offering plug-and-play functionality to perform a full-file system collection while offering simultaneous data analysis when coupled with Grayshift's new ArtifactIQ. A significant benefit is the ease with which collections can be shared, even with geographical separations in an investigation. The best feature is the ease of use. Following the workflow, the full file system is extracted. The user can opt to upload to ArtifactIQ and reach their first fact faster while performing analysis. The main difference between VeraKey and GrayKey is that VeraKey is a consent-based device only. It cannot unlock or brute force a phone like GrayKey. The companies using VeraKey have the consent of the device custodian and are usually performing a corporate investigation. [20:24] ArtifactIQ and how it works with VeraKey ArtifactIQ is a cloud based analytics tool. When VeraKey starts collecting data, it gives you the option to send that collected data to ArtifactIQ simultaneously. Once in the cloud, ArtifactIQ pulls the most important data forward and puts it in an easy-to-read format inside the same user interface. Investigators can then review data easily and quickly. [24:59] Research from the private sector Grayshift spoke with many digital forensic examiners in the private sector while conducting research for the creation of VeraKey. Companies were adamant about protecting their employees from outside threats such as litigation of a perceived malpractice event. Commercial customers benefit from having consent for the collection, usually due to the device being a corporate-owned device or having a Bring Your Own Device agreement. [33:40] Prioritizing the roadmap for innovations Prioritization is one of the most fun and frustrating parts of being a product manager. Many organizations follow a framework such as Weighted Shortest Job First (WSJF) or Reach Impact Confidence Effort (RICE) to prioritize what problems to solve first. There's no right or wrong method for prioritization. Organizations need to determine what approach would work best for them. Brian primarily focuses on ensuring the company addresses the right problems first. CONNECT WITH DEBBIE, KARIN, AND GRAYSHIFT Debbie on Twitter Debbie on LinkedIn Karin on Linkedin Check out Grayshift online - https://Grayshift.com Grayshift on Facebook Grayshift on Instagram Grayshift on Twitter Grayshift on LinkedIn Connect with us about the podcast at podcast@grayshift.com
The Question of the Week- How worried should I be about my “personal/“home life” data/pictures/internet searches when I enroll in my employer's “Bring Your Own Device” mobile phone policy? The Big Stories: Biden Administration National Cyber Strategy National Cyber Security Across Multiple Agencies Big Tech Must Be Secure SEC Proposes new Cyber Rules LastPass Employee Did Not Update PC & Lead to Massive Hack
FACHFRAGEN: Der Podcast für Wirtschaft, Recht und Management
Bring your own Device bringt viele Vorteile für Unternehmen und deren Arbeitnehmer. Unternehmen können hierdurch ihre Kosten im IT-Bereich deutlich senken. Arbeitnehmer, spätestens die der Generation Z, bestehen darauf, dass sie ihr technisches Arbeitsgerät selbst wählen und auch privat nutzen dürfen. Auch aus Nachhaltigkeitsgesichtspunkten ist Bring your own Device für moderne Unternehmen wichtig. +++ Wenn Sie noch mehr zu Bring your own device erfahren möchten, schauen Sie in unsere Zeitschrift ESGZ.
Law & Candor returns for Season 10 with co-hosts Bill Mariano and Rob Hellewell. They kick off the episode with a discussion of a Harvard Business Review article about the ways AI can make strategy more human.Next they are joined by John Bair, Senior Consultant in Digital Forensics at Lighthouse, to discuss bring your own device (BYOD) policies, implementing proactive data management programs, and emerging data challenges with remote working. Some questions that they tackle include:From a data governance and management perspective, what are the greatest challenges that have emerged from working from home and BYOD policies?Many organizations may have governance programs in place but still struggle with new data sources or devices. What can make some programs inadequate to face these changes?For those needing to refresh their governance approach, or build something new, what advice do you have for creating a more proactive program to get ahead of these data challenges?How should legal teams work with IT to ensure these types of programs are a success? How should we think about their roles?As mobile devices and virtual work continue to advance, how can teams ensure their data governance programs keep pace?If you enjoyed the show, learn more about our speakers and subscribe on the podcast homepage, listen and rate the show wherever you get your podcasts, and join in the conversation on Twitter.
The Transformation Ground Control podcast covers a number of topics important to digital and business transformation. This episode covers the following topics and interviews: Hot Topics: Innovation in Aviation Start Ups, Food Tech Immersion in Africa, Bring Your Own Device Policies, Cold Rain in the Cloud (Eric Kimberling and Kyler Cheatham) Digital Transformation Implementation Lessons from 2022 (Bonnie Tinder, Raven Intel) The Future of Change Management (Tim Creasey, Prosci) We also cover a number of other relevant topics related to digital and business transformation throughout the show. This weekly podcast series premiers live on YouTube every Wednesday at 8am NYC time / 1pm London / 9pm Hong Kong. You can also subscribe to the podcast on Apple, Google, Spotify, Pandora, or your favorite podcast platform. WATCH MORE EPISODES HERE: https://youtube.com/playlist?list=PLyI-oIQSgI2DGXQKvUz-farHwls_B3G3i —————————————————————— DOWNLOAD MORE RESOURCES BELOW: —————————————————————— 2023 DIGITAL TRANSFORMATION REPORT: https://resource.thirdstage-consulting.com/2023digitaltransformationreport TOP 10 ERP SYSTEMS RANKING: https://www.thirdstage-consulting.com/the-top-10-erp-systems-for-2020/ TOP 10 ERP SYSTEMS FOR SMALL BUSINESSES: https://www.thirdstage-consulting.com/top-erp-systems-for-small-businesses/ TOP 10 CRM SYSTEMS: https://www.thirdstage-consulting.com/top-10-crm-systems-for-digital-transformations GUIDE TO ORGANIZATIONAL CHANGE MANAGEMENT: http://resource.thirdstage-consulting.com/the-definitive-guide-to-erp-hcm-organizational-change-management 20 LESSONS FROM 1,000 ERP IMPLEMENTATIONS: https://resource.thirdstage-consulting.com/lessons-from-1000-erp-implementations-ebook ———————————————————— CONNECT WITH ME: ———————————————————— LINKEDIN: https://www.linkedin.com/in/erickimberling/ INSTAGRAM: https://www.instagram.com/erickimberling/ TIKTOK: https://www.tiktok.com/@erickimberling0 TWITTER: https://twitter.com/erickimberling CLUBHOUSE: https://www.joinclubhouse.com/@erickimberling THIRD STAGE LINKEDIN PAGE: https://www.linkedin.com/company/third-stage-consulting-group/ CONTACT ME TO BRAINSTORM IDEAS FOR YOUR DIGITAL TRANSFORMATION: eric.kimberling@thirdstage-consulting.com ———————————————————— MUSIC IN THIS EPISODE: ———————————————————— Get I'm Ready by The Eiffels here https://t.lickd.co/geq6gnjo3Y8 License ID: k10MJnyDNVo Get You Worry Me by Nathaniel Rateliff & The Night Sweats here https://t.lickd.co/XzBW917yD6r License ID: 1wElRorPmJ2 Get International Space Station by British Sea Power here https://t.lickd.co/5rM5pxr8zjn License ID: NgoqxY9GDM7 Get Can I Play With Madness (1998 - Remaster) by Iron Maiden here https://t.lickd.co/rPYy0OeVxlk License ID: VGaWjO5Gkq2 Get Relax by Frankie Goes To Hollywood here https://t.lickd.co/86xKJAXy5n0 License ID: Dd7m8DMDA4Q Get Back on the Chain Gang by Pretenders here https://lickd.lnk.to/H2t9DXID!Eric%20Kimberling%20-%20Digital%20Transformation License ID: NPr6AYKyqdg Get Epic by Faith No More here https://t.lickd.co/zG5VzByg51a License ID: kvjwvqe8GWL Get Bad To The Bone by George Thorogood & The Destroyers here https://t.lickd.co/Ooy7kBDQy97 License ID: Kd0Wjxq5G28 Get this and other songs for your next YouTube video at https://lickd.co
The Army has been testing an application that would let its soldiers and civilian employees access the Army's network through their personal devices. It is ready to scale up from under a thousand users to almost 20,000 employees. Lt. Gen. John Morrison, Army deputy chief of staff, G-6, provides more details on lessons learned from the program's pilot, associated cybersecurity concerns, and how zero trust principles play a crucial role in securing data access. Morrison also touches on the Army's new Google Workspace partnership and laying the foundation for DevSecOps.
The Army is about to begin its first large-scale deployment of a technology that will let soldiers use their own phones and tablets to connect to government networks — a notion that, as recently as a few years ago, would have seemed like a pipe dream because of various legal, policy and cybersecurity concerns. On October 11, the Army will start rolling out the bring your own device (BYOD) program to 20,000 new users. While that number is extremely small compared to the total force of military members, civilians and contractors, it's massive by comparison to the limited tests it's conducted during pilot efforts so far.
The Army is about to begin its first large-scale deployment of a technology that will let soldiers use their own phones and tablets to connect to government networks — a notion that, as recently as a few years ago, would have seemed like a pipe dream because of various legal, policy and cybersecurity concerns. On October 11, the Army will start rolling out the bring your own device (BYOD) program to 20,000 new users. While that number is extremely small compared to the total force of military members, civilians and contractors, it's massive by comparison to the limited tests it's conducted during pilot efforts so far.
Was bedeutet eigentlich Bring Your Own Device? Welche Risiken birgt es? Was kann ich zur Risikominimierung tun? All diese Fragen beantworten wir in dieser Folge. ---------- Alle 14 Tage neues IT-Wissen erlangen und das in nur 5 Minuten. Das ist das Prinzip von "5 Minuten IT". Immer im Wechsel mit unseren regulären hITCast Folgen gibt es 5 Minuten geballtes IT Wissen für Entscheider. Für zusätzliche Informationen einfach jetzt einen Termin buchen und mit einem Experten sprechen: www.hagel-it.de/termin
BYOD hat durch die Pandemie wieder neuen Auftrieb erlebt.
APMG International presents our popular weekly panel Q&A show. Level Up your Cyber Resilience with the Host: Ellie Bowett and Question Master: Suchitra Jacob, Panelists: Etienne Shardlow, Mostafa AlShamy, Melanie Oldham, Sarbojit Bose and Simon Roller. An opportunity to have your real-life questions answered, driving the panel discussion before moving onto the focus topic: Bring Your Own Device (BYOD) with Melanie Oldham. Host: Ellie Bowett, APMG-International Question Master: Suchitra Jacob, APMG-International Panelists: Etienne Shardlow, Senior Consultant, Symphonise Consulting Mostafa AlShamy, Consultancy and Audit Manager, EGYBYTE Melanie Oldham, CEO, Bobs Business Ltd Sarbojit Bose, Owner and Managing Director of Training and Consultancy Services, Cyberservices, Singapore Simon Roller, Director and Principal Consultant, SR Advisory
Praca zdalna stała się faktem - nawet zaczynamy być w niej biegli. Ale ponieważ kultura zjada strategię na śniadanie - jak mawiał Peter Drucker - czy umiemy wdrożyć kulturę w modelu zdalnym? W 329 już odcinku Piotrka Dobrej Rady podpowiadam 7 obszarów, na które należy położyć nacisk w trakcie wdrażania dobrej i zdalnej kultury organizacyjnej - mówię m.in o trendzie Bring Your Own Device, o robieniu zdalnych sesji AMA z prezesem, o dupogodzinach czy silosach informacyjnych a na końcu o Boomersach. Posłuchajcie, obejrzyjcie lub przeczytajcie. Zapraszam #wykuwam #piotrekdobrarada #remoteonly #pracazdalna #kulturaorganizacyjna https://youtu.be/IDFcGaiMZfM Mój mail piotr.konopka@innothink.com.pl Mój LinkedIn https://linkedin.com/in/konopka Link do odcinka na YouTube https://youtu.be/IDFcGaiMZfM Link do podcastu https://pod.fo/e/f16ec SoundCloud https://soundcloud.com/piotr-konopka-286414158/piotrek-dobra-rada-odc-329-7-waznych-obszarow-do-wdrozenia-dobrej-zdalnej-kultury-organizacyjnej Inspiracja https://www.businessinsider.com/7-easy-ways-to-build-office-relationships-and-improve-company-culture-2021-10?IR=T Inspiracja https://www.inc.com/marcel-schwantes/new-study-explains-how-employees-are-adjusting-to-remote-work.html Inspiracja https://www.inc.com/wendy-lea/new-rules-of-customer-engagement.html Inspiracja https://www.inc.com/beth-fisher-yoshida/5-ways-to-develop-more-meaningful-relationships-at-work.html Inspiracja https://www.inc.com/marcel-schwantes/want-a-happier-workplace-studies-say-the-best-companies-do-these-5-things-every-.html Inspiracja https://www.inc.com/jeff-pochepan/employees-working-on-their-personal-devices-heres-how-you-can-protect-your-business-data.html Inspiracja https://www.inc.com/marcel-schwantes/managers-3-compelling-reasons-why-you-should-hire-more-baby-boomers.html Moja strona internetowa https://piotr-konopka.pl Strona firmowa https://www.innothink.com.pl Moje podcasty https://podfollow.com/piotrek-dobra-rada/view iTunes https://podcasts.apple.com/pl/podcast/piotrek-dobra-rada/id1513135345 Spotify https://open.spotify.com/show/6bu6ZEMBKJAd2LMLr7ABKP Transkrypcja poniżej Cześć! Nazywam się Piotrek Konopka i witam was w kolejnym, 329 już odcinku z cyklu Piotrek Dobra Rada mówi o pracy zdalnej. Dzisiaj powiem o siedmiu obszarach, które warto wzmocnić w trakcie budowania zdalnej kultury organizacyjnej. Jjak to powiedział Peter Drucker, o czym wszyscy wiedzą - kultura zjada strategię na śniadanie. Ale w tym momencie jesteśmy po półtorarocznym okresie wdrażania pracy zdalnej. Ale przez wiele lat byliśmy uczeni tego, że praca stacjonarna jest jedynym modelem pracy a tak naprawdę to byliśmy tego uczeni od zawsze. Bo najpierw było 8 lat podstawówki, 4 lata liceum, 5 lat studiów i wieloletnie doświadczenie w pracy, gdzie przyjście do pracy to było wymagane przyjście do biura. I w ten sam sposób sposób stacjonarny były budowane kultury organizacyjne. Ale teraz pracujemy zdalnie. Czy raczej nauczyliśmy się chociaż częściowo pracować zdalnie. Ale czy umiemy budować zdalnie tą samą kulturę organizacyjną? I bazując na tym co znalazłem dzisiaj na Business insider, chciałbym wam wskazać 7 obszarów, które warto wzmocnić, aby ta kultura organizacyjna była dobra: przede wszystkim zwróć uwagę na to, że ta kultura organizacyjna powinna być wirtualna. Bo budynek i kultura organizacyjna w biurze już nie jest jedynym elementem tej naszej układanki. Ta kultura organizacyjna przeniosła się do sieci. Praca przeniosła się do sieci. W związku z tym powinniśmy mieć regularne spotkania online'owe albo spotkania związane z team buildingiem (także w modelu zdalnym). Po prostu nie czekajmy na to, aż pracownicy nas o to poproszą. Wychodźmy naprzeciwko. Zróbmy na przykład sesję AMA (czyli może to być sesja z prezesem), zróbmy wirtualną noc i wirtualne granie, wspólne granie albo zróbmy jakieś wirtualne urodziny. W ten sposób pozwólmy pracownikom, żeby ta kultura organizacyjna budowała się w modelu zdalnym.
This MacVoices Live! discussion with David Ginsburg, Jeff Gamet, Jim Rea, Guy Serle, Warren Sklar, Mark Fuccio, Patrice Brend'Amour, Jay Miller, Brittany Smith, and Kelly Guimont shifts to a hot topic in the business world: bring your own device (BYOD) vs. choose your own device (CYOD). Which is better for you? Which is better for your employer? Is your personal device at risk if you use it for work? Or would you rather select your preferred laptop or phone, and let the company foot the bill. The answers are far more complex than you might think. Watch and learn how to make an informed decision. (Part 3) MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Links: MacJury #1111: Remembering the Impact of Steve Jobs Apple @ Work: Does ‘BYOD' make sense for remote organizations who use Apple? on 9-5 Mac Global Study: Nearly Nine in Ten Employees (89%) Would be Willing to Take a Pay Cut if Their Employer Let Them Choose Their Work Device Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
This MacVoices Live! discussion with David Ginsburg, Jeff Gamet, Jim Rea, Guy Serle, Warren Sklar, Mark Fuccio, Patrice Brend'Amour, Jay Miller, Brittany Smith, and Kelly Guimont shifts to a hot topic in the business world: bring your own device (BYOD) vs. choose your own device (CYOD). Which is better for you? Which is better for your employer? Is your personal device at risk if you use it for work? Or would you rather select your preferred laptop or phone, and let the company foot the bill. The answers are far more complex than you might think. Watch and learn how to make an informed decision. (Part 3) MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Links: MacJury #1111: Remembering the Impact of Steve Jobs Apple @ Work: Does ‘BYOD' make sense for remote organizations who use Apple? on 9-5 Mac Global Study: Nearly Nine in Ten Employees (89%) Would be Willing to Take a Pay Cut if Their Employer Let Them Choose Their Work Device Guests: Patrice Brend'amour is the creator, advocate and Product Manager of a global healthcare software initiative, which is not only pushing the industry to provide user-centered solutions using the latest advances in UX and technology, but also advancing the sharing of medical information between healthcare providers across the world. He is also an avid podcaster, mainly in the technology space, as well as a maintainer and contributor to a number of open source projects. Everything he does can be linked to from The Patrice, you can follow him on Twitter, and engage with him on the podcast, Foodie Flashback. Mark Fuccio is actively involved in high tech startup companies, both as a principle at piqsure.com, or as a marketing advisor through his consulting practice Tactics Sells High Tech, Inc. Mark was a proud investor in Microsoft from the mid-1990's selling in mid 2000, and hopes one day that MSFT will be again an attractive investment. You can contact Mark through Twitter on LinkedIn. Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, and jeffgamet on LinkedIn., and on his YouTube Channel at YouTube.com/jgamet. David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She hosts the Daily Observations Podcast at MacObserver.com, and appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Jay Miller is a Developer Advocate and Podcaster based in San Diego, Ca. A multipotentialite, Jay enjoys finding unique ways to merge his fascination with productivity, automation, and development to create tools and content to serve the tech community.Hear him on his podcast, Conduit and Youtube.com/kjaymiller or checkout his web site at kjaymiller.com. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Warren Sklar helps host the Mac to The Future Group on Facebook, and is the co-host of In Touch With iOS with David Ginsburg. Brittany Smith is a cognitive neuroscientist who provides a variety of consulting services through her business, Devise and Conquer that includes ADD/ADHD coaching, technology coaching, productivity consulting, and more. She is a self-designated “well-rounded geek”, and holds a M.S. degree in Cognitive Neuroscience. She can be found on Twitter as @addliberator. Check out her latest project, a YouTube channel of tech tips. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
This episode features Andrew NcNeile, Chief Customer Officer, ThinScale Technology. Andrew is responsible for sales and marketing operations. His team focuses on helping BPOs deliver endpoint security to bring-your-own-device (BYOD) employees through Secure Remote Worker. Secure Remote Worker allows BPOs to improve security, manageability of IT, and recruit agents from different locations, resulting in a better agent experience. Background At the start of 2020, iQor had a stable, robust work-at-home solution in place, having deployed it years earlier to various domestic and offshore customer care programs. But as COVID-19 began impacting global operations in March of 2020, the company saw the demand for work-at-home solutions expand rapidly and took the opportunity to strengthen its infrastructure with a BYOD solution. A large segment of iQor's work-at-home team now utilizes a BYOD work-at-home solution. We researched the marketplace for a technology enabling Work-at-Home employees to secure their personal PCs to work remotely as frontline agents for our clients' customer experience programs. We selected ThinScale Technology as our partner for BYOD endpoint security. Need for Speed iQor needed to meet our client's needs while meeting our employee's need to work remotely during the pandemic. In the early days of COVID, iQor moved 18,000 employees to work-at-home in three weeks! An amazing achievement that preserved both the employee and customer experience. BPOs who adopted an early relationship with ThinScale could make rapid transitions of agents to work-at-home, as mentioned above. For example, in Trinidad and Tobago, iQor moved 95% of our team to work at home in a matter of days. The move was applauded by the Minister of Trade, Gopee-Scoon. “iQor Trinidad Limited, a global Business Process Outsourcing (BPO) which offers support for several international telecommunication and retail companies, has managed to retain its employee base over 1,000 persons and has transitioned 95% of its workforce to work-at-home providing an internet allowance to support team members who required that extra support.” More Robust Recruiting iQor needed to expand recruiting beyond where the company has a physical presence (domestic, nearshore, and offshore) and into untapped labor pools in non-urban areas that offer equally irresistible talent looking for an opportunity to work from home. A survey in 2020 reveals that 51% of knowledge workers reported a productivity boost working from home during the pandemic with fewer meetings, no commute time, and less interruptions. ThinScale worked with BPOs for more than one year before the pandemic to provide a validation link for the agent during the recruitment process. Agents download a validation link to their device, and they are ready to go. This allows us to recruit people who reside far away from our physical facilities. We can now recruit from remote towns with talent pools, allowing us to source agents at speed. For example, iQor is a leader in seasonal staffing services for retailers, utilities, catalog companies, and other segments, with on average year-round teams representing roughly 3,500 employees. When holidays or events for a business drive customer interactions higher, iQor proactively grows the employee base by 164% in anticipation of the demand. This may not sound like much until you realize that's it's adding about 5,000 new employees who need to be experts on day one, bringing the total to over 9,000 employees for a window of time. And this can repeat itself throughout the year in planned and unplanned ways. With our secure work-at-home model, we're very efficient at quickly recruiting and onboarding frontline customer experience employees. Non-Invasive to Employee's Device The ability for agents to configure their devices with Secure Remote Worker without physically installing software is very productive. A single link installer eliminates shipping costs and complex logistics. The agent simply clicks a link to install the ThinScale Technology Secure Remote Worker product, and they are available to work securely immediately. Once an agent logs out, the agent is completely disconnected from all work-related functions, enabling the agent to fully disconnect and unwind from work. This is an example of iQor's commitment to creating happy employees. Security We needed to mirror security to the same level of security at iQor facilities as required by our clients. The Bring-Your-Own-Device solution allows iQor to leverage our agents' devices by temporarily using ThinScale's Secure Remote Worker platform to lock down a device. Once locked down, the employee cannot access personal programs or software and logs into iQor's secure cloud environment—the same environment accessed as when the employee is on-site. Our Working Relationship Andrew says that working with iQor has been very cooperative from the beginning. Led by Tarn Shant at iQor, the relationship has been a sense of partnership. We've mutually built an operation that is working well for both of us. Andrew's Fun At the time of this recording, Andrew had just returned from holiday, where he surfed in Ireland in cold weather in the rain. During non-COVID times, he loves to travel and enjoys skiing. He is also an avid reader and enjoys the theater. Visit thinscale.com to learn more about Remote Worker Security. Learn more about iQor digital customer experience capabilities. Read the blog here. Watch the video here.
Welcome solo and group practice owners! We are Liath Dalton and Roy Huggins, your co-hosts of Person Centered Tech. In our latest episode, we're talking about internal systems that can help optimize and streamline your group practice. We discuss our new Facebook group (which is full of resources), Loom as a tool to share information, uniformity in training and resourcing, replicating and delegating, Google Workspace, intra sites to organize resources, creating practice culture virtually, Bring Your Own Device and remote device management, and Gusto to streamline payroll and HR. Listen here: https://personcenteredtech.com/group/podcast/ Stay tuned for future episodes! For more, visit our website. Resources Group Practice Care with PCT Facebook Group Group Practice Care with Person Centered Tech is an open space for mental health group practice leaders to come together for support (and responsive, curated resources) around what it takes to build an effective, secure, and ethical group practice where tech and client care go hand-in-hand. Free Service Selection PCT Workbook CE training: Smooth and Secure Use of Phone, Text, Email, and Video to Meet Modern Clients Where They Are: Legal-Ethical and Real-World Considerations Group Practice Office Hours (direct support and consultation service from PCT consulting team and teletherapy & HIPAA attorney Eric Strom, JD PhD LMHC)
Hyoun Park is the CEO and Founder of Amalgam Insights, an industry analyst firm focused on managing data and the finance of technology at scale. Over the past 20+ years, Park has been at the forefront of trends such as Moneyball, social networking, Bring Your Own Device, data monetization, and the Subscription Economy working with startups, large enterprises, and the investment community. Park has been quoted in USA Today, the Los Angeles Times, Barron's, and a wide variety of mainstream and technology press sources. Although he primarily works with enterprise technologies, Park has a soft spot in his heart for new and innovative technology startups and is dedicated to supporting greater gender and cultural diversity in science, technology, engineering, and mathematics. Park has an MBA from Boston University and a bachelor's degree in Women's and Gender Studies from Amherst College.
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 26 today we are discussing about Bring Your Own Device is a policy that a lot of organizations have been adopting.This means when you come to work,you can bring your own device, and use it on their network.This may be your laptop, your tablet, your cellphone,keyboards, mice, or any other type of device.Some organizations have fully adopted Bring Your Own Device,and others are fully against it.We're going to talk about both,and why you should consider it,or decide not to use it in your organization.Now, when you use Bring Your Own Device,it brings a lot of security issues for you to consider.If I have somebody's laptop that now gets plugged into my network,I'm also introducing all of the vulnerabilities that device had.So, if you took your laptop home,plugged it into your network, downloaded a game,installed the game, and got malware and now you plug it into work the next day,you can bring that malware into work with you.This is a major concern with Bring Your Own Device because as an organization, I don't control your device,and so I don't know the security of it.And, that's one of the major risks with Bring Your Own Device.Now, on the flip side, a lot of companies really like Bring Your Own Device because it means they don't have to buy laptops, and cellphones,and all those type of devices for their employees because the employee is bringing their own.And, while that might save them money,and it's good for the bottom line, there are concerns.When the data goes on your device, who's data is it?Is it the company's data, or do you have rights to it?Where do you draw the line between what's personal data,and what's business data? A lot of organizations that have adopted Bring Your Own Device, will use storage segmentation.This will create a clear separation between personal,and company data on a single device.Now, there's lots of different ways to create this segmentation.There are highly technical solutions,and then there's highly procedural solutions.For example, you might have an application on your phone that says work, and when you click on that,it opens up a virtual environment, and all of your work is done from within there.And, when you exit that, you're now back into your personal device.That would be a clear technological limitation between the two.Now, you don't always have to use a highly technical solution.In my company, we're very small,we use personal devices as work devices,and so on my phone in particular, I have two email clients.I have one that's on Apple Mail that I use for my personal email, and then I have another one,which is Gmail, using the Gmail app that I use for my company email.That gives me a clear separation between my personal stuff,and my business stuff, and keeps them in separate buckets.Now, again, there's nothing really that would prevent me from loading up my business email inside Apple Mail if I wanted to.Except that we have a policy that says we won't do that.So, we've chosen an administrative control,as opposed to a technical control.Another concern you have with mobile devices under the Bring Your Own Device policy,is how do you ensure that device is always up to date?We talked about how important it is for patches,and updates to be installed on your mobile devices.I can push out software policies to you,prevent you from installing applications,and install updates remotely without your use.But, when I do Bring Your Own Device,are you going to let me install Mobile Device Management on your system?You might not.And, so this is why a lot of companies are now switching from a Bring Your Own Device,because of all those security issues,into a Choose Your Own Device, or CYOD model.CYOD gives the employee a choice of a couple of phones.We might have four, or five models that we support,and we say you can pick any one of these,and we'll pay for it for you. And Thankyou byebye
Ben West was a key organizer and architect of Nightscout and OpenAPS software. Even after all of the DIY and commercial development of the last ten years, he says we've barely scratched the surface of removing the mental and physical burdens from people with diabetes. Among those burdens, he says, is what he calls the onus to bolus - the responsibilities of diabetes that even the most advanced current software can't totally relieve. Ben is now the CEO at Medical Data Networks which has launched its first venture: T1 Pal. Read the Nightscout email Stacey mentioned (click here) Check out Stacey's book: The World's Worst Diabetes Mom! Join the Diabetes Connections Facebook Group! Sign up for our newsletter here ----- Use this link to get one free download and one free month of Audible, available to Diabetes Connections listeners! ----- Get the App and listen to Diabetes Connections wherever you go! Episode Transcription (rough draft) below Click here for iPhone Click here for Android Stacey Simms 0:00 Diabetes Connections is brought to you by Dario health manage your blood glucose levels increase your possibilities Gvoke Hypopen the first premixed auto injector for very low blood sugar, and by Dexcom take control of your diabetes and live life to the fullest with Dexcom. Announcer 0:21 This is Diabetes Connections with Stacey Simms Stacey Simms 0:26 this week talking to someone who is deeply technical, but also deeply thoughtful, who has been an incredible part of the Do It Yourself movement over the last 10 or more years. But who says we've barely scratched the surface of removing the burdens mental and physical from people with diabetes. So welcome to another week of the show. We aim to educate and inspire about diabetes with a focus on people who use insulin. I am Stacey Simms. And yes, this show is already a little different sounding here at the top no big intro or tease. And that's because my interview with Ben West is massive. It is very long. It is the longest one I have done so far on this show. But it is well worth your time. I am so excited to bring you this interview with Ben Ben West was a key organizer and architect of the Nightscout and open APS software. He is now the CEO at medical data networks which has launched its first venture T1Pal, I think Ben influenced or work with or sometimes both just about every person I've talked to under the we are not waiting umbrella. And if you're not familiar with that, if this is your first episode, welcome, but we are not waiting is kind of the rallying cry that became a hashtag back in 2013. And if you are new, I use it as a keyword you can search for it all one word, we are not waiting over at Diabetes connections.com and see every episode that has featured those incredible do it yourself, people the community that really rallied together and push the technology side of diabetes forward, I believe many many years ahead where it would have been otherwise, as I said, it is a very long interview. But you know, it's a podcast, listen in chunks. Stop, start, you know, however you want to do it. But please, I really hope you'll listen to Ben because he has so much story to tell and a lot of thoughts on how diabetes care really needs to improve. In the short time since I spoke to Ben, there has been a bit of a discussion within the Nightscout group about his business. It is part of an ongoing debate about the future of Nightscout and the future of open source in type one, Ben has the full support of the night scout foundation. In fact, they sent out an email on that and some other issues. And I will link to that in the show notes. I think it's a very good read. In addition to touching on this issue, it is a great way to catch up on what's going on in that space. So we'll get to Ben West in just a moment. But first Diabetes Connections is brought to you buy Gvoke Hypopen . And you know when you have diabetes and use insulin, low blood sugar can happen when you don't expect it. That's why most of us carry fast acting sugar and in the case of very low blood sugar, why we carry emergency glucagon, there's a new option called Gvoke Hypopen, the first auto injector to treat very low blood sugar. Gvoke Hypopen is pre mixed and ready to go with no visible needle in usability studies. 99% of people were able to give Gvoke correctly find out more go to Diabetes connections.com and click on the Gvoke logo Gvoke shouldn't be used in patients with pheochromocytoma or insulinoma visit Gvoke glucagon.com slash risk. And this is a good time to remind you that this podcast is not intended as medical advice. If you have those kinds of questions, please contact your health care provider. Ben, it's great to talk to you. Thanks so much for jumping on and sharing some time with me and my listeners. Ben West 3:55 Oh, thank you, Stacey. I'm happy to be here. Thanks for inviting me. Stacey Simms 3:59 I'm not even sure where to start. I have so many questions I want to ask you and there's so much history here. So maybe we just start if you don't mind. Back in college when you were diagnosed. You were student right? You were young adult. Ben West 4:12 Yeah, I was a college student when I was diagnosed and I had all the classic symptoms where I you know, I was going to the bathroom a lot and just didn't know what was happening. My diagnosis story is I went through this for probably a week and one night I realized I had gone to the bathroom like seven times in the one night and I realized that means if that's once an hour like what sleep did I get last night. I'm nowhere near eight hours of sleep. This seems like a serious problem. So I went to a health clinic in my college town. And they said well, you're a skinny young adult, so we don't know what's going on with you. Maybe you did eat something and you didn't tell us I wasn't eating anything either. And they sent me home with some pills and said call us in two weeks. Someone through the grapevine heard that that didn't sound quite right actually came and interrupted one of my music lessons and said, you know, you need to go to the hospital there. Oh, wow, they're expecting you there. So I went to the hospital, and they checked me in over the weekend and diagnosed diagnosed me with type one. Wow, Stacey Simms 5:13 you were lucky, right? Lucky that they interrupted your lesson there. Ben West 5:16 Yeah, you know, I mean, I've heard a lot of stories during the work that I do. And yes, as diagnosis stories go that I you know, that's pretty mild. Yeah, Stacey Simms 5:26 I guess I should ask you some technical questions from the very beginning. What were you using? I assume that in 2003, you didn't immediately start tinkering with an insulin pump. Right? You You went on a more traditional routine at the start? Ben West 5:38 Well, I actually had to drive 45 minutes to clinic and Little Rock house in a different part of Arkansas going to college. And I had to drive 45 minutes to get to an endocrinologist and the endocrinologist at that time that I thought I was lucky to be getting into the specialist where they actually deal with, they actually specialize in diabetes here. And I met with the nurse, the PA, and the representative from Medtronic was actually in the room. They actually said, You seem like a smart young lad, we'd like to get you out a pump as soon as possible. And it turned out as soon as possible was like nine, you know, nine months later. So I went through the whole syringes and shots and meters and got on the on the pump. But at that time, they actually told me Yeah, the benefit of going on the pump is dispenses insulin automatically. And in the future, we're going to have CGM. There's some CGM already in the works. Those will be here sometime. And then when you get the CGM and the pump combined, it does like all these things together, right, like so I understood right away what they're talking about in that office very early on. Okay, you got you can measure glucose, and you got this pump. And in theory, it should be doing all of these things together. At that time, they even said, You know what, they even have a patient in California right now, it's got a fully implanted version. So sometime in the next five years, we're gonna have a fully implanted CGM insulin pump combo, it'll do all the work for you. This is all just temporary. That's what they told me. Stacey Simms 7:01 2003 Yeah, just to be clear, though, Ben, the Medtronic rep was in the room with you at your doctor's appointment? Ben West 7:09 Yeah. Wow. You had some introduction? I was actually I was glad they were honestly, that certainly seemed to be the, you know, take these pills and call us in two weeks approach. Stacey Simms 7:20 Sure. Yeah. It also beats a bunch of other people who had their doctor say five years to a cure. I mean, yeah, you know, there's a lot of really bad ways to be diagnosed and to have those first conversations, but man, that's fascinating. Who was the person in California who had an implanted pump and CGM? What was this like, fantasy made up? No, Ben West 7:39 I think I know, I believe him. I, I've toured the Medtronic facilities, again, during the work that I do, and they've invited me over, and they have a hallway of all kinds of awesome stuff that, you know, never made it to market or, you know, there's a lot of cool things that go on behind the doors. I'm still using a 515. I think that was in 2008. So certainly, I I'm a big believer in what they do. There is a lot of potential that I think is clearly been untapped behind this technology. Stacey Simms 8:12 So fast forward nine months, you jump on to your insulin pump. It's not hooked up with a CGM. At the time I would assume. Ben West 8:19 No, it the CGM didn't exist yet. Yeah, it wasn't on the market. Yeah. Stacey Simms 8:23 What was your experience? Like with the pump? Ben West 8:25 Oh, it's okay. It's fine. I preferred it to the shots. But everything's got trade offs. Right. I had at the time I, you know, was going in or wasn't music major. And I so I had performances that are assessed as part of my official grade. And, you know, I'd go in for these performances, and some one of the teachers would tell me hide that thing. You know, they had wires hanging out, right? And I told him, you know, I'm not trying to hide anything, I shouldn't have to hide it. And he told me, You shouldn't show it off. I thought, wow, here I am going for a performance. And that's, that's the last thing I want to be thinking about right now. Sheesh, Stacey Simms 9:00 did you win that fight? Or did they make you hide it? Ben West 9:03 If you're a college student working for a grade? Yeah, you're gonna, you're gonna put it away real fast, right? I mean, that's terrible. Stacey Simms 9:11 What made you start thinking about tinkering with stuff? Because you started doing that on your own is my understanding, right? This was before you met a lot of people in the community that you started, I don't want to say taken apart, I'll let you tell the story. But you started doing this stuff in 2008 2009, Ben West 9:28 the winter of 2009 into 2010. I remember that's when I started with a different focus. Actually, I don't know if you've talked to Scott hanselman at all, but he's, he's known. He's known for saying that every person with diabetes ever, right? The first thing they do is they start working on on something less less than the burdens here. And actually, that was true, right? As I was diagnosed, I had some experience as a computer science minor with some programming, and often my side projects, and I remember I built a dashboard. Actually, in 2003, right after I was diagnosed, that allowed me to enter in all the information into a database, right? Because I was walking around with, you know, three by five index cards, trying to write down all these carbohydrates and insulin injections. And it was getting really tedious. But I did that for years with pen and paper and pencil. And I thought, surely, why are the doctors giving me a hand drawn curves on napkins? Like, what is that about? Why are they sketching on these pieces of paper and the way that they were explaining this to me in the hospital, I thought they were going to show me a full on simulation that showed how my body was working. I've been watching too much Star Trek. Stacey Simms 10:44 Well, you know, I'm with you. We expected things like that, too. When you said you made the dashboard. What did you use for the interface? Was it computer was it? Ben West 10:53 Yeah, it was this was before web 2.0. This was all PHP and HTML. And I realized I was horrified. At the result, I realized I was never going to use it. It was a wall of inputs, where it's just like tons of inputs. And I wrote for times, and dates and readings. And I realized there's no way I'm going to use that. Look at it. Why would anyone use that. That's why I'm going to use pen and papers, because they're the software for this is very difficult. Then web 2.0 happened, there's a bunch of things in the 2000s, as we approached into 2010, that I, you know, I graduated school, I got into industry moved to San Francisco, the hardest Silicon Valley doing, you know, web dashboards for companies, professionally, where we're really solving people's problems where if you have this complicated problem, you can share the link with a view of that problem, and the tools for solving that problem with someone else. And that ability to share that link made the possibility for solving problems collaboratively possible in new ways, transformative ways that really fundamentally change the workflow for solving problems. So that idea really got into my head professionally, as we kind of approached 2009 in 2010. I had tried my first CGM about five years later, right, so around 2008. And the experience with that CGM was was not great. I had to go through insurance, right, they said, I had to get a new insulin pump to get to the integrated system that would read onto the insulin pump. The insurance said, we're not going to pay for that for this new one. And not only that, but according to our policy, you should never have gotten one. So that seems like an issue. Yeah. So it took us It took another nine months, right. And, you know, it goes to the appeals board. And the appeals board comes back and says no insurance, you should, you know, that's medically necessary, she should pay for it. So I finally got the pump in the CGM. And like a lot of people that I see on social media that are excited by the promise of the benefits of this new technology, I tried to really make it work for me, right, I got all the glue out. Skin all louder than the adhesive and I got the I got it covered, right with all the contact stuff. And then I'm going out for yoga, right and it's hot, and I'm doing you know, bendy stuff. And you know, you take off your shirt is a lot of people do. And then you're in a shirt, you realize you're the only one with like all this stuff. And it's like, it's not just one thing, it's the air, you got your pump over there. And he got your CGM patch over here. And it's like, it's not working out like at night. It's itchy. You know, it tickles. Except it's not tickle, it's you realize it's, it's itchy. And then you realize to your heart that that's actually the chemical burn that's happening with adhesive in your skin. And then the things alarming and I'm getting sick of the readings, I get data, what they call data overload, right where it says 240. And I feel like you know, I don't feel very good. And I take a bunch of insulin. And then, you know, an hour later says, well, you're 230 or whatever. So I don't like that. I still don't like that. So I'm going to take even more insulin. And then yeah, three hours later, you know, your doubt at 60. And the things reading 110. Right. And, you know, you're really not feeling good. This thing, made my life a mess. And I decided I'm gonna have to quit. And I was horrified that I was not going to use this thing that I had gone through so much effort to get to this point to be able to use it and that I wasn't going to get any benefits out of it. And the slap in the face for me as someone that was working on these on these systems of systems that were connected through the internet, and seeing the innovation take off and seeing the technology transform, collaborative decision making. The slap in the face for me was that this data was stuck on this little two inch display in my pocket. And there was like there was no way to get that data where other people could see it or like my doctor could see it where like app developers could put it into the simulator and make a simulator if one was missing, and 2009 and 2010 that really didn't sit with me anymore. So I thought apparently I have some skills here. And, you know, maybe I should try applying them just to see if I can get a time series. You know, wouldn't that be neat? If I can just get a little time series, you know, off the device that I use? Wouldn't that be kind of neat? Stacey Simms 15:11 All right, I'm gonna stop you there. But as the time series, Ben West 15:14 just the normal chart that we see where we've got data points along some time. So you've got three hours of time on the chart, just like we see with any other glucose traces data, you've got one dot every five minutes. And that happens, because you get every dot that you see is one of those data points. If you can get a bunch of data points over time, you can generate that time series. Stacey Simms 15:37 Now I know a lot happened, you know, in those years between 2008 or 2009. And then 2013, when you started a tight pool, can you take us a little bit through that time, how you met people how you got connected with the diabetes community? Right back to Ben answering that question. But first Diabetes Connections is brought to you by Dario. Health. And you know, one of the things that makes diabetes management difficult for us that really annoys me and Benny isn't actually the big picture stuff. It's all the little tasks adding up. Are you sick of running out of strips, do you need some direction or encouragement going forward with your diabetes management with visibility into your trends help you on your wellness journey? The Daario diabetes success plan offers all of that and more No more waiting in line at the pharmacy no more searching online for answers. No more wondering about how you're doing with your blood sugar levels. Find out more go to my Dario comm forward slash diabetes dash connections. Now back to Ben answering my question about how we found and got connected with the diabetes community. Ben West 16:48 I need to get more serious about my problem solving. And that means if I want to help, as soon as it seems to get a lot of ground to cover, so if I need help, I need to ask a well formed questions in a targeted way. And I thought, you know, if I need help, the people that can help me are probably other people with diabetes. And so I started looking around on all kinds of social media, I was on to diabetes, for the really early platforms, and several others, there's diabetes has that and there was there are a couple of organizations before Twitter was even really becoming popular. So I kind of reached out on some of those and found some people disagreed with the things that I was expressing they, some people thought that I should just feel grateful for the devices that I had. Stacey Simms 17:28 I remember this, there was a lot of movement at that time, because I was on some of those boards to where it was, Hey, you know, it's it's okay for now. Like it's better than it was we're not testing with urine. We're not doing right. We're things are changing. Why do you want so much data? He was an interesting time. I didn't mean to interrupt you. But I remember that. Ben West 17:47 Yeah. It's interesting that for you to say that, thank you for remembering that that really puzzled me. It emphasized for me How important was to frame the right questions. Partly because of that those disputes, I started really focusing on the advocacy of data access. And that became my touchstone issue. Well, up until very recently, I would say, well, I've shifted recently towards embracing language matters a bit more. One of the things I've learned over the last 10 years, I think, is that language matters. And in this data access issue, are actually the same issues with the same solutions. And we will get into that. But Stacey Simms 18:23 yeah, we'll definitely talk about that. And just trying to, you know, to kind of get the timeline here, but yeah, so you, you've got this really interesting movement within the community, but it's a small part of the community. As I said, I was there. I don't think I grasped it at all. I mean, I had a little kid, my son was a toddler at the time, you know, he was diagnosed in 2006. So I was getting into all of this, but I was definitely more of the rah rah cheerleader, kind of let's do the Big Blue test. If you remember to diabetes, you probably remember that rather than how can I free the data because we didn't have a Dexcom or a CGM for many years. Ben West 18:53 So at that time, right at the time, I was already familiar with things that have happened in the tech world, the things that, you know, the worldwide web, the web technology that we use, has gone through this where there's lots of companies involved, some of them compete. And in fact, I remember on one of my job interviews, I was shocked to hear the interviewer say, Oh, yeah, we're partners with the, you know, these other people. I said, Wait a minute, are they competitors for this other product? And they said, Yeah, you know, we compete and we cooperate. We do both, you know, it's not, it wasn't an issue in other industries. And somehow innovation that that's unlocked. Now, we have finance, we have healthcare, we have every sector of life we do online now. And if you're not doing it online, it's because you're doing it on your mobile. And actually, it turns out that's done online also. Right, yeah. Behind the scenes. And so that's the same transformation that I saw happening everywhere, regardless of the problem space of even for the most complicated problem spaces. And so I knew that what we need the thing that made that possible on the web, and on the internet on the web, it was Use source. So any web browser that you have, there's a function where you can go in and edit. And you can say view source. And it shows you all of the source code that's used to present that web page for you. It turns out that that's a critical part of that innovation to market pipeline, because more people are able to access the data that makes the thing go, that DIY access, if you will, for the web, that view source that allows anyone to get access to it, that does a couple things. One is that it gives more people access to making things and that network connectivity is what allowed a lot of innovation that we see, in 2008. Nine, that's when I started talking about data 2010. And yeah, through 2013, I started to code switch, which means that I talked about data in the most austere terms possible, in order to attract those other folks that already understood how important that was. So that together with them, I could look to build this ecosystem so that people would start to get it, I knew that if we could deliver a couple of applications that utilize this open architecture, this open ecosystem, the feature set would grow, the popularity would grow. And that would start to shift the things that people were talking about that people would start to talk about, we want access to the data so that we can get things like this, we want access to the data so that we can have bring your own device, we want access to the data so that we can get these innovative systems on the market more quickly. Stacey Simms 21:37 So put it in perspective for me if you could, one of the touchstones that I come back to again and again, is that D data meeting in 2013? That diabetes mind and Amy tendril put together where we are not waiting was written on the whiteboard. Where were you during that time? Ben West 21:54 Yeah, I was in the room. There are about a dozen folks in the room. Sarah creepin. Was there a Jana Beck was there, Joyce Lee? Was there, Amy tedric was there? You know, Howard look was there late despereaux. Was there john kostik. And, you know, a bunch of Brandon arbeiter, a bunch of those core typu folks were there. The takeaway, as it's been said many times before, was, you know, john kostik, was there talking about how he had utilized this technology to get some benefits for his son, that was his big story was I really care about my son is my job to deliver these benefits, I'm going to do it somehow, whatever it takes, that's what I'm going to do. And Layne came along and said, You know, we've got this experience with operator fatigue, in control rooms with complex processes that never shut down. And here's the things that I've learned. And here's the display that I put together, and I call it nightscout. And this was before, what we now think of as nightscout didn't really exist. This was before that this was like when there were separate pieces, and like different projects, everyone was just blown away by nightscout. In particular, this idea of what john was doing, getting the data and what Lane was doing, having a really smart interface for it, that and having it operate in real time gave us a really crisp, clear vision of what are the kinds of benefits that we should be talking about that we should be expecting that we should be seeing in the next 12 to 18 months? What is it feasible to make technically. And it turns out some really cool things were technically feasible. Stacey Simms 23:26 When I speak to people from the DIY movement, or you know, whatever you want to call it. When I talk to you folks, over time, I have learned never to really ask well, what do you do? Right? I know, it's very, very collaborative. And so I stopped asking that question. But I would like to know, if you don't mind, could you share kind of what you were working on? Well, that's Ben West 23:47 first t data, I was tide pool had just gotten started. So I was actually employee, I was one of the very early employees tide pool. So I was working with tide pool as an engineer trying to launch the MVP, our very first shipping product, we were trying to get that up off the ground from prototype and into production. So I was spending a lot of time on that. On my own time, I was spending a lot of time you know, the reverse engineering stuff, I was spending a lot of time really focusing on on Medtronic pumps, I realized that there were a bunch of devices. And I thought about the network of each kind of device needing some code to work with it. And I had a piece of code for every type of device. And so I was focused kind of on that making sure that I was framing Well, well formed questions, putting them out there saying here's a project just to talk to the Omnipod. Here's a project just to talk to the Dexcom. Here's a project just to talk to the pump. And then here's the thing that can kind of use them all. here's here's some of the title stuff. And so I didn't actually have access to CGM myself, I didn't actually have access to a lot of working stuff. What I had access to was my own research on my pump stuff, which was my main focus and then I had already started networking out and contacting Layne and these other folks, you know, Scott Lybrand and Dana Lewis, meeting all these other folks, and not just in diabetes, you know, for example, Dave bronkart and Hugo compost, I met them going around doing things, advocacy work on data access and privacy and sharing, I would meet those folks and connect them also to the diabetes folks saying, not only is this a unique problem in diabetes, getting your access to your data in healthcare is a problem in other disease states as well. And now what I've come to learn is not only does it affect healthcare, it affects other industries as well. It affects the agriculture industry. Right now, there's a huge issue in the agriculture industry, with farmers not being able to digital tractors and farmers not being able to get their data off of their digital tractor and where it used to be just like the syringe and it used to be a mechanical pump. It used to be a simple mechanical device that anyone could learn about and do it themselves right in front of them, it was obvious how it worked. And that is one of the risks with the adoption of digital technologies. without some support. Without enough documentation, it may not be obvious how it works. So after that D data in the winter, spring started to come around the next year, and I wound up leaving tide pool around April. Now Brandon arbeiter from typo was my roommate at the time. And I remember that about a week after I left tide pool he actually came home with with a bag full of goodies, he came home with a new SIM card, a new cell phone, and he showed me his laptop. And he had all these emails with like source code attached and instructions and websites. And actually, it was kind of a big mess. But I was very excited because this was for the first time all of the pieces in one place. This was the legendary nightscout rig finally in my hands, so I knew exactly what to do. I helped him set up nightscout. I didn't have a working CGM at the time and setting him up with nightscout was actually what convinced me to start using a CGM again, because when I quit, I decided I'm never going to use a CGM. Again, it's not worth it for the discomfort and the quality of life until I can control the data until I can get the data off with nightscout. that possibility came true. And so Brandon came home with that rig. And I helped him set it up. And then I helped set up a bunch of other families. And I converted those emails and those attachments, I converted those into a set of webpages for the very first time, and organized all of the source code. Again, on GitHub, which is the social coding site, I organized all of those projects into well framed projects, the way that programmers would work with these things very, very natively. Very idiomatically. And so I put those up on the web on GitHub, and started calling people over to them. And I showed James wedding and Kate Farnsworth, and Christine dealtrack. Some of these folks, I showed them the new web instructions, and actually walked them through for the first time, once people were able to go on the web, and do a Google search and find it and get all of the instructions in one place. That's when the installs really, really really started taking off. That's when the Facebook group went from 100 to 1000s. And the rest is history right? Stacey Simms 28:35 down. And this is probably a good time to just say that. I've spoken to several people from the the we're not waiting community, and one of them is Jason Adams, who tells the whole story of the Facebook group, and you know, that community and how that came to be. So we'll link that up for sure. and a bunch of other information. But I remember that too. And it just seemed like he was unbelievable to some as in like, wow, we can finally see this and can you believe we can do it, you know, ordinary people. And you know, you do need to, you know, get some help, but you can do it, you can do it. And then there were other people in the community saying, I can't believe we haven't been able to do this until now. Like I knew we could do this. Like, it was very funny to see the people who really understood kind of the back end of things, at least from my perspective. And once that ball started rolling, it seems like it was just moving really quickly. It was a very exciting time. Do you remember it as one? Ben West 29:24 Oh, yeah, I mean, tide pool had a one of their global, they pull everyone from across the globe in the area everyone saw about once a year. And so I got to see a bunch of those folks again, and they were all hanging out. And I remember we were on Facebook just watching Facebook blow up. I mean, they're the posts were coming in, he and your grandson was watching this thing. We mocked up little videos of like, here's the next step that we're going to make an automated system with, you know, this is just the beginning and we didn't post it but we were just in awe of the energy that was coming. In behind the post describing nightscout. I mean, here we have what's essentially a webpage. And there's so much momentum behind this project that people were saying things like we're paying it forward, they were saying things like, we are nightscout. And I've never been part of a technology project where people start identifying as the project, I expected the conversation to change, I laid a lot of a lot of stepping stones in place, to enable the conversation to change that we can speak clearly, as people with needs that are unmet, here's what our needs are. But I did not expect people to identify that I am this products that really blew us away. Stacey Simms 30:42 I'm gonna come back to that, because I think diabetes is very personal. And it was one of the few times where people felt like they not only had a stake in it, but they were also being heard. But I do want to ask you, we've done lots of episodes on nightscout and openaps. And please feel free to jump in if there are things that you would like to share. But you mentioned when we were prepping for this interview testifying for I don't even know how to say this testifying for the 1201 federal DMCA exemption hearing. Ben West 31:08 Yeah, that's right, is that? Well, like I said, one of the things I started to learn, when I started talking to people, what I would code switch into the data governance language, I started to find that there's other people working on this. There's academics, there's people in other industries, and there's legal scholars. And it turns out, FDA has a role in a lot of what we do in diabetes. But it turns out, there's other regulators that deal with other parts of life, the Library of Congress regulates certain things. And one of the things that they do is they manage these 1201 hearings, our carve outs are ways for the public to say, here's this regulation that exists. But I want to testify to get relief from the regulation that does exist, and the regulation in question, this concept of DMCA, the Digital Millennium Copyright Act, and in part of that regulation, has to do with the technical protections, the technical protective measures that manufacturers place inside of their devices, and the consequences for attempting to manipulate that device, potentially to overcome such a protection. Now, the issue here is that this is a technical means that some firms use to make it difficult to get the data on a very practical level, the one of the things that they can do is they can say, well, we're putting a technical measure in place so that only authorized users can get access to the data. who's an authorized user? Well, the manufacturers, of course, is the patient an authorized user? Well, maybe maybe not. Right? That's kind of the debate that's still playing out to this day. One of the exemptions that I went to testify for was that for medical devices, if what you're seeking to do is to get a copy of your own data, there should be no penalty for doing that. And that exemption was granted. Pardon my ignorance, Stacey Simms 33:03 is that exemption granted for you? Or was that something that was more blanket for Ben West 33:07 the Americans, all US citizens, Stacey Simms 33:09 you think that would be front page news? That's amazing. Very, very cool. A lot more ahead with them. But first Diabetes Connections is brought to you by Dexcom. If you are a veteran, the Dexcom gs six continuous glucose monitoring system is now available at Veterans Affairs, pharmacies in the United States, qualified veterans with type one and type two diabetes may be covered. picking your Dexcom supplies up at the VA pharmacy may save you a lot of time to connect with your doctor for more information. Dexcom even has a discussion guide you can bring with you to your doctor, get the guide, find out more about your eligibility go to dexcom.com slash veterans. Now back to my conversation with Ben West. What is nightscout? Right now? No, the commercial offerings have changed a lot. He was title submitting loop to FDA. What is nightscout as a service offering right now or is that even the right word offering? Ben West 34:20 So do you want to know about nightscout as a service, or just nightscout? What is nightscout as a whole? Stacey Simms 34:25 What is it right now? What is it? Like? How do you define it right now? Because it's not the rig? Is it still right? It's not like you're plugging into this into that. I mean, what how it's kind of changed in the last few years. So I guess I'm not sure what I'm asking. I pardon my ignorance there. But Ben West 34:39 when you bring up the rig, you say what is your asking what is nightscout? right now and you mentioned, you know, for example, it used to be the rig. Stacey Simms 34:46 That's what I think it was nightscout is I think of people printing a case for this for that and then and then you got to be careful because the wire might break at some point. Ben West 34:55 Sure. So I think of nightscout as kind of two things. There's the philosophic Typical version of nightscout. And then there's like a piece of software that also exists, right? So and what I mean by that is there's the nightscout ecosystem, right. And this includes the people that are using nightscout. It includes the coaches, the school nurses, the teachers, the clinicians, the parents, the guardians, the caretakers, and the patient's themselves, right. And so there's this thing, that is the network of nightscout. And then there's a piece of software. And in fact, there's a whole bunch of pieces of software and devices, right. So there's the cgms, whether it comes from Abbott, or from Lee Ray are from Medtronic, right? There are the insulin pumps, whether they come from Medtronic or maybe Tandem or maybe Insulet, in the United States. And then there's other kinds of devices, too. There's like cloud devices, right? So some of your Dexcom data goes to Dexcom Cloud, some of your Medtronic data goes to carelink, Medtronic cloud. And so nightscout, there's a lot of ways for data to exist in the world of devices, connected devices that data can come from. And then there's this central hub in the cloud. And that's the piece that usually I think of as nightscout. When people say, Oh, I'm going to go file a bug report on nightscout, or developer says, I'm going to go fix a bug on nightscout. Really, they're talking about this cloud native piece of software that draws the graphs that provides you with a web page, the API that all of the other devices then connect to, right. So that forms when all when you have multiple devices that are talking to nightscout, all of a sudden, you have this nightscout network. And the thing that we think of as nightscout is what I like to think of is that cloud piece of software right in the center of it all. Stacey Simms 36:44 So this might sound silly for someone who hasn't used it, or doesn't really understand what is nightscout. in that setting, as you mentioned, what is it used for? How does it help somebody with diabetes, Ben West 36:58 one thing a lot of people talk about is data governance, being able to control your data. And that's certainly true, I have found that the most profound thing I have found is that it's really this, this concept of sharing, when you invoke the buddy system in your life, you know, as you travel through life, is it during the transitionary events, when you start a new therapy, when you have a special day, and you want some help, and that these are the kinds of things that people are sharing, it used to be when we first started nightscout, almost 10 years ago, seven, seven years ago, it was all about let's at least share what we know about the past. You know, let's share the alerts and alarms. Those are retrospective, right, you have to have past data to generate an alerting alarm. And that's kind of like current and past data. And people would use that the classic use case there that that made the news was when parents go to the office, and the children are going through the school day, and maybe going through mixed authorities and different just different realms of concerns across as they travel through life. What we have found since then, is that it's not just the retrospective data in terms of keeping current that people want to share. It's actually every aspect of diabetes. Surely, if you had the technology and the power, to share your alerts and alarms with me, surely you can share the tools to help me prevent those alerts and alarms. That's where the future is going is we're gonna see services that allow sharing, not just alerts and alarms, but managing every aspect of diabetes as we transition through every phase in our lives. So this is a really exciting time to be in because nightscout is years ahead of some of the big vendors here, providing feature sets for all of those things. Stacey Simms 38:47 It seems like that's a good segue into medical data networks. Can you talk about what that is and what the goal is? Sure. Ben West 38:54 So I've always been interested in this concept of the power of networks. That's one of the things that really got us interested as we started building out the nightscout ecosystem, making sure that we could talk to connected insulin pumps, making sure that we could talk to connected CGM, and talking to people about the data governance and the technology required to do that. In the past, I worked for a company called muraki. They made software defined networking. And that means if you've ever used Wi Fi in a public space, like Pete's coffee, or an airport or something like that, my software has protect your privacy, govern your use of the network govern the speeds at which you can use the network even govern which sites you can visit. And this is very complex techie stuff, but we made a simple dashboard that allowed people to share the process of managing that experience. This is old hat for us. So we created this company medical data networks. What we want to do is wrap up and respect all these years of innovation that have happened in the DIY space and we want to make Set the norm. We don't think that any of this is controversial at this point, the idea that you'd have remote monitoring, the idea that open source would be a fertile ground for the innovative wetlands, right? Some people like to call it. And so that's part of what we're doing. And so now we're offering nightscout as a service. And we make nightscout. press button easy. And we're working with the FDA to make sure that we can operate it fully compliant. Stacey Simms 40:28 That sounds to me like you're trying to offer kind of a DIY the nightscout for people like me who, when many others who were you know, reluctant to do DIY stuff? Is that what the service is? It's a Is it a paid service that I can kind of this is an awkward way to say, like commercialize or make simpler what nightscout has been? Ben West 40:48 That's right. So we want to offer Nightscout as a service and reduce the barrier to entry, make the entire experience much more reliable, predictable and consistent. And we want to increase the benefits of remote monitoring for everyone, whether that's caretakers and parents or temporary guardians, or whether it's just people that just want to find their diet buddy on social media and share it with them. Stacey Simms 41:10 Thank you. So tell me a little bit about what T1Pal Ben West 41:13 is? Sure, I'd love to. So T1Pal is our first product from medical data networks. And it leverages all the experience that we had building nightscout. So T one path is Nightscout as a service. So you can think of it as the easy way, it's a new way to get started with nightscout. And it eliminates all of the server and database administration and DIY craft. So it makes it as easy as any other platform where you simply sign up, you pay for your subscription, and you have access to all of the benefits that Nightscout brings. Stacey Simms 41:46 Is it on the app store? Is it something that people buy? How do they get Ben West 41:50 Dutch the website to one call.com, you Stacey Simms 41:52 can go on your browser. Either commercial products have kind of caught up I mean, I can remote monitor my son with a Dexcom. And you know, t slim or Tandem has an app that is on my son's phone. And I guess eventually I'll be able to see that Omni pod is sharing more, what makes this one better? Ben West 42:11 Well, there's a lot of things. One is the if we go to the connectivity piece, right, this idea of interoperability, and the idea of bring your own device, when we talk about sharing, there's a the base level that I start with is bring your own device I want to share with myself, I want to share I have this Samsung or Apple or whoever created a brand new thing, you know, last week, it's a shiny new thing, I want to go get that and bring that into my therapy, that's going to be part of my system. Now, that's really tough for a lot of these vendors I've been just I've been it's ago, I was looking at a brand new error that someone posted that I've never seen before on, you know, a Dexcom app. And it says it's incompatible in some brand new way. So this idea is really tough for the classic manufacturers who developed these really austere quality systems, right, and those quality systems control for change in the system. And the idea is you want to control your own destiny, and eliminate any possibility of variation. And so in a lot of these systems, what that means is we're going to test on exactly these versions. And anything that we add to that means increased workload that we have to go test. And so we create these haves and have nots. In a world that moves as fast as the one that we're living in where bring your own device, bring your own connectivity, this is the norm. Now, I think the industry, we just need more help, we need more players that are experts in this kind of connectivity in this kind of interoperability to make to satisfy the customer's demands. That's really the area that we specialize in is this idea of Bring Your Own Device connectivity. So that's one and then the other is this idea of sharing a lot of these systems, they're built for that initial use case that we discussed, where it's really oriented around the concept of the nuclear family. And you we know you have exactly these many family members and exactly these roles, and that's the way it's gonna work. Or if you want something else that starts to not work very well. You know, if you want the school nurse to have access during school hours, that doesn't really work very well. The idea of sharing, does it really require installing patient? Or is there a web app that works on any device? Those kinds of things, I think Nightscout still has a really compelling advantage. In addition to all the features, she talked about all the watches, there's more than 20 watch faces just for Garmin for Nightscout. Stacey Simms 44:44 Right and that's just the one brand Garmin there's the all the other ones the Apple Watches smart, the Google wears, etc. fitbits when you see their watch faces, you still need your phone, right? Has anybody gone direct from Dexcom transmitter to phone yet is that maybe some You're working on? Ben West 45:01 Oh, no, I, I can't say much about that. Stacey Simms 45:03 Can you confirm it's really hard because that's what I hear from my friends in the DIY space that I've been bugging for five years about this. Ben West 45:10 What I will say is that this idea of interoperability and connectivity, the idea that you're actually operating a network networks and decentralized systems operate on fundamentally different rules than closed systems that are composed of one unit. And device manufacturers specialize in kind of making these one units or boxes of units at a time. And they fill the shelves with those units, this mode where you start operating in a network with multiple devices that are connected, and you have decentralized emergent behaviors, this is a difficult area. So a lots of technologists that I've worked with agree that nothing's impossible, it's all software, we can make it do anything. But it does require willing participants that are collaborating. Stacey Simms 45:54 One thing that I have found of talking to you over this time is you're very generous towards the commercial systems, you know, there is no, and I think this is very genuine, there's no bashing, you're not trying to put anybody down, it seems to me and you can correct me if I'm wrong here, this is how I feel. So maybe I'm projecting that there is a really important place for these commercial systems with their very, you know, big, you know, simplicity, they have to be able to be used by a vast majority of people with diabetes, they have to be understood by clinicians. But there is this also really, really important DIY focus that we've seen over the last almost 10 years now. And I do think that I wish there was more cooperation, but they are almost complimentary. And when they're both needed, am I off the mark there? Or am I kind of reading between the lines that you may feel a similar way? Ben West 46:42 I agree completely. Stacy, what we have is a market full of people with this inhumane disease, right. And this inhumane disease demands all kinds of things on our time and our resources. And because it's inhumane, there's a lot of needs. Now, these companies solve problems in consistent and reliable ways for people. And that's what we need, we need to all as a market, we need a functional market that's working efficiently. That's providing high fidelity health care that provides a reasonable return on investment in terms of the fidelity of care, the more resources that we spend health care and wellness, we should be seeking a return that yields the kind of fidelity commensurate with the spend, right. So in diabetes for a long time it was you could go try and try and try. And you could try as harder and harder and harder as you'd like, a day to day may not be the same, you may not get the same results. And so trying harder is perceived as not worthwhile. Because there's no feedback loop that provides the yield that's required. I think that what we have is a world that's changing with technology really, really fast. And we have an ethical imperative to use that technology in humane and equitable ways. I open sourced all of this software when we got started, because for me, that was part of this, the scientific methodology of it all is someone else should be able to take this software and debug it audited, etc. That was a really important working principle. For me. That's exactly what we need is we need a working process and all of these domains, we need innovation happening. And we need a pipeline that can deliver the benefits of those innovations in an efficient way to the most number of people possible, as quickly as possible. And why? because as we know, this condition, this intensive insulin therapy is just an inhumane condition, it demands too much. And so I'm imagining a world where we can work together, we can have a bolus free up lane free therapy, we can have Bring Your Own Device connectivity, and have full remote control, we can have the supercomputers and the the networks and the people that are connected to our devices and our data work in a collaborative way to prevent repeated hype hyperglycemia repeated insulin reactions, and we can use that data equitably and humanely to deliver high fidelity healthcare. And Stacey Simms 49:08 that's the vision. You've talked about diabetes 2.0. Is that what you're referring to? Ben West 49:14 Well, that's an idea. I've been workshopping. I'm hesitant to use the numbers for all kinds of reasons. I have talked to people, not just children and parents, I have now talked to people that have had type 1 diabetes for 40, for 50 years. And they are telling me that this network effect that we have created is one of the most powerful things that's that's happened in their lives. I don't know how to respond other than to try to do more. We've got feedback now from parents and children from people in their middle age and from people that are now experienced 4050 years with diabetes, telling us that this has had such an impact that everyone This should be the standard of care for everyone. And I think When we look at what we're doing today, we're still in the early days, we still haven't really optimized for the next gen system where people are really living their lives really free of the blame and stigma. You don't have the blame for getting a bolus wrong, or for carb counting wrong. Because either because you can share it with someone, you can share this complex dosing decision as it transpires right, you can share it with your buddy, you can share it with an expert you choose, you can share it with someone you trust on demand, or someone could do it for you. That's what we're seeing it for a lot of these parents in school, now it's run day, or it's Testing Day, and the parent can manage all of that stress remotely. That's where we're going even with automated systems. That's what we're seeing. Because the demands as you travel through life, the demands change, and sometimes it's fine to coast and let the machine handle it. Sometimes it's necessary to find, invoke the buddy system and find a friend. Yeah, you know, you've Stacey Simms 50:57 mentioned a couple times now bolus free blame free. Can I ask you just to kind of dig in on that a little bit more, because I love that concept of if you aren't deciding to give yourself insulin for a meal or for a high, if you can't mess it up? How can you feel bad about it? And I think when you're an adult with type one, or if you're a parent making decisions for your children about this, this guilt, this mental health part of it is so overlooked. Ben West 51:22 You're so right, Stacy, I call this the onus to bolus Yeah, the onus to bolus so what we've done is we've made out of necessity, we have a system of intensive insulin therapy that requires multiple daily injections. That's been the standard since the introduction of insulin. And then more recently, continuous subcutaneous insulin injection, right? See a society that's classic pump therapy for a brief while we saw the introduction of what's called sensor augmented therapy, sensor augmented pumps, which is where you pair the glucose readings with the insulin pump. And then more recently, we have the introduction of these automated insulin dosing systems, hybrid, full, etc. What all of these systems do is they help address the symptom of diabetes, which is high, uncontrolled glucose. And insulin is the mechanism that we have to bring that glucose back down and under control. It's amazing that this works at all, I sometimes just marvel at how incredible it is that we can manually take this missing hormone insulin, and just dump it in the body almost anywhere, it seems. And it works in the sense that it does provide this temporary relief of controlling that glucose, as we know that balance is extraordinarily difficult, because it is our responsibility to get that right. What happens is, if you get it wrong, it's kind of your fault, especially if you've been given a calculator where your job is you just have to put in the right number. And you know, the calculator will spit out the right number for you. And now it's your job to carb count, or count the number of fat and then deduct the fat and link out the number of fiber and the deductor fiber. And then by the way, for the delay, you know, due to other effects due to the fat, or any alcohol on board, anything like that, or because of sickness or you know what, maybe not feeling well. And actually, you lose your carbs, right? after you eat and you lose the carbs, it just becomes so tricky. One to even know when it is you're going to eat to know how much it is you're going to eat. Three know how that's going to digest. And we could go on and on and on all day about the trouble with this thing. But the problem is, when the language comes up for how we talk about this, we talk about Did you get it correct? You know, we use the words like correction factor, we use the words like correction bolus. I've heard parents actually talk to their children and say go correct yourself. And I've never had that experience, because I was diagnosed in my 20s. But the experience I have had, and this was in my 30s, I was doing exercise in a class and I had an insulin reaction. And you know, I had to take a break out of the class, I really wasn't feeling well, right. And it's really, it's never pleasant when that happens for so many reasons. But one of the biggest is always you're just you're othered you're not part of the group doing the activity anymore. You're often in this weird thing. And often it's involving bloodletting in front of everyone, right? I mean, this is not good. And then so I'm having this conversation afterwards about, you know, here's my CGM. Here's my pump. And, you know, this instructor goes well, Oh, isn't that great? That is doing all that for you. Great. So the reasonable person when they see all of these devices, they're expecting it to do all of this already. Right? That's that's the reasonable person's expectation. I had to have a 15 to 20 minute conversation explaining, well, no, it doesn't really work like that. I have to take the CGM number, I have to guess if it's right. I have to get some blood to make sure. And then I have to do this thing. And then you know, I have to take the right I'm out. And the response right away, this still affects me was. So does that mean you just did up? When I explained how the mechanics works, the onus is on me the onus to pull this is on me to get it right. And the entire system around this is designed to make sure that it's not anyone else's fault. As it should be, it should not be anyone else's fault. If it's going to be someone's fault, it should be mine. But the entire system is designed to dock the way that you interact with the doctors, the therapy that they start you on is designed so that they're not going to kill you. They don't want to kill you. Yeah. And it's designed to just keep you alive, and they'll try to figure things out. You know, after that, let's keep you alive. First, the way that design happens in manufacturing with these vendors, I call it defensible design. It is designed so that they will not be held responsible for something going wrong. That's the way that it's designed. Stacey Simms 55:53 It's interesting, because so many thoughts flashed through my head when you were talking about those things in terms of blame a lot of parents and I speak on this to try to get them to stop, but a lot of parents call the a one c visit to the endocrinologist their report card, you know, it's mom's report card. And that's a really tough way to look at this. But I understand why. And another thought I had was when we started with control IQ, about a year and a half ago now, I was just gobsmacked on how many decisions it makes it can make something like 300 decisions a day and how we were and I say we because you know, I mean, Ben, he was diagnosed at two. So I'm still going through the process of saying his diabetes, not our diabetes, so forgive me. But you know, he's a once he went down, his time and range went up. But it really showed me how there was no way for me as a parent of a toddler and a little kid and a middle schooler. And there was no way for him as an individual to keep up with that machine. And that machine couldn't even be perfect. And I got to tell you, well, it was frustrating to say okay, the machine can be perfect. It was so freeing to be able to say I had no chance, if that makes sense. Ben West 56:58 That's why I chose the word inhumane stage, is when you see what it takes for success, you realize you didn't stand a chance. And we have to find ways other than blaming each other. We have to use technology and in this in this way to make this possible. Stacey Simms 57:15 Thinking that way, then, let's talk a little pie in the sky here. Obviously, Dream stuff with technology isn't gonna happen next year, or maybe even the next five years. I don't know what the timeline is. But what do you want to see? I mean, can you give me some, and I'm going to put you on the spot, but maybe some concrete examples of how that bonus to bolus could be lifted? Ben West 57:35 Well, there's, there's a number of ways to address this. You mentioned other technologies, other therapies, there's certainly so many capabilities, we're adding to our tool belt, whether that's new therapeutics, I've heard of people taking other hormones, other injections, supplementary injections, that that seems to really work. Well. For some folks, we've got faster insolence coming relatively soon, some folks are working on, you know, micro dosing, glucagon. And then there's there's other types of therapeutics as well. So there's all kinds of things it's really difficult to know, a lot of that is out of my wheelhouse. I'm a software person, I know how to manage cloud, we know how to do transformational services, digital transformation, right, we know how to manage really complex stuff, using technology to provide a collaborative decision making process, it's in the power of the web, or society as a whole. That's why I wanted to become a technologist and work on the web as a whole was this idea of the collaborative power of sharing. That's my big bet. That's the thing that I get really excited about, I see automated dosing systems are coming faster insulins are coming. And those are all great, they're going to be so profound and helping people. But at the end of the day, with these therapies, you're still facing exactly that you're facing a lifelong journey with other people with this experience. And my big bet is that this need for sharing is so fundamental that that's why sharing is being adopted in every part of software that we look at every piece of technology that we get first. It's like a solo experience. And then eventually, it becomes like a collaborative social experience. that's been true of a lot of different kinds of software. And I think that we're going to see the same thing in diabetes care that we'll see clinics that will embrace the digital technology, so that instead of having appointments once every 90 days, or once every six months or once a year, whatever it is that you're going to get connected to the people you trust in the experts you need just in time and on demand. So if you're someone if you're using one of these fancy pumps that's connected to supercomputer and connected to a network, there should be an agreement for how this is going to work. If you're going low. lifetimes per night. What is the pathway for someone to intervene for us to deliver the help that you need? Because I'm pretty sure no one wants to go for an insulin reaction for a sixth and seventh night. Yeah, I'm pretty sure there's some consent that can be arranged. There's got to be some design there. Right, where we're going to eliminate this. When I think about the remote overrides, and the overrides features that are happening right now we're, you know, we're playing around with things like sleep mode, things like exercise mode, those are dosing decisions. When you decide to invoke sleep mode, or invoke exercise mode, the algorithm is changing its dosing slightly, it turns out that all dosing decisions are just really, really hard. You can't turn on dosing. On exercise mode, when you start exercising, you have to turn it on hours ahead of time, right? Like those kinds of things. Maybe we could share access to those things. One of the examples that I've been learning about recently is, is this remote overrides where the teenager is doing testing, and it's stressful on test day, and your attention is supposed to be on taking the test. It's not supposed to be on managing diabetes, and in fact, playing around with diabetes devices, which is how it's gonna look like to the proctor to the school that you're just playing around with devices, that becomes an issue. Can you trust the proctor to handle these devices, etc? Well, guess what, with remote overrides this idea of remote controls and sharing your dosing decisions, that becomes a non issue. I've heard of parents and teenagers coming up with a plan for the day, okay, it's testing, here's what's going to happen. Here's the schedule we're going to go thro
Welcome to Frontline Questions, a bi-weekly segment in which JD answers the most popular questions we receive from The 80 Percent listeners.Today's question is ...How do we implement BYOD on the frontline?Send your frontline question to podcast@axonify.com so JD can answer it on a future episode.Download The Ultimate Guide to Frontline Training for more tips on how you can provide right-fit support to your frontline teams, including how you can dramatically improve engagement.The 80 Percent is brought to you by Axonify. To learn how you can provide communication and training to your frontline workforce that actually works, visit axonify.com.Join the #FrontlineForward effort by visiting axonify.com/frontlineforward to access free training content, download the 2020 State of Frontline Employee Training Report and subscribe for updates.
Die Nutzung von Mobile Devices ist weit verbreitet und erhält immer mehr Einzug in den geschäftlichen Bereich. So dienen Tablets nicht mehr nur zur Online-Suche, sondern können auch zum Kassensystem umgemodelt werden. Doch wie wird die Sicherheit der Daten auf einem mobilen Gerät gewährleistet, welches im Businesskontext verwendet wird? Denes Rühl von Samsung beschreibt in der zweiten Episode zum Schwerpunkt „Mobile Security“, wie der Kiosk Modus hier unterstützt und die Daten sicher verwaltet werden können. Zudem gibt er weitere Beispiele, wie mobile Geräte zweckentfremdet werden und wie Mobile Security trotz BYOD (Bring your own device) funktioniert.
Welcome solo and group practice owners! We are Liath Dalton and Roy Huggins, your co-hosts of Person Centered Tech. In our latest episode, we’re talking about wassails and holiday carols. Kidding! We’re talking about how to manage your team remotely. We discuss managing standard of care in different environments, key components to have in place in environments where there’s client info, home and mobile offices, restricted areas and escort-only areas, enforcing privacy at home, locking up devices, ethical standard vs HIPAA standard, double lock rules, risk management, full disk encryption, shredding documents, Bring Your Own Device policies, secure connections, WiFi guidelines, VPNs, viruses and phishing attacks, how to spot phishing scams, and security reminders. Listen here: https://personcenteredtech.com/group/podcast/ Stay tuned for future episodes! For more, visit our website. Resources Group Practice Office Hours (direct support and consultation service from PCT and Eric Strom, JD PhD LMHC) -- with special celebratory launch offer. On-demand training: Teletherapy From the Home or Mobile Office: HIPAA, Ethical, and Standard of Care Issues (1 CE credit hour, legal-ethical) from PCT's Staff HIPAA Trainings PCT's Group Practice Teletherapy Programs PCT's Group Practice HIPAA Security Programs
In this episode, we take a look at the growing trend of BYOD aka Bring Your Own Device. This phenomenon started gaining speed in the mid-2000s and now almost all organizations need to deal with this. BYOD has various pros and cons, and we take a look at the good, the bad, and the ugly. We discuss the history and trends, security risks, schools, the use of personal phones as security credentials, and more. Resources for additional information:https://digitalguardian.com/blog/ultimate-guide-byod-security-overcoming-challenges-creating-effective-policies-and-mitigatingContact us at podcast@bluoceansecurity.com
This week, Dan Lohrmann offers an expert perspective. DAN LOHRMANN is the Chief Security Officer & Chief Strategist at Security Mentor Inc. Dan Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. Lohrmann led Michigan government's cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor's industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions. He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin and for four years as a technical director for ManTech International in a US/UK military facility. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow. He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana. Each week from his Zero Day Studios™, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.
This week, Dan Lohrmann offers an expert perspective. DAN LOHRMANN is the Chief Security Officer & Chief Strategist at Security Mentor Inc. Dan Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author. During his distinguished career, he has served global organizations in the public and private sectors in a variety of executive leadership capacities, receiving numerous national awards including: CSO of the Year, Public Official of the Year and Computerworld Premier 100 IT Leader. Lohrmann led Michigan government's cybersecurity and technology infrastructure teams from May 2002 to August 2014, including enterprisewide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. He currently serves as the Chief Security Officer (CSO) and Chief Strategist for Security Mentor Inc. He is leading the development and implementation of Security Mentor's industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors. He has advised senior leaders at the White House, National Governors Association (NGA), National Association of State CIOs (NASCIO), U.S. Department of Homeland Security (DHS), federal, state and local government agencies, Fortune 500 companies, small businesses and nonprofit institutions. He has more than 30 years of experience in the computer industry, beginning his career with the National Security Agency. He worked for three years in England as a senior network engineer for Lockheed Martin and for four years as a technical director for ManTech International in a US/UK military facility. Lohrmann is the author of two books: Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD for You: The Guide to Bring Your Own Device to Work. He has been a keynote speaker at global security and technology conferences from South Africa to Dubai and from Washington, D.C., to Moscow. He holds a master's degree in computer science (CS) from Johns Hopkins University in Baltimore, and a bachelor's degree in CS from Valparaiso University in Indiana. Each week from his Zero Day Studios™, cybersecurity expert Scott Schober discusses the most terrifying and apocalyptic cyber scenarios including ransomware, breaches, identity theft, IoT device security and more with fellow experts to find out what keeps us up at night. Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.
Echt jetzt, wirklich, die leben noch? Na sichi! Vorbei ist die Sommer-Herbst-Winter-Pause und weiter gehts! Live aus dem Home-Office berichten wir über Digitalisierungsnachholbedürfnisse, Faktentreue, Medienrummel, Parksünden und mehr. » 0:00:00 Begrüßung aus dem neuen Home-Office-Studio in Deißlingen, bei Konstanz - Ummelden zu Corona-Zeiten - Umweltplaketten kann man nie genug haben - Shopping mit Grenzen - Billigarbeitskräftemangel // 0:14:51 Vorbild Internet - Kabel-BW-Unitymedia-Vodafone droht mehrfach mit TV-Paket - Systematische Zeitverschwendung - TV vs. Streaming - Geschwindigkeit vs. Realität - Zwangsfortschritt Onlinemeeting // 0:37:59 Home-Office, Fluch oder Segen - Bring Your Own Büro - Smarte Haushalte ohne Arbeitsfähigkeit - Kein Recht auf Home-Office für die Verkäuferin - Schlechte Arbeit geht auch im Büro - Vertrauensfrage: Wie viel Kontrolle ist möglich? - Überwachung, da geht noch was // 1:16:05 Medienrummel Corona - Neuland Wissenschaft - Beschnittene Medien // 1:29:13 Was wäre, wenn wir in einer Welt ohne Meinung und mit Fakten leben würden? - Vielfalt vs. Fakten - Unsichtbare Fakten - Religion zieht - Personalisierte Wahrheit - Mythen bleiben - Beweise mir dein Beweis - Wer definiert Fakten? - Neuerfindung Populismus - Bewertungen und Kinofilme als Faktenquelle // 2:14:36 Spät ists geworden - Künstliche Parkplatzprobleme like a Bahn - Keine Rechtsberatung - Dürfen Spielplätze zugeparkt werden? - Anwohnerparkplätze in weiter Ferne - Nahverkehr für Arme // 2:36:07 Viel nachzuholen - Wird es nächstes Jahr alles doppelt geben? - Think big! Verjährung für Straftaten (Love Parade) // 2:46:30 Gewohnt freundliche Verabschiedung und Grüße an alle tapfer Durchhaltenden
Telecommunications expert Tzachi Zack joins the show to discuss BYOD technology advancements and how it affect employees that work from home. Tzachi offers advice about setting up a secure work-from-home infrastructure network from both the company and employee perspective. He also discusses work-from-home situations in light of the coronovirus pandemic, employee privacy, work-life balance and […]
Timestamps1:50 What is a go market strategy?3:00 Tactics and execution - what is your clever plan to get your product bought? Level 0 - Build it and they will come. Level 1 - Have ANY sort of plan. Level 2 - Have a CLEVER plan. Level 3 - Use someone else’s plan.5:36 Setting the scene - Sales and Marketing - Lesley’s Compass12:00 Toothpaste vs Jet Engines16:00 Distribution Strategy - Zero Touch, Low Touch, who the buyer is21:00 Disruption vs Diffusion - Facebook spitting out startups33:00 Go to market strategies in an era of Bring Your Own Device and Human Avoidance Software42:00 Channel partnerships46:00 How do you get started with a go to market strategy?57:00 Should you build a channel partnership early?References:https://firstround.com/review/leslies-compass-a-framework-for-go-to-market-strategy/https://tomtunguz.com/b2d-go-to-market/https://a16z.com/2017/06/09/distribution-channel-partnerships-alex-rampell/
Welcome to another episode of Develomentor. Today's guest is Hyoun Park. Park has an MBA from Boston University and a bachelor’s degree in Women’s and Gender Studies from Amherst College.Hyoun Park is the CEO and Founder of Amalgam Insights, an industry analyst firm focused on managing technology at scale for emerging business models. Over the past 20+ years, Park has been at the forefront of trends such as Moneyball, social networking, Bring Your Own Device, data monetization, and the Subscription Economy working with startups, large enterprises, and the investment community. Park has been quoted in USA Today, the Los Angeles Times, Barron’s, and a wide variety of mainstream and technology press sources. Although he primarily works with enterprise technologies, Park has a soft spot in his heart for new and innovative technology startups and is dedicated to supporting greater gender and cultural diversity in science, technology, engineering, and mathematics.Click Here –> For more information about tech careersEpisode Summary“Part of being a market-facing analyst is doing the webinars, speaking on stage, the executive presentations that you don’t necessarily think about as an individual technology contributor.”—Hyoun ParkIn this episode we’ll cover:How Hyoun chose not to go to medical school and instead majored in gender studiesWhat its like learning computer science on your own terms without a formal educationThe day to day of a market-facing tech industry analyst. Hint: There’s more to it than just conducting research.You can find more resources and a full transcript in the show notesTo learn more about our podcast go to https://develomentor.com/To listen to previous episodes go to https://develomentor.com/blog/Follow Hyoun ParkTwitter: @hyounparkLinkedIn: linkedin.com/in/hyounpark/Amalgam Insights: https://amalgaminsights.com/Amalgam Insights Twitter: @amalgaminsightsFollow Develomentor:Twitter: @develomentorFollow Grant IngersollTwitter: @gsingersLinkedIn: linkedin.com/in/grantingersoll
Az ITBusiness&Technology 2020 konferencián természetesen a biztonság is terítékre kerül. Arról, hogy többek közt mi most az egyik legaktuálisabb kérdés az adatokkal és az adatbiztonsággal kapcsolatban György László beszélt röviden, aki azt is megosztotta, melyik témára kíváncsi a konferencián.
RADIO IT - IL PROTAGONISTA Il protagonista - anzi, LA protagonista - di oggi è Roberta Viglione, amministratore delegato di Mauden. Nella sua chiacchierata con Radio IT Roberta ha parlato delle proprie passioni e ha espresso alcune idee tutt'altro che banali su come intendere la cybersecurity oggi. Per esempio, sulla tendenza BYOD. Bring Your Own Device, ovvero porta a lavoro il tuo dispositivo personale. Lavori con quello e tutto si semplifica. Su quest'idea, che sta trovando molto spazio nell'IT attuale, Roberta è piuttosto critica e si muove in controtendenza. Così come in controtendenza è la sua storia personale di professionista del settore. Poi c'è lo sport, con l'amore per la pallavolo (e il tifo per la Juventus). E c'è il fascino per un luogo del mondo che sembra colorato dai bambini. Qual è? Scoprilo nel podcast! Buon ascolto! Altri contenuti su www.radioit.it
RADIO IT - IL PROTAGONISTAIl protagonista - anzi, LA protagonista - di oggi è Roberta Viglione, amministratore delegato di Mauden. Nella sua chiacchierata con Radio IT Roberta ha parlato delle proprie passioni e ha espresso alcune idee tutt'altro che banali su come intendere la cybersecurity oggi. Per esempio, sulla tendenza BYOD.Bring Your Own Device, ovvero porta a lavoro il tuo dispositivo personale. Lavori con quello e tutto si semplifica. Su quest'idea, che sta trovando molto spazio nell'IT attuale, Roberta è piuttosto critica e si muove in controtendenza. Così come in controtendenza è la sua storia personale di professionista del settore.Poi c'è lo sport, con l'amore per la pallavolo (e il tifo per la Juventus). E c'è il fascino per un luogo del mondo che sembra colorato dai bambini. Qual è? Scoprilo nel podcast! Buon ascolto!Altri contenuti su www.radioit.it
Welcome! The Holidays are almost here -- Hannakah begins tonight and the middle of next week is Christmas - Boy this year has flown by. There is a lot of Tech in the News so let's get going! For more tech tips, news, and updates visit - CraigPeterson.com --- Related Articles: Signature Anti-Virus does not adequately protect you from today's Malware Lessons We Failed To Learn and Therefore Are Doomed To Repeat Business Computers Should Only Be Used For Business 5G - Not Ready For PrimeTime...Yet! Are You At Risk from Your Outsourced Software Provider Security - Knowing What You Have Is Essential Chrome 79 will continuously scan your passwords against public data breaches Getting the Perfect Tech Gift for Your Special "Techie" --- Automated Machine-Generated Transcript: Craig Peterson Hey, hello everybody, Craig Peters on here on w GAM and online at Craig peterson.com. Hopefully, you're able to join me on Wednesday mornings as well as I am on live with Ken and Matt, we always talk about the latest in technology and news and of course in security since that's primarily what I've been doing for the last 20 plus years here in the online world, man, just thinking back, it's, you know, I first got on the internet. Of course, it wasn't called that. But way back in the early 1980s. And I remember in fact when I first started doing networking professionally back in 75, and there was no worry about anything with you know, yeah, okay, we didn't want people to hack into so you'd have leased lines for your business and I was doing a bunch of work. from banks way back when right, one of my first jobs, and I was really enjoying it, I just learned a whole lot up to today. And we're going to cover this here because my gosh, it's it has changed. The Internet used to be very libertarian, everybody on it was very libertarian or conservative. Of course, that's because there were a whole ton of government contractors on the ARPANET as well as some colleges and universities. And you look at it today, and you think that really it's changed dramatically which it has. But I think the ratio is probably still about the same. You've got the silent majority that just doesn't say much about anything, right. And then you've got this hugely vocal minority who's just yelling and screaming all of the time. And then some of these tech companies that are trying to straddle somehow in the middle and not get everybody all upset with them. It's really a Much different world. But when we're talking about security, it is nothing at all like it used to be. You used to go online, and you'd have some fun you, you know, exchange emails with people, you'd share some files and some fun things. I remember this one whole thread on chases. That was just absolutely amazing. I think I came up this time of years while it was all these puns about different cheeses. It was a lot of fun. Now today, we've got a whole different internet out there and a great article by Robert Limos and he is looking at WatchGuard Technologies' latest quarterly report that was published just last week. And this network security firm found that the percentage of malware that successfully bypassed anti-virus scanners IT companies network gateways has increased Significantly, watch guard technology is saying that the amount of malware that signature-based antivirus software catches, has plummeted to about 50%. Now, I think their numbers are high because I think it's more like 20%. But they're getting specific here. They're talking about the amount of malware that comes into a network via an external source. In other words, people are accidentally pulling it from a website they visit, or perhaps it's been injected into their systems through someone who's visiting their network and using another vulnerability. But they're saying that antivirus software This is signature-based stuff, that's what you get from Norton Antivirus. That's what you get from, you know, the Symantec people from McAfee from all of these different antivirus companies out there. It is just horrific what's happening because of what's known as zero-day now you might have heard of this before you might not have but basically what zero-day malware is, is malware is nasty software and malware includes things like viruses, worms, Trojans, etc. It is this type of malicious software that has not been seen in the wild before. And what it used to me is they would, you know, some brilliant person who as my mother would say, Why don't they do something useful with their time, some brilliant PR person would come up with a piece of software, no one had ever seen a way of attacking that no one had ever seen before. And they would attack us and they would get through because there was no signature for it or the engines in the antivirus software just could not manage to handle. You know malware like this new piece of malware that just came out the problem we're having today is that the majority of malware act just like zero-day. So here's what happens with a signature-based attack. You can think of it just like your body's anti-virus system night than what you have in your body. And your body looks at something that it sees and says, Have I seen this before. And if it has seen it before, it knows to attack it before. It grows really big and kind of starts to get out of control, and then the body has to attack it after it's already really, you know, it's taken the beachhead if you will use a military term. I've been watching a lot of world war two movies lately, but it's taken that beachhead and now has control of the beach and is starting to get in further and it's very difficult to get out versus it recognizes it almost right away as a nasty virus. And goes ahead and end the Jackson You know you have more cells in inside your body inside your skin there are more cells that are foreign to your body then there are body cells when you start counting all the bacteria and everything that's in your system and on your skin. It's just incredible. So our body relies on a lot of these things. In order to keep us healthy, if we had no bacteria, you be in trouble. It's like you know if you go on antibiotics, which is an anti-bacterial, what does the doctor tell you to do? Well, you know, start eating yogurt and, and other things. Maybe take some Kombucha or various other things in order to try and stay healthy. Get that good bacteria going in your gut again. Well, when your body is attacked by something that hasn't seen before. That's what we would call in the computer world as a zero-day virus has never been seen by Your body or in the case of a computer's never been seen by this signature-based antivirus software. So what the bad guys have been doing is they figured out how Yes, indeed we are trying to block them. And they figured out that the majority of us are using these signature-based antivirus software packages. So they've designed the viruses and the malware to change itself every time. So no longer can the antivirus software, just look for certain signatures. So for instance, if you were always attacked by blonde-haired blue-eyed Norwegians, you might be cautious next time you see a blonde-haired blue-eyed Norwegian approaching towards you maybe with a baseball bat or whatever it is, they might have in their hands, right? So you get worried about it. What's the old expression? Once burn shame on me. You twice burn shame on me. Right? So we learn we respond based on how we've been attacked before. And so does the antivirus software now it can take them days or weeks, even months to get a signature out and get it all dispersed. You know, I'm talking about the old software, not the newest stuff, not the enterprise stuff we use for our business client. But the stuff that you use as a consumer and Heaven forbid if your business and you're using stuff like Norton Symantec, or McAfee or any of these other a VG antivirus software packages that are based on signatures because they just don't work. So what happens is they change themselves constantly. So it might be a Norwegian, but they dyed their hair they put on colored contact lenses, and they change their clothing. That's effectively what's happening with our computers nowadays. It may be that Viking that's approaching you but you Don't know it because it just doesn't look like they change everything about themselves at least most everything except the malicious intent and what they end up doing once they've got control of you. So watch guard is saying that this is a major change here. Now I'm going to quote directly from them. The big change is that more and more malware is becoming evasive. So the signature-based protection is no longer sufficient. There's nothing wrong with having it because it will catch 50% to two-thirds of the traffic but you definitely need something more. And that's why I've been recommending you guys do a few things you can do the free stuff. If you are not a business, you can go to my favorite right now. Open DNS and sign up for an account. They have some paid stuff. I think it's $20 a month per computer, for business to get the basic business service. It's free. For a regular home user, but it does not allow you to do any customization. And then there are a few packages in between open DNS. Now we use a commercial version of is an enterprise version called brawler. That's where the calling it now, but it's the highest level where we can, you know, watch it and maintain it. So that's step number one of what you need to do get open DNS so that if you do get one of these pieces of nastiness like ransomware, and it tries to call home, it can't get the phone number, right. He can't call home because there's another phone number. And I think that's a very important thing to do. It's free if you're home user, you might want to pay for the family plan would block certain scary sites and certain things you probably don't want your kids to see pornography and other things open dns.com and then the other thing to do, I had it in my big course this last year and that was how to harden Windows machine. It's rather involved. And I'll probably do a course early next year on this. But make sure you harden your machine, you're going to want to turn off stuff you don't need, you're going to want to make sure your firewall is set up properly to do the types of blocks that you need. You're going to want to make sure that you've got Microsoft's new malware software installed properly and running properly. So I'll have a course on this early next year that you can get. Because when you're talking about 50%, and I've seen numbers as low as 20% effectiveness with anti-virus software, you have to do something. Hey, if you're looking to buy some gifts, I'm going to be talking about some of them in today's show, including five g should you get that phone, you're listening to Craig Peterson on w GAN and online. Greg peterson.com. Stick around. We'll be right back. Craig Peterson Hey, are you thinking about buying a mobile phone? We're going to talk about that right now. You're listening to Craig Peterson on WGN and online at Craig Peterson calm. Now you've heard about 5g. You're probably using 4g LTE right now, on your phone and maybe mobile devices you may be your iPad or a tablet that you might have. Amazon has its Kindles. They do not, by the way, have 4g LTE on them, at least, for the most part, they're using some of the much older technology because frankly, all they're doing is sending books right? Which are pretty small. But it is that time of year that we're buying presents and there are only a few days left here for that holiday season, purchasing time. And we've got a lot of competition in the 5g world. So let's talk about what this is. And I'll give you some tips. But what is going on? 5g holds a lot of promise. Now I don't know if you remember I remember how shocked I was at how fast 4g was. I bought a phone. And it had 4g LTE in on it. It was an Android phone. And I vowed never again for so many reasons. And you've heard them on the show here before, but I had bought an Android phone, and I didn't have 4g up where I lived. And I drove down. We were heading down. I think it was till Pennsylvania take one of the kids to camp. And I was going through Valley and I noticed Wait a minute. There's a big city right there. I got 4g so I immediately went to speed test.net and I ran the test to see just how fast is for G. And I was just shocked. I was getting like 20 megabits a second, which was absolutely amazing. Because I've been using cell phones since they first came out. And you know, back in the day it was 14 for right? Oh, cell phone so fast. And now just to see 20 megabits was absolutely mind-blowing. But there are some major limitations to the 4g LTE network that we are using today. And those limitations are speed for one. And then the other thing is the number of devices that can be supported. And then the cost of the data and the data transfers. So 5g has been under development for quite a while. And this is not we're not going to get into Huawei and how they stole all their technology. It really appears to be from our friends up at Nortel and put the whole company out of business because of the spine that they did. And thank goodness finally, we've got a president who's trying to do something about it. But five G's real promise for us right now is that we will get two things will get a gigabit worth of data bandwidth, which means by the way, that we may not even bother with Wi-Fi in our homes if you live in an area that has full 4g or 5g coverage because it's just going to be just as fast as your cable is right now. Now the cable companies are probably going to try and compensate by lowering their prices and giving you faster and faster and faster internet. But for a lot of people, it's going to make economic sense because the cost isn't going to be high. And then the second thing that 5g is going to give us is the ability to have billions of devices connected to the 5g network. That means that everything from our cars Which really the next generation of cars self-driving cars really do need 5g so they can talk to each other. So they can continually upload data to the cloud to let all of the routing computers know about local weather conditions and, and road and where the potholes are and everything is just, it's going to be amazing, right? On the one hand, on the other hand, well, there might be some data leakage that we might not want. So the cars are going to have it but so is pretty much every device that you have. A couple of years ago, I talked about the new jacket, the new trucker jacket that Levi's hat out. And that trucker jacket was designed specifically to connect your phone to your phone and allow you to control your phone. So it had Bluetooth in it. You could touch these little wires that were embedded into the sleeve with your hand and use that to control your cell phone. You know, listen to music and Suddenly things are just kind of cool. So our clothes are going to have the internet in them. Our computers, of course, everything you buy a laptop, it's going to have 5g built-in, you're not going to need to have an external device anymore. Just list goes on and on and on. I've everything that's going to happen is going to be phenomenal. But it is not there yet. And Apple did not include 5g with the iPhone 11 this year, it will include it with the iPhone 12. That's coming out next year. And I saw a very, very good summary of what's probably going to be coming out of Apple in September next year. The guy that published it has been spot on with most everything that Apple was coming up with. And they are he's saying that they are going to be having 5G on the phone and it would make a lot of sense. But right now you can put in orders for the Samsung Galaxy Note 10 plus the one plus 70 that's There are other phones that are claimed to have 5g. But listen, everybody, it is still too early to buy a 5g phone. That is really my big tip when it comes to 5g right now, these networks have not fully standardized, they are not running, none of them are running full 5g anywhere except in a couple of major cities. The biggest problem with building out the 5g networks is that they need to have basically what we've come to know as cell towers everywhere. I mean, everywhere. These are little micro things that are not big towers like we have right now. You know, those fake trees that you see that are actually cell towers. Now, these are going to be small boxes and they're going to be on pretty much every street corner in the big cities. They'll be on the sides of buildings. They'll be on the sides of people's houses. Cell companies are going to pay us to put these on our homes so that we can now provide 5g to us and to our neighbors. And then there's going to be people who will be upset because of the radiation, even though it's non-ionizing, and it's not known to cause any harm, people will be upset about it. But these things are going to be everywhere. And that's because remember, I'm talking about one gigabit worth of bandwidth coming down to your device. Well, you cannot do gigabit service on lower frequency so they have moved to higher frequencies. The old UHF TV channels are pretty much I think they're all gone now throughout the country. And the FCC has bought back the bandwidth and has auctioned it off to all of these different companies that wanted to buy it. And it's just everything is going to change and with the high frequencies that they need in order to deliver these beads, they now have a problem and that is these higher frequencies do not penetrate glass. They don't penetrate walls very well at all. And they just don't penetrate metal at all basically, it's really bad. So it T Mobile has announced nationwide 5g available as of last Friday. That is pretty darn cool. It's got a 600 megahertz 5g network which is going to cover most of the country. That is pretty impressive. But the trade-off is it's using low band 5g which means it is good at providing slightly boosted speeds inside buildings and is available in a lot more places than what competitors offer 18 T and Verizon are offering the opposite. They have ultra-wideband networks right now superfast speeds, but very, very small footprints very small pocket, and you got to be standing near one of these towns This is kinda cool T Mobile is expecting with theirs. That actually is p mag is PC Magazine, you can expect a boost of about 15 megabits with their new 5g nationwide. And you might see 150 megabits if you have a new 5g phone or 700 megabits if you have 4g LTE. So not a huge right now, but just wait. Okay, wait until next summer next fall, when things are really going to start happening. All right, stick around. We got a lot to cover still we're going to be talking about some guests who will talk about some of the big hacks of the year. What does it mean to us? What can we do? I'm going to give you some tips and some tricks, what not to do on your work computer third party security risks and some lessons from the National Security Agency. You're getting it right here from Craig Peterson on WGA and Craig Peterson Hello, welcome back. Greg Peterson here on w GAN will be enjoying the show today. We got a lot to cover here. Awesome. Good news, some gift ideas. I've got a very cool article from Ars Technica, about nine gift ideas for the tech enthusiasts in your life. And frankly, I am totally into this. It gave me a couple of ideas in fact of things that I'm going to be getting for people. So you might want to stick around and listen to that for the enthusiast in your life. And we're going to start right now with something that I think pretty much everyone's can be interested in. If you are, you know an employee, if you work at a company, and you use computers, there is a couple of words of caution here. In this segment, Now, first of all, the business computers are owned by the business. And that's kind of where this Bring Your Own Device thing has gotten everything a little bit fuzzy, you know, so if you are using your phone, for instance, your smartphone, and you're using it for work purposes, it's not the businesses phone. So there's not a whole lot that they can say about your phone and how you use your phone. However, the business has an absolute right to its data, and kinking troll, frankly, how you use your phone for the business data, right? Well, how about the computers that are actually owned by the computer? What can you do legally? And what can't you do? What can the business tell you that you should do with it and what can they not tell you what to do? Well, the bottom line is it depends. It depends on the business and what their policies are. So overall, that's kind of the first place you should check your employee handbook. Now we've provided a lot of businesses with employee handbook sections on this and you can certainly get them from your attorney from your corporate attorney, or from HR if you're an employee there. But if you're using a work-issued computer, now that includes a desktop computer includes a laptop, it's going to include things like iPads, even phones, you've probably checked your personal email on that device, you might have stored some files on there. You, you might have used it for a number of different things. Now in many cases, it's not a big deal as far as the company is concerned. You know, if you've got kids right to have a life outside the office, so for you to be able to send an email to the BBC. Or to make a few phone calls because babysitting didn't show up or a kid is sick or whatever. Most employers say that's absolutely fine if I died personally would not work for an employer. That said, That's not fine. I think that's a very, very big deal a very bad thing, the right companies that are like that. But when you start to store your private files on the company's computer, or maybe the company's Dropbox or Google Drive, or you are maybe going down a rabbit hole, as you started with something on Cora or you started with something somewhere else, and all of a sudden before you know it, it's an hour two hours later, or heaven for Ben, you are going to Facebook or some of these other sites to poke around. Then things change. Now many of us use messenger on Facebook in order to keep in contact with family and friends. So is it legit to have a messenger window open? Is it legit to do that, right? Well, the bottom line is you probably shouldn't do any of this on a computer provided by your employer. You're not necessarily breaking the law, but you could get fired if it's against your company's policies. And also, you need to remember that employers can install software to monitor what you do on your work-issued laptop or desktop. Now we do not monitor employees and what they're doing on a computer, except to watch for things that the employees might be doing that might harm the business directly. In other words, if an employee's bringing in a file from home, we're going to check that file. If they're downloading something from the internet. We're going to check that download. We're going to check their emails are going to clean them up, we're going to stop the ransomware we're going to stop the zero-day attacks that I talked about earlier. As well as all of the known types of vulnerabilities. But remember that not everybody is like us, right? We are not interested in getting involved in the businesses Workplace Relations, a lawsuit that a business might want to bring to against an employee, right? That's not what we do. Although we've certainly been pulled into those before in the past. And you need to keep that in mind as an employee because they can monitor what you do, they might put keyloggers on there to see what you're typing, they might have a software that takes a random screenshot. We've done that before with these workers that are doing a specific project. So we outsource something, there might be a graphic or might be writing an article or something, and we're paying by the hour for that contractor to do the work. So as part of the agreement, we have software that sits on the computer and randomly takes screenshots So we have an idea that yes, indeed, they are actually working on our stuff. And it took them five hours and we spent it to take one hour. And it's because they're slow, not because they were out wandering the internet and doing research on the party that's going to be coming up next week at the office or at their home, right. So be very careful about it. And the type of surveillance and security software that's installed on the company computer is usually based on two things, one, how large the company is, and what kind of resources they have to dedicate to watching you, and what type of information you deal within your role. Now, almost all of our clients in fact, now I think of it I think all of our clients are in what are called regulated industries. So if you're a car dealer, you're in a regulated industry, because you have payment card information, you have financing information on all kinds of personal information. So that has to be monitored, right? We have doctors' offices that have HIPAA requirements personal again, personally identifiable information, healthcare information. So security numbers, phone numbers, email addresses, and under the new regulations that are coming out right now, January one in California and Massachusetts in the European Union right now, and they are working on similar regulations on the federal level, even an email address is considered to be personally identifiable information. Until the list goes on and on if you have government contracts, we have clients that have DFARs or Defense Department requirements or FINRA, which is for financial organizations, right? That's what we do. So all of these heavily regulated businesses need to have software that is going to detect that someone is trying to exfiltrate data, shut it down immediately. We need to know that employees are trying to steal information. And in many of these cases, we will work with the company if there are lawsuits and ensue because of the regulation or because of other reasons out there. So if you're working with a company like this, which is frankly, in this day and age, every company, right, what, what employer does not have security numbers of employees? How do you pay them if you don't have the social security numbers, those are all falling under the regulations nowadays. And unfortunately, a lot of businesses don't pay attention to that. So a very small company, they're probably not doing this. But larger companies are definitely going to be doing this. And there's a great little quote here from Jesse crims. He's an Information Security Analyst over the New York Times and he said Without supporting evidence at this scale, at scale, it's pretty rare that people are not doing heavy surveillance and tends to generate a lot of useless data, roped employee into liability issues and generally make the team that monitors the surveillance systems miserable. In other words, you probably don't want to know. And that's the standard we take. We make sure that all of the regulations are complied with, but whether or not someone's sending an email to the babysitter or whatever, it's just not worth it. We're worried about espionage. Okay, so there you go. There are some tips for you. And using business security or using a business computer at work. Stick around. We'll be right back. We got some more stuff to talk about, including some major updates to the Google Chrome browser. Should you be using it anymore. We'll be right back. Craig Peterson Hello everybody, Craig Peterson here. Welcome back. We're listening Of course on WGAN or online at Craig Peterson dot com, you'll find me on pretty much every podcasting platform out there. And if you really enjoy the show, you know one of the best ways to let me know is to share it. I love to see all of the people who are listening and getting feedback from everybody so send me a note as well. But here's where you can go if you would like to give me a five-star review, just go to Craig Peterson comm slash iTunes. And right there, you can give me a five-star review. on Apple, they're still kind of the 800-pound gorilla in this space. Rumor has it that the next release of iOS is going to have some major improvement to this whole podcasting stuff. Apple really kind of started it with the iPod, which is where it got the name from. I still have one of my original iPods kicking around. It was frankly, it was my favorite device for listening to music. Anyhow, let's talk a little bit about some of the browser issues that are out there right now. Many people are concerned about the web browsers you're using. We know we're being monitored. We know we're being watched right now, by these big companies. Google makes its money by what? By selling our information. Facebook's the same way. Now Google is going to sell us advertising, and so is Facebook. And frankly, I would rather know about cars and see advertisements for cars. When it is the time I'm looking to buy a car right? And I'm never going to buy a lot of from Russia, right? So why would I want to see ads for that? So I am Pro, the monitoring in that space. Right. I, you know, you kind of go back and forth about that. You look at what President Obama's team did back when he was running for election the first time where they grabbed all of Facebook's data about everyone. And then they used highly targeted advertising. And then you saw what happened eight years later with President Trump and while the Cambridge Analytica scandal that was Child's Play compared to what President Obama's team did, but somehow President Obama's team didn't get in trouble for it. But President Trump's team certainly did even though Trump's don't get into that right now. But the browsers that we're using are tracking us. And remember, again, this old adage, it's old now, right? It's relatively new frankly. But if you do not pay for service, the odds are you are the product. And Google certainly considers that. And so does Facebook, that you are the product. So when you're looking at browsers, what should you be using the biggest browser out there right now the one that any software developers going to aim at is the Google Chrome browser. Because that's what most people use. It is really a great browser. From a functionality standpoint, people are using Google's Of course search engine, which has been very, very good here over the years. They, they've just done some wonderful things. And Google has added more and more features to their browser. Now, people ask me constantly, what is it that I use? What is it that I recommend? Well, I can tell you that Craig recommends that you don't use the Chrome browser when you can avoid it. Now I do use Chrome. When I am on a website, and I'm trying to do something and one of these other browsers doesn't work quite right. I go over to Chrome because it's not the worst thing in the world. It's not as though it has a direct backdoor into Russia, at least not that we're aware of, or into the CIA or the NSA. We know that Google doesn't like to cooperate with the US military, in some of its research projects, but Google also loves to cooperate with China and has three artificial intelligence labs in China. So it's giving China our next generation of computing technology for free but won't share it with our government. Yeah. Well, anyway, I guess I do get kind of political sometimes on the show. Google's Chrome version 79 just came up with a new feature. Now you know, when it comes to password, That I highly recommend you use some software called one password. They have some free stuff, they have some paid offerings. And what one password does is it keeps all of your passwords keeps them secure. You only have to remember one password, which is, frankly a huge win. And it was great in the business environment where you can set up vaults of passwords so that you know HR can have their own vault and this software development teams can all have their own vaults, and you can have your own personal vault, and it'll create passwords for you that are highly secure, that conform to the requirements for different websites and, and you can share them within vaults. There are just all kinds of wonderful things that you can do using one password. And then if you've been around a while, a couple of years ago, you know I offered a service that we were doing internally. We did this for free for over 1000 People, but we double-checked their password to see if not passwords but email address to see if their email addresses and passwords are out on the dark web. And you know, we checked it at least a month and generated reports for people. And that might be something we decided to do in the future. Well, there is a huge database out there that we've talked about on the show before. Google has now adopted in its Chrome browser. So Chrome 79 has what they're calling as a password checkup extension. So that was what how it all started. It was for desktop versions of Chrome, and it audited your passwords when you entered them, and took a look at them to see if those passwords were known to have been breached. Now, it's not necessarily that your account was breached, although it might have been it the password in the Heres why. Here's why they looked at the password itself. What the bad guys are doing nowadays is they are comparing your password against millions, hundreds of millions, in fact, billions of known passwords that people have used. And they start with the most common passwords and then work their way out from there. So if you're using a password that has been known to been breached in the past, it isn't something you should use. So I thought that was great. They had this password checkout extension. So now what they've done is they've integrated into every Google account and on-demand audit that you can run on all of your saved passwords. And in version 79. Google has a password checkout integrated into both the desktop and mobile versions of Chrome. So what will happen now is that if you are using Chrome to save your passwords, which I do not do as a rule, except for a few accounts I don't really care about because again, I'm using one password to keep my passwords and can keep them all straight? So it is built-in now. And anytime you enter in a password, it's going to check to see if that password has been breached anywhere online. Google is calling this private set intersection, which means you don't get to see Google's list of bad credentials. And Google doesn't get to learn your credentials. But the two can be compared four matches and basically what it's doing is it's doing mild encryption on your password and comparing it against this known setup password. So it's very, very good to do. One password has this feature already built-in password will warn you if I website that you're going to has been known to have been compromised. And Google's figuring here, that since it has a big encrypted database of all your passwords, I might as well compare against, compare them against this 4 billion strong public list of compromised usernames and passwords. They've been exposed in all kinds of security breaches over the years. And little on little later on today, we're going to talk about the top half dozen or so big security breaches, what caused them and then you might want to pay attention to to see if your information was exposed. But the main reason I like to talk about this stuff is so that you can look at your position, you know, at home or at work and ask yourself, hey, listen, there is this breach something that would have worked against us, right? I think it's very, very good. So Here we go. I'm not going to get any details here on what exactly what Google is doing and how they're doing it. If you are a chrome fan, you might want to use it. So let's talk about what the alternatives to Chrome or opera is a big one. And I have heard rumors that the Opera browser, which is kind of my primary browser, I have another one will tell you about in just a second, but opera very fast. It's designed to be secure. It also blocks a lot of spyware out there. Very good. But the rumors are that it is now in the hands of the Chinese government apparently owns it. I'm not sure that's entirely true. But, you know, it's up to you whether you want to take any risks. I'll tell you also about an extension I use in all of my browsers, which makes it much more secure much safer for me. We'll probably have to wait until after the top of the hour to get into that, but I'll tell about that. So what do I use the most? And what do I trust the most? Well, Netscape, the Netscape browser. Mozilla is the next one that I use opera is number one, at least for the time being. I use Firefox as well. Both of them do a lot of blocking, oh, I have a lot of privacy enhancements. Those are the two I use the most. And then I also use Apple Safari. Apple, again, is not selling your information as Google does. So it's considered to be a little bit safer. So far, we haven't known Apple to really leak information. They've been relatively safe, they certainly aren't selling it to anyone. And that's what I use. And then if I have to all fall back to Google Now, if I wanted to be extra safe online, there is another browser out there that I do like, and it's called epic EP, I see the epic browser. And it is actually based on Google's Chrome browser underneath the hood, just as Microsoft's browser is based on Google's Chrome browser. And Google is actually using a base form from Apple's Safari browser, which is kind of interesting. They all share code nowadays. But the epic browser is the browser if you absolutely want to keep your data safe. It even has a built-in privacy VPN. So check it out as well. When we come back, I'll give you a little clue here. A couple of tips on what you can do to keep every browser just a little bit safer. We'll get into some gift ideas and more. So stick around you're listening to Craig Peterson on WGAN and online at Craig Peterson dot com. Stick around. We'll be right back. Craig Peterson Hello, everybody, Craig Peterson here. Welcome back and listening to me on WG A in an online, Craig peterson.com. Hey, if you are a new listener, I just want to let you know a little bit about my background I've been helping to develop the internet, they in fact, just called a pie in the air you the other day, which is kind of interesting to think about. But yes, indeed, I designed and made some of the very first routers and some of the very first firewalls and load balancers and stuff back in the day. Let me tell you back in the day, we had to write these things from scratch because they just didn't exist as commercial products. And, you know, there's a lot of products I could have sold over the years but I'm just wasn't that kind of guy. Anyhow, so now I do a lot of cybersecurity for businesses, government agencies, most particularly really, for anybody in a regulated business, which today in this day and age means any business because we are all regulators I talked about in the last segment. Well, we have some gift ideas. And let me just start with one here. And then we'll get into some more articles from this week. We've we're going to be talking about the NSA here and what their top recommendation is for businesses. But you know, I am a techie guy, and I love tech and tech gifts and it's all just a pretty darn cool thing. When you get right down to it, just like, you know, I just love playing with this stuff. I guess that's the way to put it. And using it and making my life a little easier and faster, more efficient, effective, etc. But I want to talk about the high-end tech gifts that you might want to give, and you might want to give for yourself. In fact, that's exactly what I'm doing with one of these this year. Well, if you have somebody who's a gaming enthusiast, there are so many things out there that you can get for them. There's this one particular mouse that is very highly rated for gamers. It's called the razor Viper. It has some very, very fast, maneuverability stuff built in. Because of course, when you're playing some of these video games interactive, you need to be able to move very quickly so anyhow, we'll leave it at that because I am not a game type person. I used to play some, some games way back when you're in a dungeon with twisty mages, mazes, remember right how things started. But let's get into this. Now. This is one of the things I think would be a great gift for almost anyone, it's great for a computer that has the USBC which is the newest version of the USB cable. It is what the new Mac books come with the new max do as well. It's the next generation of the high-speed stuff that the last generation max had. But it also works with regular USB cable has a little adapter that you can use with it. It's called SanDisk extreme portable SSD. This thing is very, very nice. It's a good option for data you need to have with you wherever you go. It's surprisingly small. It is rated for the extremely high shock it's like 500 G's or something crazy like that. And it will withstand water and dust as well as vibration. You can drop it from six feet in the air without suffering any damage at all. This thing is amazing. And right now it is half price. Over on Amazon. Just look it up there. SanDisk is the name of the company S-A-N-D-I-S-K, it's their extreme portable SSD fits in the palm of your hand that you're going to love this. It's available in 250 gig 500 gig one terabyte and two terabytes now, I would not get the 250 gig, not that it's too small. But for an extra $10 you double your space up to 500 gig. Now when you go up to the one terabyte, which again is twice the space, it's twice the cost. So the one terabyte you're gonna have to ask yourself what makes sense and two terabyte options. But this thing is so fast, or what I love this for is to have different virtual machines on it. It's the one I use when I am doing a demo or for when I need to do a client-side install. I can have every version of Windows on my need to use Mac OS all the different versions of that a few versions of Linux all right there on the drive. It's very very convenient. And very, very fast you're going to love this thing. In fact, that's one of the fastest portable storage solutions that has ever been tested. It's kind of similar you know you can get Samsung T five SSD, they have very good SSDs. Okay, don't get me wrong here. The Samsung t five is more affordable but the SanDisk extreme SSD is better. Now I got to tell you that the cost right now on Amazon for this portable drive, there's no moving parts in it. As I said it fits in the palm of your hand. The cost on that is lower on Amazon right now. It's half price is lower than I can buy it from my distributors at So just to give you an idea of what a great value that is, coming up, we're going to talk about, I think the coolest gift you can give to somebody that is truly a hobbyist in the computer world, you're going to love it. And then if you are that person when you go to someone's house for Hanukkah, Thanksgiving, Christmas birthdays, whatever it is, and they say, hey, Craig, come over here for a second. my computer's not working right can you have a look at it will will tell you about the best gift for somebody like that and maybe some need to get get for yourself as well. So I'm going to talk right now about some of the biggest security breaches we'll go over one and then we'll get to some others little later on in this our last hour. And by the way, if you want to listen to the whole show, my podcast and everything. You can just go to Craig Peterson comm slash iTunes or slash tune in if you'd like to listen to it. On tune in or slash pretty much anything well actually if you type in slash pretty much everything you need an error page right? But you'll find me Craig Peters on on most of the major podcast sites that are out there by just going to Craig Peterson comm slash, whatever it is like Sasha Hart or slash SoundCloud or slash tune in, etc, etc. Well, data aggregators are big targets that are out there and who is a data aggregator? Well, let me tell you about what happened when I was at a wedding last week I was staying with my sister in law my wife and I, and there we got home and there was a card in the door and there's from an insurance company members like all state or something and, and it asked for one of my sisters in law, who had been living in that house to call so we thought okay, well, it's just a hoax thing. You know, they're they're trying to sell some insurance or something. So we just ignore that fact, I think we just threw the card in the trash. Well, the next night, we were sitting there at home and there's a knock at the door. And it's the same insurance agent. And she wants to talk to my deceased sister in law. And we get into this a little bit more and talking and talking to her trying to figure out what, what, what, why, what's going on. It turns out that someone was involved in a fatal car accident. And that person gave my deceased sister in-law's identity as her own. Yes, indeed, the dead are, quite frequently in fact, a victim of identity theft. Now we know about the dead voting right particularly in Chicago, and but in other places around the country. Well, in this case, apparently according to the report - she had been involved in a fatal car wreck about six months after she had died, and someone was dead. Obviously, this was a case of mistaken identity, but the insurance lady who's at the door, and she's obviously, some sort of an investigator used one of these skip trace databases in case you're not familiar with those. These are databases that are put together by data aggregators and data aggregators are these companies that suck up data from every public source they possibly can. And even some paid sources. And it includes records from credit card companies, and you name it, they pull it all together, they try and make heads or tails of it. So she had this report from a data aggregator and listed my long-deceased father in law's name is part of this and, and my kids, couple of my kids that had at one point staying for a visit with their grandmother, for a few months, while going to school, etc. and include my wife's name, my name just kind of went on and on. They got a lot of data wrong. And that's what I found to typically 25 to 50%, sometimes even more the data they have is incorrect. But enough of it was correct that she could kind of start piecing things together. And she was able to figure out that this was insurance fraud. Well, these data aggregators have massive databases as frankly, you might imagine. And they have these databases online. Yeah, you know where I'm going. This was a Mongo DB Mongo database, which is used, it's kind of it's called NO SEQUEL. It's an unformatted database. It's perfect for these data aggregators, and a company called verifications.io. That provided email verification services, had a Mongo database Continued over 800 million records publicly accessible to anyone in the world with an internet connection. And they had four sets of data. They'd had email addresses, dates of birth, phone numbers, physical addresses, employer information, IP addresses, business leads and other information. Not everything was sensitive. So when we get back we'll talk about what lessons should be learned what you can pick up from this a couple of tips for you. If you are a business person of any sort, or if you have data that might be in one of these databases, so we'll talk about these big verifications Mongo DB breach from this year and some more gift ideas right area listening to Craig Peters on online and here on WGAN terrestrial radio. Craig Peterson Hello everybody Greg Peterson back here on WG and online at Craig peterson.com. If you enjoy my show, by all means, make sure you subscribe to the podcast. Pretty much everything that I do goes up there my Wednesday mornings with Matt and can during their drive time show Wednesday morning that goes up there Other appearances go up there the whole radio show goes up there as well. Craig Peters on comm slash iTunes and do leave me a review if you wouldn't mind. You know those five-star reviews help get the message out. And we just passed another hundred thousand downloads, which is kind of cool. I appreciate it. Every one of you guys for listening. We try and get as much information as we can. So let's get back to our Well actually, you know There's something I forgot to button up from the last hour. Let's get to that. And then we'll get to some, some gifts and some more risks and what the NSA is saying right now, I had been talking earlier in the show about web browsers, and which browsers you should be using, which ones I recommend, then, you know, if you missed all of that, again, you will find it at Craig peterson.com, slash iTunes, you can listen to the whole thing right there. But I was talking a little bit about a plugin that I use. This is a plugin that works with pretty much any browser out there and works differently than any plugin that you might have been familiar with before. This is from the Electronic Frontier Foundation. Now I've had my disagreements with them in the past. Overall, I agree with a lot of what they're doing. But this is a plugin that goes into Chrome Opera or Firefox or pretty much anything that is called Privacy Badger Privacy Badger. So think about badgers if you know these things, they you'll find them a lot over in England, but they're over here too. They burrow underneath hedges and they like to live in the ground. And they are mean they will fight anything way bigger than they are. They don't care. They're going to win because they go all in. Well, that's what this is all about Privacy Badger. So I am on a website. Right now I'm looking at my browser and the Privacy Badger plugin, and it's got a nine on it right now. So what that means is that Privacy Badger detected nine potential trackers on this web page that I'm on right now. And it has sliders for them up there and it says you shouldn't need to adjust the sliders unless something is broken. So what Privacy Badger does is it watches you As you go to different websites, it looks at the cookies that are placed on your browser from these websites and determines, Hey, wait a minute. Now, this is a cross-site tracker. This is another type of tracker that we probably don't want to have. So it's showing them all to me. So here we go. Here's what I have right now on this website that I'm on. And the website is otter in case you don't use otter it is phenomenal transcription service, very inexpensive. 600 minutes for free every month. otter.ai but it turns out otter is using some tracker. So the first tracker showing me that Privacy Badger blocked is graph.facebook.com. So this is Facebook gathering data about me what I do where I go, the next one that's marked yellow, which is it has three different indications here on the slider. One is a blocks it entire The next one is that it could block cookies and then the far right one is to allow a domain to do it. So graph.facebook.com was blocked automatically static.facebook.com was allowed the regular facebook.com was allowed Google Analytics completely blocked API's Google com was allowed stripe checkout was allowed stripe as a payment service. JavaScript on stripe com was allowed and stripe network usually m dot means it's a mobile site. So that was blocked and Q dot stripe com was allowed but those are tagged the one these all of the ones I mentioned that were tagged, are considered to caution level. So by adding Privacy Badger as a plugin to any of your browsers Basically is going to stop sites from tracking you and it does a very good job. It learns as you go. It is not something that is prefixed with I'm going to block this site or that site. It is absolutely dynamic. I really, really like it. So check that out. This is kind of a flashback, as I said to an earlier segment where I was talking about which browser to use, what the considerations are. And this will work with any of them out there. So just do a search for Privacy Badger, it should come up near the top of your DuckDuckGo search. And it's five the Electronic Frontier Foundation e FF, check it out online. Okay, so now let's get into gifts again. I mentioned my top gift recommendation in the last segment. This one is for total geeks. Now we are using this for actually keeping timing tracking It's called raspberry pi. So we have a special card that goes along with this that has a GPS antenna attached to it and GPS readers so that we can track the satellites in the sky. We use the timing that they provide us with, we do some advertising. So that one of the things we do for our clients is we have to track their logs and keep real detailed records on their logs. We need to know exactly when Did something happen? So that if after the fact heaven forbid, someone gets in, some piece of malware gets in when did it come in? Where did it go? What did it do, right? Because you want to be able to know after the fact Well, what does it get access to? unlike so many of these companies that have no idea what they lost? In fact, most businesses don't even know until six months later that they were even the hack versus what the best in the biz are doing right now is about six hours, not just to detected but to remediation, which is where we sit well, usually within that six-hour time frame. Well, this is called a Raspberry Pi. And they've got the newest version of Raspberry Pi four. This is a small Linux computer. So if anybody that you know likes to hack together science projects or you know, do a little bit of experimenting, this is phenomenal, absolutely phenomenal. You can turn it into a retro game console, it'll play a lot of these old video games. A smart speaker that's a DIY thing. You can build it into your Legos to make a real fancy remote-controlled car. Anything your hobbyist mind comes into mind. This is phenomenal. You can for 100 less than 100 bucks, you can get a complete kit. Okay? The Raspberry Pi fours a lot faster and the older Raspberry Pi three Model B plus faster CPU you can put up to four gigs of ram in this thing. It is a phenomenal USB 3.0 port. So if you are or you know somebody that's really into DIY hobbies, this is the way to go. Okay? The Raspberry Pi four does get closer to your general and genuine desktop PC performance. But it's not really there yet. It's not one running Windows, it does run Linux, as I mentioned. And you can write basic programs for it, which is a programming language Python. If you have a kid that wants to learn Python, this might be a nice way for them to learn because they can kind of hack it together but it's just it's basically just a motherboard, you're gonna have to put it in a case by a case forward, you're gonna have to put a keyboard on it. A mouse, you have to put a display on it, okay, all kinds of stuff, but you can get just the basic Raspberry Pi four For someone that that really, really is a total hacker here, for like 4050 bucks, it's absolutely amazing. Okay, plenty of power for your money. Very versatile. In fact, it's more versatile in many ways than your Windows PC is. And for the budding engineer in your life, they will love you for it. So stick around, we're going to come back, I've got some more ideas for tech gifts that you might like. And we're going to talk about a couple more big hacks this year, and what it means to you. We've got third party security risks, the NSA has some advice for business and we'll tell you about that too. When we get back, you're listening to Craig Peterson right here on w GAN and online at Craig Peter song.com. That's Peterson with an O. Stick around because we'll be right back. Craig Peterson Hello, everybody, welcome back, Craig Peters on here on WGAN. And we're talking about stuff we usually talk about, you know, some of the security things, some of the latest technology that's out there. We're also doing a bit of a recap here some great gift ideas for the techie people in your life, even frankly, some of the non-techie people. And the security side, which is, I think, very important, can't talk enough about that. Because it could destroy your company, it could ruin that, frankly, the rest of your life could be a bit of misery, depending on what the bad guys do to you. Oh, it's absolutely crazy. told the story a little earlier of what happened with my deceased sister in law's identity, and how it was used in a fatal car accident and it's just it's amazing what some of these people are. Doing nowadays. And by the way, one of the most valuable segments of our population. We are know already about the retired people, the older people, right, who might be a little confused, hopefully, have some assets. But one of the most valuable identities out there online is that they have a child because their social security number and their identity are going to be very useful for at least a decade, if not longer because those kids probably not going to use it until they get their first job. So keep that in mind as well. Well, I want to get into these two things before the last half hour, so we'll cover these fairly quickly. But the big one, and that is waking up to third party security risks. Now one of the big attacks this year was Capital One and that's on my list of the ones I wanted to talk about today. They had personal information blog into overall hundred million US individuals and 6 million Canadian residents. Now, this was exposed. And when a former employee at Amazon Web Services inappropriately accessed the data, we could get into all of the real details behind this but the compromised information included names addresses, dates of birth, credit scores, payment history, contact information, and other information on people who had applied for Capital One credit card dating back to 2005. also exposed where the social security numbers of 140,000 individuals and bank account data blogging belonging to 80,000 secured credit card customers. So think about this for a little minute here. How many of us are using a service like Amazon Web Services, how many of us are relying on cloud services to keep our information safe? Right? Frankly, that's most of us, isn't it? And when you're talking about somebody like Amazon Web Services, or now there's Microsoft Azure, those are kind of the two really big players. IBM also has its cloud online that they sell access to. Most businesses look at it as a way to save money. Most businesses consider, hey, I don't need to keep track of the security, because my vendor is keeping track of it for me. And what we found out is, that's not true. So the lessons learned here. We'll start with that here from Capital One is that cloud service may be attractive because it's cheaper than doing it yourself. And that's particularly true, frankly, throughout the whole range, but it's particularly true for large businesses, but even for small business. businesses, can you really afford the right kind of server? Now I know a lot of small businesses go to the local staples store and buy a computer and call it a server, right? And maybe $800,000 later, they're out of there. Whereas a real server that's going to be really reliable is going to last years, you should be looking at more like 15 to $20,000 for. So businesses say, well, I'll just do it in the cloud. I'll use Amazon Web Services for this and we'll hire a consultant who's going to help us set it up. And we're going to use maybe Dropbox for that and maybe office 365 for this and now all of a sudden, I'm safe. Well, you're not. And companies, you guys are putting your data at risk, because you haven't adopted a security infrastructure, with the vigor that you need to apply. It should be at least as good as what You're using for your on-premise stuff. But you know what so many SMEs aren't even doing it right for on-premise stuff. Okay? So you're ending up with all of the financial cost of the penalties that you rack up, and the lawsuit and the cost of those lawsuits, which will vastly outweigh any it savings that you might have down the road. So keep that in mind. And that's what Capital One just learned this year. The Why? Because we're not taking third party security risk to heart Ponemon Institute did a study here 2018 founded 60% of customers surveyed, had suffered a data breach caused by third parties or vendors in the last 12 months. So what's causing it? Well, these applications are being built very different than they were a decade ago. They are online. They're using APIs. And they are not considering the security risks. So all services are connecting internally and externally via these APIs, popular finance websites load on your browser mobile apps, you can see the results. Dozens of third party services, okay, web apps, middleware, other code. This is a real problem. So, protect your own infrastructure, Step number one. Step number two demanded the others protect their infrastructure, okay. And trust yet verify. What we do is we wrap special security software around all of these third party infrastructure Software-as-a-Service sites that are out there, okay. So be very, very careful and you have to test even more for third party sites and you know, businesses just aren't testing as much as they should. So there you go. There's a couple of tips here three tips on what to do. When you are talking about third party security risk, and that is with all of these guys, Okay, number one, make sure your infrastructure is protected that you have the right kinds of firewalls and you have the right kind of malware treatment that's in place. All the other security controls, make sure they're configured right? If you're using something like Amazon Web Services, or Sure, or office 365, make sure you have the right settings. You know, it's difficult I get it, Microsoft has over 10,000 skews 10,000 products that are available in they're all software and services. There are dozens and dozens just for office 365 based systems. So make sure you have the right stuff. Make sure that they have proper compliance and certifications. And remember too that the certifications they have just represented a point in time. Do they still have the right kind of security? And because we are running our technology in this new type of infrastructure, make sure, frankly, that we keep track of everything because a breach can happen quickly do millions of dollars of damages right away. And 20% of businesses will file for bankruptcy the very next day. All right, well, let's talk about another gift here real quick before we go to a quick break. And this is for those of us that we go to a family event, and we go anywhere, and it's a Craig come over here for a minute, I need some help and you go over there and of course, it's questions and problems about their computers. So here's what I recommend. Get that person in your life if they're fixing the computer for that for you. I fix it. Great site painting Go online to find out how to fix physical problems. But they have something called the I fix it pro tech tool kit. I have one of these my kids have one of these. My technicians in my business have one of these. It's a 64-bit driver set that has all these weird types of sockets and everything on them. Because these parts and the computers that have the special locking screws and everything else, you need this Okay, the I fix it pro tech tool kit. Stick around. We'll be back with a wrap up for today's show. And we'll talk a little bit more about some gifts right here. You're listening to Craig Peterson on w GN. And the course online Craig Peterson calm. Stick around because we'll be right back. Craig Peterson Hello everybody Craig Peterson here WGAN and online at, of course, Craig Peterson dot com. Hope you've enjoyed the show today we have covered a lot of different things we talked about third party security risks for businesses which web browser you should be using. If you want to keep safe and some of the updates that Chrome has from Google, they'll keep you safer online. What not to do on your work computer. Why it's still too early to buy a 5g phone and signature antivirus and how it is at best catching 50% of the malware out there. It's getting really, really bad. And we've talked a little bit about some of the top breaches this year and there are some pretty scary Ones out there. But how does it apply to you? And how does it apply to your business as well? And we got one more that was brought up on the website at Craig Peterson calm, you can see all of these up there, a little bit of mind commentary and links to other articles online. But this is about the NSA and what the NSA, the National Security Agency is saying that we should be doing as businesses, but this applies 100% as well, to you as an individual. And the basics are to focus on your assets. And this is a very, very big deal. W
An increasing number of employers are allowing their employees to use their own personal mobile devices for work purposes, a trend known as BYOD. In fact, as many as 80 percent of smartphones used for work are reportedly employee-owned. But this increased usage of personal devices also brings with it some potential pitfalls for employers. Despite the many risks of BYOD, there are some smart security measures employers can take to minimize liability and that there are even some benefits for employers that institute a strong policy. In this episode HR expert Jenni Stone provides several tips your organization can put into practice. Thank you for listening to this podcast. We will continue to keep you updated on the changing landscape of Human Resources and address any topic area you wish to learn more about regarding HR and HR Compliance. Please leave a comment below as we value your feedback or if you have an HR question ask and we just might make your question our next podcast! Follow HR Shield Online Here: YouTube: http://youtube.com/TheHRShield Instagram: http://instagram.com/HRShield Facebook: http://facebook.com/HRShield Twitter: http://twitter.com/HR_Shield Podcast: http://hrrescue.libsyn.com Website: http://HR-Shield.com Enable our Alexa Skill!!! About HR Shield Do you own a small business? Are you considering starting a business? Does hiring an HR professional not fit your budget and current cash flow? Whether you are a newly certified HR professional, business owner, office manager, student or a general curious person HR Shield are certified HR specialists that provide quick, accurate and simple answers to common HR and business questions. Our mission at HR Shield is to impact those small and midsize companies that don’t yet understand the value or can’t yet afford to hire a full-time certified HR professional. Our goal is to educate the small business owner and help them understand the importance and impact an HR professional can have on their company and one day hire a full time certified professional. In addition to working with the small to mid-size business owner we provide a full white label HR portal and HR hotline for payroll companies, PEOs and staffing companies and support their small business owner clients.
Bring Your Own Device (or "BYOD") presents serious scope and security problems for managed services providers. Your agreement probably doesn't properly limit your company's liability for BYOD-related issues...but it will after you tune in to this week's Bradcast. Listen up. Music: "Werq" Kevin MacLeod (incompetech.com)Licensed under Creative Commons: By Attribution 3.0 License
Introduction [00:45]Ken Faulkner and Katarina Krosback explore the potential benefits and pitfalls of Bring Your Own Device (BYOD) in eCOA clinical trials, as well as the current regulatory perspective. In this episode we discuss the future hold of BYOD, the value of patients using their own devices and the technology needed for BYOD trials.What does “BYOD” mean in the context of a clinical trial? [03:33]In BYOD, or bring your own device, the patient uses their own cell phone to complete their reports. This simplifies the process for patients, who are already very familiar with using their cell phones to complete a number of tasks, and makes it easier for them to remember to participate. BYOD has not yet extended to devices other than cell phones.What are the benefits of a BYOD trial? [05:05]There are two main benefits of BYOD: familiarity and simplicity. Because patients are already familiar with the device and carry it around constantly, it’s much easier to encourage them to be compliant. BYOD is typically app-based, something most patients will know how to navigate.What are some of the potential pitfalls of BYOD?[6:22]It’s important to note that there are many factors that need to be considered in order to successfully implement BYOD, including complexity, frequency of recordings, data volume, and patient location. These factors, and others, can have a large impact on a study’s budget. Additionally, sponsors should have a back-up phone provision plan in case patients don’t want to use their own devices.Has the volume of phone options available been a pitfall in implementing BYOD?[09:24]Although there are a number of devices available on the market, most patients generally have one of a few different types of phones and/or software. This has made implementing BYOD a simpler process. However, the app’s compatibility with a number of systems should be assessed before moving ahead with BYOD in a study.What’s the currently regulatory perspective on BYOD?[10:21]Because BYOD is a fairly new concept, regulatory bodies have not yet formed a final opinion on its use in clinical trials. However, regardless of what device is used or how data is collected, a trial that uses BYOD must also adhere to all existing regulations, just like any other trial. Experts anticipate that there may be more regulatory oversight on BYOD in studies where PROs are a primary efficacy endpoint.What impact will BYOD have on the industry?[11:29]BYOD is not a shortcut, but rather a simpler approach to collecting data in a trial. Sponsors and study teams will still need to follow their typical set-up and training processes. Industry-wide discussions will need to take place, however, in order to address BYOD’s impact.What’s the future of BYOD?[12:54]BYOD is here to stay, but it should only be implemented in a trial after the cost and benefit aspects have been evaluated. Sponsors need to ensure that they’re choosing the right trials in order to use BYOD effectively. Advances in technology may also make BYOD more effective in the future. An ongoing dialogue with regulatory bodies as these changes unfold will be necessary.
Bref aperçu des aspects légaux du BYOD (Bring Your Own Device). Il s’agit d’une pratique qui consiste à utiliser ses équipements personnels (téléphone, ordinateur portable, tablette électronique) dans un contexte professionnel. Le BYOD engendre par essence une intrusion réciproque dans les univers personnels et professionnels qui peut se définir ainsi : l’utilisation dûment autorisée et réglementée octroyée à certains utilisateurs du système d’information de l’entreprise liés à celle-ci par un contrat de travail de recourir à leurs matériels personnels à des fins professionnelles. Il en résulte évidemment des problèmes légaux en termes de protection des données, de droit du travail, de droit pénal et de droit de propriété intellectuelle. https://lexing.ch/wp-content/uploads/2017/10/22.pdf
Tem um termo em inglês chamado “BYOD”, ou Bring Your Own Device. Que significa que o gestor vai utilizar o equipamento do funcionário para instalar um aplicativo de uso corporativo. Essa prática é muito normal, mas é preciso ter algumas regras. Principalmente aqui no Brasil nós precisamos nos atentar a algumas coisas que eu vou […] O post A empresa pode instalar um aplicativo corporativo no celular do funcionário? apareceu primeiro em Contele Gestor de Equipes.
This week’s episode brought to you by Sidekick Media Services, Slice on Broadway, and Alex Kahrs Design & Media! Bobby Cherry joins us in studio with Sorg, while Chilla checks in from Studio C to talk this week in tech news, including: Sorg is sharing his experiences filming SAE's AutoDrive as his Awesome Thing of the Week. Chilla is sharing his Surface headphones as his Awesome Thing of the Week. Bobby is sharing the bring-your-own-device (BYOD) policy as his Awesome Thing of the Week. We're talking about an update in iMovie to include green screen capabilities and picture-in-picture. We're checking out some updates on Be My Eyes (which we checked out a little bit ago). Chilla is talking some cloud with iCloud and xCloud updates. Amazon is building scale models to help train their little drones learn. After the show remember to: Want to support our friends at Postindustrial? Check out their Kickstarter. Eat at Slice on Broadway (@Pgh_Slice) if you are in the Pittsburgh area! It is Awesome! (sliceonbroadway.com) Want to be part of our studio audience? Hit us up at awesomecast@sorgatronmedia.com and we’ll save you a seat! Join our AwesomeCast Facebook Group to see what we’re sharing and to join the discussion! Follow these awesome people on Twitter: Bobby Cherry (@GoBobbo), John Chichilla (@chilla), and Mike Sorg (@Sorgatron) Have you seen our AwesomeTips videos? You can support the show at Patreon.com/awesomecast! Remember to check out our friends at the River’s Edge (@RiversEdgePGH) and The 405 Media (@The405Radio) who replay the show on their stream throughout the week! Also, check out sorgatronmedia.com and awesomecast.com for more entertainment; and view us livestreaming Tuesdays around 7:00 PM EST
This week’s episode brought to you by Sidekick Media Services, Slice on Broadway, and Alex Kahrs Design & Media! Bobby Cherry joins us in studio with Sorg, while Chilla checks in from Studio C to talk this week in tech news, including: Sorg is sharing his experiences filming SAE's AutoDrive as his Awesome Thing of the Week. Chilla is sharing his Surface headphones as his Awesome Thing of the Week. Bobby is sharing the bring-your-own-device (BYOD) policy as his Awesome Thing of the Week. We're talking about an update in iMovie to include green screen capabilities and picture-in-picture. We're checking out some updates on Be My Eyes (which we checked out a little bit ago). Chilla is talking some cloud with iCloud and xCloud updates. Amazon is building scale models to help train their little drones learn. After the show remember to: Want to support our friends at Postindustrial? Check out their Kickstarter. Eat at Slice on Broadway (@Pgh_Slice) if you are in the Pittsburgh area! It is Awesome! (sliceonbroadway.com) Want to be part of our studio audience? Hit us up at awesomecast@sorgatronmedia.com and we’ll save you a seat! Join our AwesomeCast Facebook Group to see what we’re sharing and to join the discussion! Follow these awesome people on Twitter: Bobby Cherry (@GoBobbo), John Chichilla (@chilla), and Mike Sorg (@Sorgatron) Have you seen our AwesomeTips videos? You can support the show at Patreon.com/awesomecast! Remember to check out our friends at the River’s Edge (@RiversEdgePGH) and The 405 Media (@The405Radio) who replay the show on their stream throughout the week! Also, check out sorgatronmedia.com and awesomecast.com for more entertainment; and view us livestreaming Tuesdays around 7:00 PM EST
On today’s show, host Chris Gorog sits down with Michael Parker, Chief Marketing Coordinator for Armis Security. Michael is one of the few marketing professionals we’ve had on the show, and brings a perspective we don’t often hear. He helps walk us through the advancements of technology in the workplace and how Cyber Security is a must in trying to help protect your business devices. If you have a BYOD environment at your workplace, you’ll want to hear this. He also talks about the rise and future of IOT and how much value (and risks) it can bring with it in a business setting. Michael tells us where he expects the industry to head and walks us through the precautions one must think about before deciding to connect your equipment to the internet. Visit our sponsors: Cyber Resilience Institute Internet Broadcasting Network Logic Central Online SecureSet Academy Murray Security Services
Rob, Scott, and Jason discuss using a personal device in the workplace; from employer cost savings and increased functionality to mobile device policies, protecting client sensitive information, removing data due to theft or termination, and more.
Elisabetta Nanni, l'ospite della puntata, grazie alla lunga esperienza al servizio dell'Innovazione Didattica, ci parlerà di come aggiungere degli elementi d'innovazione all'Educazione Musicale, stimolando la creatività degli studenti e sfruttando il Bring Your Own Device. ****** Music by: square3 by airtone (c) copyright 2013 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. dig.ccmixter.org/files/airtone/43950 Ft: kara square seachange by airtone (c) copyright 2016 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. dig.ccmixter.org/files/airtone/53762 snowdaze by airtone (c) copyright 2015 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. dig.ccmixter.org/files/airtone/48787 Ft: jeris leaves by airtone (c) copyright 2011 Licensed under a Creative Commons Attribution Noncommercial (3.0) license. dig.ccmixter.org/files/airtone/34427 Ft: Vidian
In this episode: Ben Soulier and Mark Evans of Alpin (https://alpin.io/) are our feature guests this week, plus learn about the new Northern Colorado ISSA Chapter. News from: Maxar, WOW!, Ping Identity, Webroot, SecureSet, Coalfire, VirtualArmour and a lot more! Why yes, I do have a huge brain I know, I know. You thought I just had a huge head - but this research says it’s actually because of how big my brain is. But am I smart enough to retire in Colorado? Our new state CIO is ready to delight us. Maxar gets some bad news. WOW! delivers some bad news to some workers. Ping Identity releases new research. Webroot talks wearables. SecureSet says everyone can do security. Coalfire talks CCPA. And VirtualArmour talks BYOD. Follow ISSA Northern Colorado: https://twitter.com/NOCOISSA https://www.facebook.com/NOCOISSA https://www.linkedin.com/company/nocoissa/ Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week’s news: Join the Colorado = Security Slack channel Colorado wields most brain power west of Mississippi, ranking says Colorado named 3rd best state for retirement New Colorado CIO wants to deliver 'customer delight' to state workers and residents Westminster-based Maxar's shares plummet after satellite failure Denver-area cable company (WOW) laying off more than 200 employees Security Concerns are Preventing Cloud and SaaS Adoption, According to Latest Ping Identity Survey Webroot blog - Smart Wearables: Convenience vs. Security SecureSet blog - Not sure if you can ‘hack it’ as a cybersecurity professional? Coalfire Blog - California Consumer Privacy Act Will It Apply To Your Organization? Keeping Your Network Secure in a "Bring Your Own Device" World | VirtualArmour Job Openings: Ping Identity - Manager of Security Operations and Engineering Ping Identity - GRC Analyst Janus Henderson - Head of Technology & SOX Audit CoBank - Senior Security Analyst PENSCO Trust Company - Sr Information Security Program Manager GB Protect - Senior Security Consultant Bellco Credit Union - OTS Information Security Intern University of Denver - Professor (Open Rank), Cyber-Physical Systems and Cybersecurity - Daniel Felix Ritchie School of Engineering and Computer Science (005796) State of Colorado - DORA: Division of Banking - Financial / Credit Examiner IV Zvelo - VP, DevOps Upcoming Events: This Week and Next: GDPR Meetup - Data Privacy Day - Privacy Trends for 2019 - 1/28 SecureSet - Capture the Flag - 1/30 COLORADO SPRINGS CYBERSECURITY “FIRST FRIDAY” SOCIAL & MIXER - 2/1 DC Fly-In - 2/4-6 CTA - SheTech - 2/8 Other Notable Upcoming Events SnowFROC - 3/14 Rocky Mountain Information Security Conference (RMISC) - 6/4-6 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
I first met Matt through him appearing on the ‘Bring Your Own Device‘ podcast last year, and since then we started talking about Apple Watch, and inevitably the iPad. He’s been writing and podcasting for a few years now from his BirchTree site, but only in the last 18 months his great work is just …
I first met Matt through him appearing on the ‘Bring Your Own Device‘ podcast last year, and since then we started talking about Apple Watch, and inevitably the iPad. He’s been writing and podcasting for a few years now from his BirchTree site, but only in the last 18 months his great work is just …
Bringing your home computer to work seemed redundant for years, until infrastructure and hardware got advanced enough to handle Bring-Your-Own-Device work spaces. Colin Birney, Principal Consultant for Birney Consulting, gives his thoughts on the shift toward BYOD environments and how the Pro AV industry is adapting to survive. For more information on Birney Consulting log on to http://www.birneyconsulting.com/ For the latest news, videos, and podcasts in the Pro AV Industry, be sure to subscribe to our industry publication. Follow us on social media for the latest updates in B2B! Twitter – twitter.com/marketscale Facebook – facebook.com/marketscale LinkedIn – linkedin.com/company/marketscale
Today I am joined by special guest, Jean-Yves Lauture, CTO for EOS Positioning Systems. We talk about a huge shift in collecting high accuracy data using GPS and GNSS receivers. Today we can collect better data at a lower cost which enables new forms of geospatial visualization. Show Notes GPS vs. GNSS - What’s the difference? ‘Bring Your Own Device’ is changing how we work. Saving Money Opening opportunities to more users. Modular and upgradeable. Collect data directly into our GIS with apps. City of Montreal Emerald Ash Borer Project Different GNSS receivers and their accuracy. Consumer grade, Submeter and Centimeter RTK and Base Stations Digital Twin: New kinds of GIS unlocked with high accuracy. Drone Imagery 3D Elevations Augmented Reality EOS Learning Center about GNSS kurt@speakingofgis.com @SpeakingofGIS
Polizeibericht zum ersten Todesfall mit autonomem Auto Ein Roboterwagen von Uber hat in den USA eine Fußgängerin getötet. Da dieser Unfall den Weg der Autobranche zu selbstfahrenden Autos stark beeinflussen könnte, wird er nun von mehreren US-Behörden untersucht. Laut Polizeibericht ging die 49-jährige außerhalb eines Fußgängerübergangs über die Fahrbahn und schob ein Fahrrad neben sich. Das Video einer Kamera des Uber-Wagens zeige, dass die Frau direkt aus dem Schatten auf die Fahrbahn getreten sei. "Es ist klar, dass dieser Zusammenstoß in jedem Modus, ob autonom oder manuell, schwer zu verhindern gewesen wäre", so die Polizeichefin. Uber stoppte vorläufig alle Testfahrten mit selbstfahrenden Autos. Digitale Bildung: Kritik an Bring Your Own Device Der verzögerte Digitalpakt für Schulen ist nur ein Tropfen auf den heißen Stein. Bildungspolitiker schier aller Bundestagsfraktionen waren sich auf der Bildungskonferenz des Digitalverbands Bitkom einig, dass es mit den von Schwarz-Rot vorgesehenen 3,5 Milliarden Euro bis 2021 nicht getan sei. Über Parteigrenzen hinweg sprachen sie sich auch gegen die "Bring Your Own Device"-Linie von Bund und Ländern aus. Dabei hätten alle das Nachsehen, die kein Tablet zuhause hätten. Neuer Aboservice DeepL Pro für Profi-Übersetzer, Firmen und Entwickler Lange Zeit waren Google und Microsoft führend bei Übersetzungen im Internet. Dann ging vergangenes Jahr DeepL online, das Übersetzungssystem eines Start-ups aus Köln. Anders als der Google-Übersetzer basiert DeepL auf Convolutional Networks, die alle Wörter parallel verarbeiten und normalerweise bei der Bilderkennung zum Einsatz kommen. DeepL liefert Texte, die viel natürlicher klingen als die der Konkurrenz. Der neue kostenpflichtige Aboservice DeepL Pro bietet eine Programmierschnittstelle, ein Software-Plugin sowie einen erweiterten Web-Dienst. Keine Batterie, kein Netzteil: Mini-Roboter kriecht, wenn's feucht ist Der Hygrobot, ein kleiner Roboter aus Südkorea, bewegt sich selbstständig fort, sobald es in seiner Umgebung feucht ist. Vorbild für die Hygrobots sind Pflanzen, die ebenfalls nur Feuchtigkeit aus der Luft für Bewegungen nutzen. So schließen sich etwa Tannenzapfen, wenn Regen naht. Ein Einsatzgebiet der Hygrobots könnte die Medizin sein, wenn sie auf feuchter Haut Medikamente verteilen. Diese und alle weitere aktuellen Nachrichten finden sie auf heise.de
First up on today's news show, the FCA bans BYOD (https://fintechinsidernews.com/posts/D7tDghZ69SqA2xMBN/fca-gold-plates-eu-rule-bans-byod-across-entire-uk-finance) (Bring Your Own Device) across the the entire UK finance sector. Whilst regulation is on the tip of everyone's tongue, cryptocurrencies managed to sneak their way onto the show once more as Kodak launched KODAKcoin (https://fintechinsidernews.com/posts/B2tSHmFbx3YHb6tSX/kodak-stock-is-up-44-after-announcing-it-s-launching-a), boosting stock prices an outrageous 44%. From one major announcement to another, tech giant Tencent (https://fintechinsidernews.com/posts/oPsSvRyCDwzQqed3j/tencent-gets-a-licence-to-sell-mutual-funds-to-wechat-s-1) gets a licence to sell mutual funds to WeChat's 1 billion users in China. Moving on, TransferWise is quietly launching its "borderless" debit cards (https://fintechinsidernews.com/posts/FEwBEEzAbDxAsnD5z/transferwise-launches-borderless-accounts-and-debit-card) to 1,000 customers, with a full rollout coming later in the year. We discuss what the future of borderless payments could look like and how this brings the company in closer competition with Revolut. Our next story comes from a report written by FleishmanHillard named 'The Fads, The Fears and the Future' (https://fintechinsidernews.com/posts/E5eDSCuzDA3rHXpAu/fintech-in-2018-the-fads-the-fears-and-the-future) which details the most overhyped technologies and trends in 2017. Simon Taylor interviews Claudia Bate the author, where they discuss the report at length including the methodology behind the statistics and upcoming regulation. Our last episode was named 'Tis The Season of Open Banking and the subject just won't go away. The Guardian published an article which asks whether open banking is a 'radical shake-up, or threat to your private data?' (https://fintechinsidernews.com/posts/zh28p8aPstBsJBGdL/open-banking-radical-shake-up-or-a-threat-to-your-private) and our panel explore this at length. Do people know where their data is going? Our panel explore whether or not consumers actually need to know how their data is being used so long as it creates a better product for them. Next, we discuss Brexit's impact (https://fintechinsidernews.com/posts/znFHkNdZZf66RdfXB/brexit-impact-on-venture-capital-investment-into-uk-fintechs) on the Fintech space and whether or not cynics have been proven wrong. Uncertainty has been prevalent over Brexit particularly in finance and this is something dissected during this episode. Software-only Wealthfront (https://fintechinsidernews.com/posts/Rt4jmRfzbwRg7XQN8/software-only-wealthfront-raises-usd75-million) were also in the news as they raised $75 million as they aim to target millennials. We discuss who the term 'millennial' refers to and also what the traditional demographic usually is. We break down 'Meltdown and Spectre' (https://fintechinsidernews.com/posts/snpu9SKWXHQspERkj/what-bankers-need-to-know-about-meltdown-spectre-chip-flaws) (scary headline for a financial services story), a bug that could be used to compromise computer chips creating security vulnerabilities, what is being done to fix it and how it could impact legacy systems. On the brighter side of things, more than £300m of 'forgotten' money (https://fintechinsidernews.com/posts/RvnKnepuqHJ59qrSy/more-than-gbp300m-of-forgotten-money-to-be-stripped-from) is to be stripped from bank accounts and given to charities and people in debt instead. Robin Hood springs to mind and the team details whether or not this is the right way of dealing with the dormant money. Finally, 'fake cannabis' (https://fintechinsidernews.com/posts/RbqCqs6BQSyKcyA5k/fintech-and-fake-cannabis-drive-record-number-of-swiss-start) drives record number of Swiss start-ups. Are we moving from 'Cash & Cocaine' to 'Bitcoin & Weed'? We hope you enjoy the show - spread the word, tell your friends and don't forget to leave us a review on iTunes. If you want to get in touch, drop us a line at podcasts@11fs.com or on Twitter @FintechInsiders and follow us on Facebook. Special Guests: Charlie Wood, Pete Townsend, and Sarah Kocianski.
The Marine Corps has been talking about implementing a Bring-Your-Own-Device strategy for at least three years, as one way to speed up its adoption of commercial smartphone technology. But the services CIO says the goal is still a long way off. As Federal News Radio's Jared Serbu tells Federal Drive with Tom Temin, the Marines are still struggling to onboard mobile devices owned by the government.
Emnet børn og mobiltelefoner har længe bragt sindene i kog. For nyligt begyndte skoler i hobetal at udelukke mobilen fra deres klasselokaler, og skabte for alvor fornyet fokus på vores teknologi i skoleregi. Er forbud egentlig en god løsning, og hvem har ansvaret? Derudover tager vi, som ‘Sidespor’, den nye persondatalov op til debat. En lov, som syntes at være strøget lige forbi os, og som fremadrettet får direkte konsekvenser for vores børn og deres data. Se episodens show notes på alphabolgen.dk
Shownotes * Demokratietag NRW: http://www.demokratietag.net/nrw/#barcamp * 10 Jahre BYOD im DGB Tagungszentrum: https://www.youtube.com/watch?v=ONSFpcBp9UE * Der erste Laptop von Felix: http://lowendmac.com/1993/powerbook-165c/ * 100 Tage IG BCE: http://www.die-ersten-100-tage.de/ * iPhone 6 Einschränkungscode per brute force hacken: http://techmixx.de/iphone-einschraenkungscode-vergessen/ * Tools 10 Jahre zurück https://twitter.com/ValaAfshar/status/808429728386392064 * Wir das Smartphone das Netz popularisierte https://twitter.com/martinlindner/status/798643522559614976 * T-Rex mit Lego Mindstorms https://www.lego.com/de-de/mindstorms * T-Rex in Aktion https://www.youtube.com/watch?v=rgTDLO8i8cQ * Seminar zu Algorithmenethik https://www.forum-politische-bildung.de/big * Castro: http://supertop.co/castro/ * Phyphox: http://phyphox.org/de/home-de/ * Scanner Pro: https://readdle.com/products/scannerpro * Timepage von Moleskine: http://www.moleskine.com/microsites/apps/timepage * Tweets von Überwachungskameras (@FFD8FFDB) – Twitter: https://mobile.twitter.com/FFD8FFDB * LaterPay bei SPIEGEL Online umgehen – Dbof's Blog: http://davidebove.com/blog/2016/07/18/laterpay-bei-spiegel-online-umgehen/ * DeBeKa Rechnungs-App: https://www.debeka.de/service/app/leistungs-app/index.html
How granular can mobile application management be? Richard talks to Mike Crowley about the Microsoft Enterprise Mobility Suite, and it's ability to allow Bring-Your-Own-Device to work effectively without taking over the device. Mike focuses in on three key aspects in the suite, starting with identity - being able to identify users through Azure Active Directory. From there, the next aspect is application management, controlling what capabilities certain applications have on the device. And finally, there is document rights management so that you can protect docs on the device. This works, check it out!
TechLaw10 hosts Jonathan Armstrong and Eric Sinrod discuss legal issues related to information technology. In this episode, Jonathan and Eric discuss BYOD (bring your own device) and the Anthony Weiner scandal.
Michelle Perez of TheBYODClassroom has a Bachelors in Science Education for Biology and a Bachelors in Psychology from UCF. TheBYODClassroom (which stands for Bring Your Own Device,) provides products and services that help teachers effectively use technology in their classroom to assist students through the learning process. In this episode we discuss using doubt to push forward toward your dreams, as well as how to overcome your doubts and fears during the planning or pre-launch phase of your business. Shownotes:
3 Things to Consider Before Jumping Into BYODYou’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
3 Things to Consider Before Jumping Into BYODYou’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
Mark Williamson of CISCO joins Gain Your Edge to talk about the "Bring Your Own Device" phenomenon. Mark referenced the following articles during our podcast and here they are, for your reading pleasure: Bring Your Own Dollars, Information Week 5 reasons why BYOD survived 2014 and will prosper in 2015, Tech Republic BYOD Assessment from Frontier Communications, frontiercanhelp.com More details: Host: Skip Lineberg Subscribe via iTunes Send your feedback, comments and questions to BusinessEdge@Frontier.com.
Connected Futures: A Cisco podcast exploring business innovation insights
There's an influx of conversation focused on Bring Your Own Device, the consumerization of IT and how organizations can cope in today’s multi-device environment. With this in mind, how can mobility be addressed at an infrastructure level to tackle challenges and enable opportunities for organizations and employees? In this podcast, Cisco's Chris Spain and Craig Mathias, Principal at the Farpoint Group discuss why organizations should future-proof their mobility strategy through an infrastructure-centric approach. Be sure to join the conversation, #FutureOfIT.
IT Best Practices: Episode 92 – Intel has a Bring Your Own Device program for employees that has been very popular – so popular, in fact, that by the end of 2011 there were 6000 employees bringing their Android devices to work. But Intel IT faced limitations on the types of solutions they could provide […]
TechLaw10 hosts Jonathan Armstrong and Eric Sinrod discuss legal issues related to information technology. In this episode, Jonathan and Eric discuss the hacking of several female celebrities' online photo repositories and the online posting of intimate photos.
“The two basic processes of education are knowing and valuing.” -Robert J. Havighurst StubHub Hit in Cyber-Attack That May Have Stolen $10M in Tickets http://www.securityweek.com/stubhub-hit-cyber-attack-may-have-stolen-10m-tickets http://www.scmagazine.com/six-charged-in-global-stubhub-scheme-company-defrauded-out-of-1-million/article/362482/ C-IT Recommendation Ensure your organization has a security awareness program that educates users on basic security practices including not utilizing the same passwords on multiple systems. Ensure your systems […]
TechLaw10 hosts Jonathan Armstrong and Eric Sinrod discuss legal issues related to information technology. In this episode, Jonathan and Eric discuss the legal and data security implications of when employees do work on their personal devices outside of the office.
http://traffic.libsyn.com/remarkablechatter/jttg_9.mp3 Brad Buscher Technology Systems Supervisor at Cheney USD 268, Kansas and Independant Zija Distributor shares how talk BYOD to school.[...] The post BYOD – Bring Your Own Device (Jerry The Tech Guy #9) appeared first on Remarkable Chatter.
What does BYOD look like across different learning environments? Why is BYOD important for teaching and learning? What are the challenges in implementing and managing BYOD initiatives? What does the future of BYOD look like? The term BYOD, which stands for "Bring Your Own Device," refers to the practice of people -- be they students, faculty, staff, or patrons -- bringing their own laptops, tablets, smartphones, or other mobile devices with them to the learning environment.
Richard talks to Martin Booth from Microsoft about their vision of the People-Centric IT. A cornerstone of this vision is unified device management, covering desktops, laptops, tablets and phones across all platforms. Martin digs into how tools like Intune, Configuration Manager and Window Server 2012 R2 work together to be able to deal with Bring Your Own Device, effective Information Security and data sharing. The conversation gets beyond the devices and into the diversity of services such as multi-part authentication, file sharing and computing. A great set of thoughts to end the year! Merry Christmas!
Classroom 2.0 LIVE webinar, Oct. 26, 2013, Featured Teacher-Linda Rood. Linda shared some of the creative projects her students have done and ways she has incorporated technology into their daily learning experiences through iPad apps and tools such as Kidblog, Edmodo, Spelling City and BrainPop. Linda is an exemplary 2/3 combo grade teacher and also a tech coordinator at Melinda Heights Elementary School, Saddleback Valley Unified School District, Mission Viejo, CA. She was instrumental in starting the Bring Your Own Device program at her school and after winning a grant, she implemented an iPad program into her classroom. Among other things, her students have created iBooks and videos that showcase learning. She was also District Teacher of the Year 2012, is a Smart Exemplary Educator, and a Discovery DEN STAR.
Classroom 2.0 LIVE webinar, October 26, 2013. Linda Rood-Featured Teacher. Linda is an exemplary 2/3 combo grade teacher and also a tech coordinator at Melinda Heights Elementary School, Saddleback Valley Unified School District, Mission Viejo, CA. She was instrumental in starting the Bring Your Own Device program at her school and after winning a grant, she implemented an iPad program into her classroom. Among other things, her students have created iBooks and videos that showcase learning. She was also District Teacher of the Year 2012, is a Smart Exemplary Educator, and a Discovery DEN STAR.
IT Best Practices: Episode 60 – We’ve talked about Intel’s Bring Your Own Device program in previous podcasts. Intel enables employees to use their own smart phones, tablets, and other devices for work. Of those, about half – 20,000 in all – run the Android operating system. One of IT’s challenges in supporting the open-source […]
Carl and Richard moderate a panel discussion on the state of mobile development with Todd Anglin, Lino Tadros, Gill Cleeran and Laurent Bugnion. The conversation starts out comparing the latest incarnations of hybrid development and native development, includng how technologies like Xamarin fit into the equation. The panelists also dig into the enterprise development story for phones and tablets and where Bring Your Own Device is going.
In this episode of MIS we discuss BYOD or Bring Your Own Device. BYOD can help your organization save money and increase employee satisfaction. BYOD, could also cost you customers and create security issues.
The U.S. trucking industry is currently debating the pros and cons of mobile communication platforms as it relates to Company-Owned Personally Enabled devices (COPE) or to rely on the Bring Your Own Device platform, simply known as BYOD. Christian Schenk is Senior Vice President of product strategy and market growth for XRS Corporation, specializing in helping private and for-hire fleets use driver and vehicle data to improve every aspect of their operations. Mr. Schenk points out that mobile technology (BYOD) over traditional, bulky "onboard computers," is already here as nearly 90% of truck drivers currently have personal mobile devices in use. XRS is able to support more than 100 mobile devices within its portfolio, on four networks across the United States and Canada. Mr. Schenk joins us as our special guest to further discuss the XRS Mobile Communication platform, the facts behind the BYOD technology and why their platform is considered to be revolutionizing the industry.
As personal mobile devices continue to grow in popularity, organisations are grappling with the issue of how to allow employees to use them in the workplace. The Bring Your Own Device (BYOD) debate continues to rage. In this episode we present pros and cons, and then look at 10 principles for facilitating BYOD in your workplace. See acast.com/privacy for privacy and opt-out information.
IT Best Practices: Episode 37 – Consumerization is a big trend in the enterprise. Intel is at the forefront of this trend, with an extensive BYO program. Tens of thousands of employee-owned smart phones and tablets are now in use by Intel workers. It allows employees to have more choice, and to find a platform […]
BYOD Trending Tech BYOD, or Bring Your Own Device refers to the growing trend for employees using their own mobile devices for work purposes. Employees are increasingly using their smartphones or tablets to access their email, and use work systems. Over 95% of companies have at least a few employees using their own devices. This can be positive, as it means employees are able to work while away from the office and stay up to date with emails outside working hours, however there are downsides. The main drawback is the questionable security of the devices. If an employee brings their tablet computer to the office and connects to the network, there is the risk that any viruses on that tablet could be transmitted to the office network. The best way around this is to limit the amount of information external devices have access to and ensure any devices that connect to it have sufficient virus protection. BYOD gives employees the freedom to work remotely, and increases the flexibility of the workforce. However it is important to assess and manage the risks before giving employees free rein to link their devices to company drives.
Student computer bargain hunting (refurbished computers from manufacturer, get last years model, use academic software), zBoost cell phone repeater (great way boost poor reception at home, may require directional antenna, as low as $184), Profiles in IT (Marissa Ann Mayer, Yahoo! CEO and former Google exec), YouMail voice mail application (sends voicemail via email, love this free app), hard drive failure (SpinRite may fix bad sectors), Skype security (end-to-end encryption, some questions about MS intentions), Stratford University launches mobile website, novel liquid repeller surface inspired by canivorous plant, iPad rules the market (Apple 68%, Samsung 9.6%, mini-iPad will increase the lead), Bring Your Own Device (security concerns for business, creating opportunities for IT pros who know security), ATT to shut down 2G by 2017, Verizon bandwidth purchase approved (bandwidth for 4G network purchased from cable companies, Verizon agrees to co-market cable and limit FIOS expansion), Mars Rover gets first mission (move 400m to Glenelg, dig, blast rocks with laser), tech stock update (Apple reaches new high, Facebook reaches new low), and CNN Tech Trends (from touch computing to HTML5). This show originally aired on Saturday, August 18, 2012, at 9:00 AM EST on WFED (1500 AM).
Student computer bargain hunting (refurbished computers from manufacturer, get last years model, use academic software), zBoost cell phone repeater (great way boost poor reception at home, may require directional antenna, as low as $184), Profiles in IT (Marissa Ann Mayer, Yahoo! CEO and former Google exec), YouMail voice mail application (sends voicemail via email, love this free app), hard drive failure (SpinRite may fix bad sectors), Skype security (end-to-end encryption, some questions about MS intentions), Stratford University launches mobile website, novel liquid repeller surface inspired by canivorous plant, iPad rules the market (Apple 68%, Samsung 9.6%, mini-iPad will increase the lead), Bring Your Own Device (security concerns for business, creating opportunities for IT pros who know security), ATT to shut down 2G by 2017, Verizon bandwidth purchase approved (bandwidth for 4G network purchased from cable companies, Verizon agrees to co-market cable and limit FIOS expansion), Mars Rover gets first mission (move 400m to Glenelg, dig, blast rocks with laser), tech stock update (Apple reaches new high, Facebook reaches new low), and CNN Tech Trends (from touch computing to HTML5). This show originally aired on Saturday, August 18, 2012, at 9:00 AM EST on WFED (1500 AM).
IT Best Practices: Episode 29 – IT@Intel is at the forefront of IT evolution in a number of ways. One big change in the past few years at IT@Intel is the company’s bring-your-own-device (BYOD) program. Since implementing the program several years ago, tens of thousands of employee-owned smart phones, tablets, and computers are in use […]
Voted for by the FOTE community, this year’s panel will be discussed challenges associated with ‘Bring Your Own Device – BYOD’. Just as colleges and universities do no provide students with paper, pens and stationery items but expect them t...