Technology and the CBO: What should be on your horizon. Michael Dodge California Financial Services 209-595-0791 mdodge@calschools.com New or Old CBO what should we be looking at in Technology? • If we were to turn the clock back 20 years and predict what sorts of technology business people would be using in the future, the Internet and cell phones would have ranked high on the list. New or Old CBO what should we be looking at in Technology? • A similar exercise today is harder to do, given the exponential pace at which technology is advancing. So what should we be expecting or planning for? • Lets look at short term New or Old as the CBO you should know: • Evaluating your Network • What does BYOD mean? • Tablets toys or business tools • The cloud and the future • What’s in it for me? Evaluating your network • The future for technology is not the computer, tablet or smart phone but rather the network. • We should be building robust networks for the future. • How do you evaluate your network? Network Terms • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • 802.11a • Datagram • 802.11b • DCE • 802.11g • DDNS (Dynamic Domain Name System) • Access Point • Default Gateway • Adapter • DECnet • Ad-hoc • Default route • AES (Advanced Encryption Standard) • DHCP (Dynamic Host Configuration Protocol) • Amplifier • Distribution Layer • Asymmetric Digital Subscriber Line (ADSL) • DMZ (Demilitarized Zone) • Asynchronous Transfer Mode (ATM) • DNS (Domain Name Server) • Backbone • Domain • Bandwidth • Download • Beacon Interval • DSI • Bit (Binary Digit) • DSL (Digital Subscriber Line) • Boot • DSSS (Direct-Sequence Spread-Spectrum) • Bridge • DTIM (Delivery Traffic Indication Message) • Broadband • Dynamic IP Address • Broadcast storm • E-1 • Browser • E3 • Buffer • EAP (Extensible Authentication Protocol) • Burst Mode • EAP-PEAP (Extensible Authentication Protocol-Protected• Extensible Authentication Byte • Protocol) Cable Modem • EAP-TLS (Extensible Authentication Protocol-Transport Layer Challenge-Handshake Authentication Protocol (CHAP) • • Security) Checksum • • Encapsulation Circuit switching • • Encryption Client • • Ethernet Client-server model • • Ethernet Switch Compression • • Fault Tolerance Core Layer • • Fibre Distributed Data Interface (FDDI) Congestion • • Fiber Optics Connection Oriented • • Finger Connectionless • • Firewall Cryptography • Firmware CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) • FTP (File Transfer Protocol) CTS (Clear To Send) • Fragment Daisy Chain • Fragmentation Database Fragmentation Frame Full Duplex Fully Qualified Domain Name (FQDN) Gateway Gbps (Gigabits per second) Half Duplex Hardware Hacker Header Heterogeneous network High Performance Parallel Interface (HIPPI) Host Hub HTTP (HyperText Transport Protocol) IEEE (The Institute of Electrical and Electronics Engine Infrastructure Infrastructure Mode Internet Internet Control Message Protocol (ICMP) Internetwork Packet eXchange (IPX) IP Address IPCONFIG IPSec (Internet Protocol Security) ISM band ISP (Internet Service Provider) LAN (Local Area Network) Layer Latency LEAP (Lightweight Extensible Authentication Protocol Local Loop Low Voltage Differential Signaling (LVDS) Network Terms • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • MAC (Media Access Control) Address Mbps (Megabits Per Second) Media Gateway Control Protocol (MGCP) Medium Multicasting Multilink Point-to-Point Protocol (MP) Multimedia Multiplexing Multipoint MultiProtocol Label Switching (MPLS) NAT (Network Address Translation) NAT (Network Address Translation) Traversal Network Network Layer NNTP (Network News Transfer Protocol) Network Time Protocol (NTP) Node Octet OFDM (Orthogonal Frequency Division Multiplexing) Optical Fiber OSI Packet Packet Switching Passphrase PEAP (Protected Extensible Authentication Protocol) Pipelining Ping (Packet INternet Groper) PoE (Power over Ethernet) POP3 (Post Office Protocol 3) Port PPPoE (Point to Point Protocol over Ethernet) PPTP (Point-to-Point Tunneling Protocol) Preamble RADIUS (Remote Authentication Dial-In User Service) Repeater Requests for Comments (RFCs) RJ-45 (Registered Jack-45) • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • RJ-45 (Registered Jack-45) Roaming • Router • RTP (Real-time Transport Protocol) • RTS (Request To Send) • Serial Line Internet Protocol (SLIP) • Server • SMTP (Simple Mail Transfer Protocol) • SNMP (Simple Network Management Protocol) • Software • SOHO (Small Office/Home Office) • SPI (Stateful Packet Inspection) Firewall • Spread Spectrum • SSID (Service Set IDentifier) • Static IP Address • Static Routing STM-1 Subnet Mask Synchronous Transfer Mode (STM) Switch T1 T3 TCP (Transmission Control Protocol) TCP/IP (Transmission Control Protocol/Internet Protocol) Telnet Terminal server Throughput Time Division Multiplex (TDM) TFTP (Trivial File Transfer Protocol) TKIP (Temporal Key Integrity Protocol) TLS (Transport Layer Security) Token Ring Topology TX Rate UDP (User Datagram Protocol) Upgrade Upload URL (Uniform Resource Locator) Voice over IP (VoIP) VPN (Virtual Private Network) WAN (Wide Area Network) Wavelength Wavelength Division Multiplexing (WDM) WEP (Wired Equivalency Protocol) WINIPCFG WLAN (Wireless Local Area Network) WPA (Wi-Fi Protected Access) WPA2 (Wi-Fi Protected Access 2) WPA-Personal WPA-Enterprise xDSL Overwhelmed with Terms? What does all this mean to me as the CBO? Basic Terms the CBO needs to know: • • • • • • • • • • • • Access Point Backbone Bandwidth Core Layer Cat3, Cat5, Cat5e, Cat6 Distribution Layer DSI DS3 Fiber Gigibit – Gbps LAN Layer • • • • • • • • • • • • Latency Mbps OC1 PoE Router Switch T1 T3 Throughput VLAN WAN WLAN Wireless Speed • Speed of wireless should be looked at from throughput. The term “throughput” refers to the amount of video, music, Internet traffic, or gaming data that can pass through your wireless network under real-world conditions. • Wi-Fi Standard / Data Transfer Rate / Throughput Rate. 802.11b / 11Mbps / 4Mbps 802.11a / 54Mbps / 23Mbps 802.11g / 54Mbps / 19Mbps 802.11n / 300Mbps / 82Mbps Wire Speed UTP Category Purpose Cat 1 Cat 2 Cat 3 Cat 4 Cat 5 Cat 5e Cat 6 Voice Only Data Data Data Data Data Data Transfer Rate 4 Mbps 10 Mbps 16 Mbps 100 Mbps 1 Gbps 1-10 Gbps Network for layman • Think of a Highway – – – – 2 lanes, 4 lanes, 8 lanes Number of cars Speed of traffic Type of vehicles Simple things to check • • • • Speed Tests – upload / download Bandwidth – size of your pipe Latency – distance from your source Network Bottle necks – Access point – Switches – cabling • Device Bottle necks – Network card in device – Chip speed of computer – Video card speed in computer BYOD What does it really mean? • BYOD and District-issued smart devices are no longer simple textbased email readers. Rather, they are high-resolution, video-capable devices that are purely wireless and mobile. BYOD • Applications being run on smart devices are robust, real-time, and mission critical. Recent studies indicate that almost 66 percent of the world’s mobile data traffic will be video by 2014. Demanding applications combined with rapid growth can quickly overwhelm existing wireless local area network (WLAN) architectures, significantly affecting users’ experiences and productivity. Challenges of BYOD • • • • • Supporting Wireless network Controlling Security of the Network Supporting the Unknown Device Bandwidth FERPA, CIPA, HIPPA, PCI DSS – Compliance Issues – – – – Family Educational Rights & Privacy Act Children’s Internet Protection Act Health Information Portability & Accountability Act Payment Card Industry Data Security Standard • Costs TABLETS or TOYS • For Business and Administration are Tablets Toys or Business Tools? – What are you using them for? • Note taking? • Business work? • Email? TABLETS or TOYS • Trend or Hype? – Do they support Excel, Power point not just word processing? – Do they support Outlook or District email? – Do they support local printing? – Do they support attendance applications? – Do they support State Applications (SACS,etc)? TABLETS or TOYS – Are they secure? – Are they a District Standard? – The Future or a passing Fad? What is Cloud Computing • The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing – Applications & Docs Via the Web Cloud Computing – Applications & Docs Via the Web Advantages Of Cloud Computing • • • • • • Reduced Cost Cloud technology is paid incrementally, saving organizations money. Increased Storage Organizations can store more data than on private computer systems. Highly Automated No longer do IT personnel need to worry about keeping software up to date. Flexibility Cloud computing offers much more flexibility than past computing methods. More Mobility Employees can access information wherever they are, rather than having to remain at their desks. Allows IT to Shift Focus No longer having to worry about constant server updates and other computing issues, government organizations will be free to concentrate on innovation. Disadvantages of Cloud Computing • Need access to the internet • Need appropriate bandwidth and speed • Reliability • Lack of control • Locked into apps The Near Future • • • • • • • • • Portable Power Wireless Power Near Field Communications BYOD Connections Wearable Computers 3-D Printers Handheld Projectors Personal Assistants Robot Cars Portable Power • Most technology is subject to Moore’s Law, which says things gets better and cheaper the longer we go. As any smart phone user knows, batteries have somehow resisted this trend. • Despite the increasingly complex and amazing things phones can do – or actually, because of them – battery life is either not keeping pace or getting shorter. Until a breakthrough is made, we’ll have to improvise. • A good solution in the meantime is portable power in the form of separate charging devices. Wireless Power • Protective cases that double as charging skins are making this possible for exisiting technology (such as those from Hyperion and Myedour) • So far, most such wireless power devices – including Duracell’s popular PowerMat, which charges a number of gizmos at once – have used magnetic induction, which requires physical contact. • On the horizon, however, is magnetic resonance technology, which allows charging from a few feet away. • That means phones and other devices are finally set to lose their last remaining tethers – the cord. Near Field Communications • Speaking of wireless technologies, near-field communications (NFC) has been that young, up-and-coming rookie who hasn’t yet fulfilled his potential for several years now. • NFC has been touted as the key to mobile payments – or mcommerce – since it allows the secure transfer of data through the simple tapping together of two enabled devices. • The holdup, according to m-commerce experts, has been in deciding how to slice up transaction fees. The traditional partners in the system, from credit card networks, to issuing banks, to merchants, have resisted giving up cuts to the newcomers, which include software and handset makers and even wireless providers. But some of those new players, notably Google, don’t really care about getting financial remuneration every time the user makes a purchase – they’re more interested in the data he or she is generating. BYOD Connections • BYOD connections are growing everywhere: – Doctors office – Starbucks – MacDonalds – Workshops – Schools • With the growth of smartphones we are offering connections for smart devices everywhere. • The trend makes a lot of sense, since smartphones are very personal gadgets – it’s not called an “i” phone for nothing – and workers don’t want to have to lug two of them around. Work phones and personal phones are thus destined to merge, which presents something of a problem for corporate information technology departments. How does a business department let workers use their own devices, yet still keep them secure? Wearable Computers • Google Glass, Wrist Phones, etc…. • In demos, Google’s glasses have enabled wearers to take pictures and videos, have video conferences with each other, map directions and navigate, and otherwise perform many smartphone functions. Yet, all of this will happen on a screen that is effectively worn in front of your eyes. • Apple, Samsung and others are also reportedly working on “smart” watches, which will similarly bring many smartphone functions to a wristworn device. • It may sound goofy or science-fictiony right now, but application developers will inevitably think up ways to use these new devices in ways that will probably make them indispensable. 3-D Printers • Technology analysis firm Gartner might have put three-dimensional printing at the very top of its annual hype cycle last year, but that’s not necessarily a knock on the field. • The popular notion about 3-D printing right now is that it’s mainly being used by hobbyists to create simple toys and knick-knacks, but according to a recent report, this sort of “additive manufacturing” accounts for between 20 and 25 per cent of the industrial parts being made today, which puts the technology well on its way to wide-scale acceptance. Handheld Projectors • So you’ve got a PowerPoint presentation to make? – There are a few options for showing it, with the most common – and most old-school – involving the lugging of your laptop to the conference room, where it’s hooked up to a projector. – Some smartphones can do this now, although the big projector is still necessary. – Enter pico projectors: tiny devices that are even smaller than the smartphone itself. They’re not as good or bright as their bigger cousins, but they’re also completely portable and getting better all the time, so much so that phone makers are starting to incorporate them into their devices themselves. Samsung tried it last year with the Galaxy Beam, but the phone didn’t do very well because of its otherwise underwhelming features. – Packing pico projectors into smartphones is still a little on the expensive side, but with the cost of the technology coming down, they will inevitably be finding their way into more and more devices. Personal Assistants • Computers are getting pretty good at predicting things about us, provided we give them enough information to work with. • Web browsers watch our browsing and suggest the next thing for us. • Siri and others work by starting them up and asking for help. • That’s changing, though, with machines starting to understand context better. Google Now, a feature in Android phones launched last year, is a good example. If you input an appointment into your calendar, for example, Google Now will map out directions to it and scan traffic leading up to it, then alert you as to when it thinks you should leave. • Secretaries and real-life assistants should beware – their jobs are endangered. Robo Cars • So far, the champion of the cause has been Google, which sees robot cars as a project that simply needs to happen. Theoretically, the company could connect such vehicles to its navigation systems and watch the ad revenue from participating businesses roll in. • But traditional car companies have joined in, too, with both Lexus and Audi legitimizing the field this year with announcements at the Consumer Electronics Show in Las Vegas. • The race – pardon the pun – to develop more autonomous vehicles is on, with developments slowly leaking into commercialization along the way. Many of the newest models already have lane and distance sensors, as well as cameras in the back to detect oncoming hazards. Autonomous driving is likely to first happen on highways, thereby freeing drivers to do more productive things. • It won’t happen tomorrow, but with the competition joined, it’s likely to arrive sooner than anyone expects. What’s in it for me? • How many take notes? • How many use paper pads or note books? • How many use tablets? • How do you organize your notes? • How do you find topics you have taken notes for? A Deeper look at Evernote • Tired of searching through the mountain of papers on your desk for that post-it with your meeting date? • Try Evernote, an information organizational tool. Evernote works with three basic functions: capture, access, and find. Capture all of your information, from doctor appointments to business meetings, access it from a host of different sources like your computer, smart phone, or tablet, and find everything in mere moments. With all of your information stored in one clearly marked space, you’ll save time and energy best spent elsewhere, like your growing company! Best of all, Evernote is a free application, so you can test out their organizational method and see if it is the right fit for you, without breaking the bank. Evernote Demo • • • • • • • • Notebooks Stacks Notes Audio Clips Search Share Attachments Questions - Comments • Michael Dodge – 209- 595-0791 • mdodge@calschools.com