Technology and the CBO: What should be on your horizon.

advertisement
Technology and the CBO:
What should be on your horizon.
Michael Dodge
California Financial Services
209-595-0791
mdodge@calschools.com
New or Old CBO what should we be
looking at in Technology?
• If we were to turn the clock back 20 years and
predict what sorts of technology business
people would be using in the future, the
Internet and cell phones would have ranked
high on the list.
New or Old CBO what should we be
looking at in Technology?
• A similar exercise today is harder to do, given
the exponential pace at which technology is
advancing. So what should we be expecting
or planning for?
• Lets look at short term
New or Old as the CBO you should know:
• Evaluating your Network
• What does BYOD mean?
• Tablets toys or business tools
• The cloud and the future
• What’s in it for me?
Evaluating your network
• The future for technology is not the computer,
tablet or smart phone but rather the network.
• We should be building robust networks for the
future.
• How do you evaluate your network?
Network Terms
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
802.11a
•
Datagram
•
802.11b
•
DCE
•
802.11g
•
DDNS (Dynamic Domain Name System)
•
Access Point
•
Default Gateway
•
Adapter
•
DECnet
•
Ad-hoc
•
Default route
•
AES (Advanced Encryption Standard)
•
DHCP (Dynamic Host Configuration Protocol)
•
Amplifier
•
Distribution Layer
•
Asymmetric Digital Subscriber Line (ADSL)
•
DMZ (Demilitarized Zone)
•
Asynchronous Transfer Mode (ATM)
•
DNS (Domain Name Server)
•
Backbone
•
Domain
•
Bandwidth
•
Download
•
Beacon Interval
•
DSI
•
Bit (Binary Digit)
•
DSL (Digital Subscriber Line)
•
Boot
•
DSSS (Direct-Sequence Spread-Spectrum)
•
Bridge
•
DTIM (Delivery Traffic Indication Message)
•
Broadband
•
Dynamic IP Address
•
Broadcast storm
•
E-1
•
Browser
•
E3
•
Buffer
•
EAP (Extensible Authentication Protocol)
•
Burst Mode
•
EAP-PEAP (Extensible Authentication Protocol-Protected•
Extensible Authentication
Byte
•
Protocol)
Cable Modem
•
EAP-TLS (Extensible Authentication Protocol-Transport Layer
Challenge-Handshake Authentication Protocol (CHAP) •
•
Security)
Checksum
•
•
Encapsulation
Circuit switching
•
•
Encryption
Client
•
•
Ethernet
Client-server model
•
•
Ethernet Switch
Compression
•
•
Fault Tolerance
Core Layer
•
•
Fibre Distributed Data Interface (FDDI)
Congestion
•
•
Fiber Optics
Connection Oriented
•
•
Finger
Connectionless
•
•
Firewall
Cryptography
•
Firmware
CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance)
•
FTP (File Transfer Protocol)
CTS (Clear To Send)
•
Fragment
Daisy Chain
•
Fragmentation
Database
Fragmentation
Frame
Full Duplex
Fully Qualified Domain Name (FQDN)
Gateway
Gbps (Gigabits per second)
Half Duplex
Hardware
Hacker
Header
Heterogeneous network
High Performance Parallel Interface (HIPPI)
Host
Hub
HTTP (HyperText Transport Protocol)
IEEE (The Institute of Electrical and Electronics Engine
Infrastructure
Infrastructure Mode
Internet
Internet Control Message Protocol (ICMP)
Internetwork Packet eXchange (IPX)
IP Address
IPCONFIG
IPSec (Internet Protocol Security)
ISM band
ISP (Internet Service Provider)
LAN (Local Area Network)
Layer
Latency
LEAP (Lightweight Extensible Authentication Protocol
Local Loop
Low Voltage Differential Signaling (LVDS)
Network Terms
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
MAC (Media Access Control) Address
Mbps (Megabits Per Second)
Media Gateway Control Protocol (MGCP)
Medium
Multicasting
Multilink Point-to-Point Protocol (MP)
Multimedia
Multiplexing
Multipoint
MultiProtocol Label Switching (MPLS)
NAT (Network Address Translation)
NAT (Network Address Translation) Traversal
Network
Network Layer
NNTP (Network News Transfer Protocol)
Network Time Protocol (NTP)
Node
Octet
OFDM (Orthogonal Frequency Division Multiplexing)
Optical Fiber
OSI
Packet
Packet Switching
Passphrase
PEAP (Protected Extensible Authentication Protocol)
Pipelining
Ping (Packet INternet Groper)
PoE (Power over Ethernet)
POP3 (Post Office Protocol 3)
Port
PPPoE (Point to Point Protocol over Ethernet)
PPTP (Point-to-Point Tunneling Protocol)
Preamble
RADIUS (Remote Authentication Dial-In User Service)
Repeater
Requests for Comments (RFCs)
RJ-45 (Registered Jack-45)
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
RJ-45 (Registered Jack-45)
Roaming
•
Router
•
RTP (Real-time Transport Protocol)
•
RTS (Request To Send)
•
Serial Line Internet Protocol (SLIP)
•
Server
•
SMTP (Simple Mail Transfer Protocol)
•
SNMP (Simple Network Management Protocol)
•
Software
•
SOHO (Small Office/Home Office)
•
SPI (Stateful Packet Inspection) Firewall
•
Spread Spectrum
•
SSID (Service Set IDentifier)
•
Static IP Address
•
Static Routing
STM-1
Subnet Mask
Synchronous Transfer Mode (STM)
Switch
T1
T3
TCP (Transmission Control Protocol)
TCP/IP (Transmission Control Protocol/Internet Protocol)
Telnet
Terminal server
Throughput
Time Division Multiplex (TDM)
TFTP (Trivial File Transfer Protocol)
TKIP (Temporal Key Integrity Protocol)
TLS (Transport Layer Security)
Token Ring
Topology
TX Rate
UDP (User Datagram Protocol)
Upgrade
Upload
URL (Uniform Resource Locator)
Voice over IP (VoIP)
VPN (Virtual Private Network)
WAN (Wide Area Network)
Wavelength
Wavelength Division Multiplexing (WDM)
WEP (Wired Equivalency Protocol)
WINIPCFG
WLAN (Wireless Local Area Network)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access 2)
WPA-Personal
WPA-Enterprise
xDSL
Overwhelmed with Terms?
What does all this mean to me as the CBO?
Basic Terms the CBO needs to know:
•
•
•
•
•
•
•
•
•
•
•
•
Access Point
Backbone
Bandwidth
Core Layer
Cat3, Cat5, Cat5e, Cat6
Distribution Layer
DSI
DS3
Fiber
Gigibit – Gbps
LAN
Layer
•
•
•
•
•
•
•
•
•
•
•
•
Latency
Mbps
OC1
PoE
Router
Switch
T1
T3
Throughput
VLAN
WAN
WLAN
Wireless Speed
• Speed of wireless should be looked at from throughput. The
term “throughput” refers to the amount of video, music,
Internet traffic, or gaming data that can pass through your
wireless network under real-world conditions.
• Wi-Fi Standard / Data Transfer Rate / Throughput Rate.
802.11b
/ 11Mbps
/ 4Mbps
802.11a
/ 54Mbps
/ 23Mbps
802.11g
/ 54Mbps
/ 19Mbps
802.11n
/ 300Mbps
/ 82Mbps
Wire Speed
UTP Category
Purpose
Cat 1
Cat 2
Cat 3
Cat 4
Cat 5
Cat 5e
Cat 6
Voice Only
Data
Data
Data
Data
Data
Data
Transfer Rate
4 Mbps
10 Mbps
16 Mbps
100 Mbps
1 Gbps
1-10 Gbps
Network for layman
• Think of a Highway
–
–
–
–
2 lanes, 4 lanes, 8 lanes
Number of cars
Speed of traffic
Type of vehicles
Simple things to check
•
•
•
•
Speed Tests – upload / download
Bandwidth – size of your pipe
Latency – distance from your source
Network Bottle necks
– Access point
– Switches
– cabling
• Device Bottle necks
– Network card in device
– Chip speed of computer
– Video card speed in computer
BYOD What does it really mean?
• BYOD and District-issued smart devices are no longer simple textbased email readers. Rather, they are high-resolution, video-capable
devices that are purely wireless and mobile.
BYOD
• Applications being run on smart devices are robust, real-time, and
mission critical. Recent studies indicate that almost 66 percent of the
world’s mobile data traffic will be video by 2014. Demanding
applications combined with rapid growth can quickly overwhelm
existing wireless local area network (WLAN) architectures, significantly
affecting users’ experiences and productivity.
Challenges of BYOD
•
•
•
•
•
Supporting Wireless network
Controlling Security of the Network
Supporting the Unknown Device
Bandwidth
FERPA, CIPA, HIPPA, PCI DSS – Compliance
Issues
–
–
–
–
Family Educational Rights & Privacy Act
Children’s Internet Protection Act
Health Information Portability & Accountability Act
Payment Card Industry Data Security Standard
• Costs
TABLETS or TOYS
• For Business and Administration are Tablets Toys
or Business Tools?
– What are you using them for?
• Note taking?
• Business work?
• Email?
TABLETS or TOYS
• Trend or Hype?
– Do they support Excel, Power point not just word
processing?
– Do they support Outlook or
District email?
– Do they support local printing?
– Do they support attendance applications?
– Do they support State Applications
(SACS,etc)?
TABLETS or TOYS
– Are they secure?
– Are they a District Standard?
– The Future or a passing Fad?
What is Cloud Computing
• The practice of using a network of remote
servers hosted on the Internet to store, manage,
and process data, rather than a local server or a
personal computer.
Cloud Computing – Applications & Docs Via the
Web
Cloud Computing – Applications & Docs Via the
Web
Advantages Of Cloud Computing
•
•
•
•
•
•
Reduced Cost
Cloud technology is paid incrementally, saving organizations money.
Increased Storage
Organizations can store more data than on private computer systems.
Highly Automated
No longer do IT personnel need to worry about keeping software up to date.
Flexibility
Cloud computing offers much more flexibility than past computing methods.
More Mobility
Employees can access information wherever they are, rather than having to
remain at their desks.
Allows IT to Shift Focus
No longer having to worry about constant server updates and other
computing issues, government organizations will be free to concentrate on
innovation.
Disadvantages of Cloud Computing
• Need access to the internet
• Need appropriate bandwidth and speed
• Reliability
• Lack of control
• Locked into apps
The Near Future
•
•
•
•
•
•
•
•
•
Portable Power
Wireless Power
Near Field Communications
BYOD Connections
Wearable Computers
3-D Printers
Handheld Projectors
Personal Assistants
Robot Cars
Portable Power
• Most technology is subject to Moore’s Law, which says things gets
better and cheaper the longer we go. As any smart phone user knows,
batteries have somehow resisted this trend.
• Despite the increasingly complex and amazing things phones can do –
or actually, because of them – battery life is either not keeping pace or
getting shorter. Until a breakthrough is made, we’ll have to improvise.
• A good solution in the meantime is portable power in the form of
separate charging devices.
Wireless Power
• Protective cases that double as charging skins are making this possible
for exisiting technology (such as those from Hyperion and Myedour)
• So far, most such wireless power devices – including Duracell’s popular
PowerMat, which charges a number of gizmos at once – have used
magnetic induction, which requires physical contact.
• On the horizon, however, is magnetic resonance technology, which
allows charging from a few feet away.
• That means phones and other devices are finally set to lose their last
remaining tethers – the cord.
Near Field Communications
• Speaking of wireless technologies, near-field communications (NFC)
has been that young, up-and-coming rookie who hasn’t yet fulfilled his
potential for several years now.
• NFC has been touted as the key to mobile payments – or mcommerce – since it allows the secure transfer of data through the
simple tapping together of two enabled devices.
• The holdup, according to m-commerce experts, has been in deciding
how to slice up transaction fees.
The traditional partners in the system, from credit card networks, to
issuing banks, to merchants, have resisted giving up cuts to the
newcomers, which include software and handset makers and even
wireless providers. But some of those new players, notably Google,
don’t really care about getting financial remuneration every time the
user makes a purchase – they’re more interested in the data he or
she is generating.
BYOD Connections
• BYOD connections are growing everywhere:
– Doctors office
– Starbucks
– MacDonalds
– Workshops
– Schools
• With the growth of smartphones we are offering connections for smart
devices everywhere.
• The trend makes a lot of sense, since smartphones are very personal
gadgets – it’s not called an “i” phone for nothing – and workers don’t want
to have to lug two of them around. Work phones and personal phones
are thus destined to merge, which presents something of a problem for
corporate information technology departments.
How does a business department let workers use their own devices, yet
still keep them secure?
Wearable Computers
• Google Glass, Wrist Phones, etc….
• In demos, Google’s glasses have enabled wearers to take pictures and
videos, have video conferences with each other, map directions and
navigate, and otherwise perform many smartphone functions.
Yet, all of this will happen on a screen that is effectively worn in front of
your eyes.
• Apple, Samsung and others are also reportedly working on “smart”
watches, which will similarly bring many smartphone functions to a wristworn device.
• It may sound goofy or science-fictiony right now, but application
developers will inevitably think up ways to use these new devices in
ways that will probably make them indispensable.
3-D Printers
• Technology analysis firm Gartner might have put three-dimensional
printing at the very top of its annual hype cycle last year, but that’s not
necessarily a knock on the field.
• The popular notion about 3-D printing right now is that it’s mainly being
used by hobbyists to create simple toys and knick-knacks, but according
to a recent report, this sort of “additive manufacturing” accounts for
between 20 and 25 per cent of the industrial parts being made today,
which puts the technology well on its way to wide-scale acceptance.
Handheld Projectors
• So you’ve got a PowerPoint presentation to make?
– There are a few options for showing it, with the most common – and most old-school –
involving the lugging of your laptop to the conference room, where it’s hooked up to a
projector.
– Some smartphones can do this now, although the big projector is still necessary.
– Enter pico projectors: tiny devices that are even smaller than the smartphone itself.
They’re not as good or bright as their bigger cousins, but they’re also completely
portable and getting better all the time, so much so that phone makers are starting to
incorporate them into their devices themselves. Samsung tried it last year with the
Galaxy Beam, but the phone didn’t do very well because of its otherwise
underwhelming features.
– Packing pico projectors into smartphones is still a little on the expensive side, but with
the cost of the technology coming down, they will inevitably be finding their way into
more and more devices.
Personal Assistants
• Computers are getting pretty good at predicting things about us, provided
we give them enough information to work with.
• Web browsers watch our browsing and suggest the next thing for us.
• Siri and others work by starting them up and asking for help.
• That’s changing, though, with machines starting to understand context
better. Google Now, a feature in Android phones launched last year, is a
good example. If you input an appointment into your calendar, for
example, Google Now will map out directions to it and scan traffic leading
up to it, then alert you as to when it thinks you should leave.
• Secretaries and real-life assistants should beware – their jobs are
endangered.
Robo Cars
• So far, the champion of the cause has been Google, which sees robot
cars as a project that simply needs to happen. Theoretically, the
company could connect such vehicles to its navigation systems and
watch the ad revenue from participating businesses roll in.
• But traditional car companies have joined in, too, with both Lexus and
Audi legitimizing the field this year with announcements at the
Consumer Electronics Show in Las Vegas.
• The race – pardon the pun – to develop more autonomous vehicles is
on, with developments slowly leaking into commercialization along the
way. Many of the newest models already have lane and distance
sensors, as well as cameras in the back to detect oncoming hazards.
Autonomous driving is likely to first happen on highways, thereby freeing
drivers to do more productive things.
• It won’t happen tomorrow, but with the competition joined, it’s likely to
arrive sooner than anyone expects.
What’s in it for me?
• How many take notes?
• How many use paper pads or note books?
• How many use tablets?
• How do you organize your notes?
• How do you find topics you have taken notes for?
A Deeper look at Evernote
• Tired of searching through the mountain of papers on your
desk for that post-it with your meeting date?
• Try Evernote, an information organizational tool. Evernote
works with three basic functions: capture, access, and find.
Capture all of your information, from doctor appointments to
business meetings, access it from a host of different
sources like your computer, smart phone, or tablet, and find
everything in mere moments. With all of your information
stored in one clearly marked space, you’ll save time and
energy best spent elsewhere, like your growing company!
Best of all, Evernote is a free application, so you can test
out their organizational method and see if it is the right fit for
you, without breaking the bank.
Evernote Demo
•
•
•
•
•
•
•
•
Notebooks
Stacks
Notes
Audio
Clips
Search
Share
Attachments
Questions - Comments
• Michael Dodge – 209- 595-0791
• mdodge@calschools.com
Download