33
Mobile and Social Networking in the Enterprise John G. Kelley @MainframePM LinkedIn.com/In/MainframePM Insert Custom Session QR if Desired.

Mobile and Social Networking in the Enterprise - … and Social Networking in the Enterprise ... – HI5: Photo sharing, ... • Full HD or HD+ photos and videos

  • Upload
    dodien

  • View
    226

  • Download
    0

Embed Size (px)

Citation preview

Mobile and Social Networking in the Enterprise

John G. Kelley @MainframePM

LinkedIn.com/In/MainframePM

InsertCustomSessionQR if Desired.

Background

• Over 40 years in Information Technology– USAF Computer Operations

• Honeywell GCOS • Burroughs & Univac• IBM VM with DOS III & OS/VS1• IBM PROFS Administrator • ARPANET connected DEC PDP 11/70• OASys (server) with networked Zenith 128 Personal Computers, Word Processing,

Spreadsheets

– Computer Associates • Systems Engineer supporting VM, VSE, and MVS Operations software

– Automated Operations, Report Distribution & Archiving, Automated Scheduling, Change Management, Tape Management Systems

• Regional Technical Manager

2 @MainframePM

Background

• Mobile Phone User for 30 Years!• Over 25 years Instructor/Consultant

• Mainframe– z/OS basics, TSO/ISPF, MVS/JCL, and REXX programming– Automated Operations, Scheduling, Report Distribution &

Archiving, Change Management, Tape Management

• UNIX/Linux– System use & administration, shell programming, automated

scheduling

• LinkedIn, Twitter, Tumblr, YouTube, & Periscope– MainframePM on all these Social Networks

3 @MainframePM

1970s &1980s• 1973 1st handheld mobile call• 1975 1st digital camera: 8 lbs .01 MP • 1978 UNIX to UNIX Copy Protocol

– UUCP leads to Usenet

• 1979 Usenet News Groups• 1980 CompuServe Chat• 1983 Cellular 1G network (analog) • 1984 Prodigy online portals & news• 1988 Internet Relay Chat (IRC): File sharing, link sharing

Evolution of Mobile and Social Networking

4 @MainframePM

1990s• 1990 1ST commercial digital camera

• 1991 Cellular 2G (digital) GSM system (Finland); Gopher: Menu-driven internet file access

The World-Wide Web is born through HTTP

• 1992 1st SMS Text sent by computer

• 1993 1st person to person text (Finland);1st Smartphone, IBM Simon;

1st Web Browser: Mosaic

• 1996 ICQ Multi-user messaging: Emoticons, and chat talk begins

• 1997 Six Degrees social network: Profiles & friends

• 1998 1ST downloaded additional content: ringtone; Mobile payments for

parking & vending machines (Finland)

• 1999 1st & 2nd commercial systems to mimic banks (Philippines)

Live Journal: Blogs, Forums & Groups

Evolution of Mobile and Social Networking

5 @MainframePM

21st Century: 2000 - 2004 • 2001

– 3G mobile network (Japan); Wikipedia, MySpace

• 2002– Friendster: Meet new people & expand your social network

• 2003– The Android Company: OS for Digital Camera to OS for Smartphones– LinkedIn: Business networking; MySpace: Private messaging, public comments– HI5: Photo sharing, social gaming & status updates

• 2004– Flickr: Photo sharing; Facebook: Harvard Only

Evolution of Mobile and Social Networking

6 @MainframePM

2005 - 2009 2005 Widespread 3G (200Kbps-2Mbps) networks make the mobile internet

practicalGoogle buys Android CompanyYouTube: Video streaming & sharingReddit: Entertainment & networking

• 2006 Facebook goes public for users 13 and older: over 1.4 billionusers by the end of the year.Twitter: micro-blogging

• 2007 iPhone; Android OS by GoogleTumblr: Live streaming & micro-blogging

2009 1st 4G LTE mobile networks (Norway & Sweden)Whatsapp Personal & group chat for iOS, Android, Windows phones

Evolution of Mobile and Social Networking

7 @MainframePM

2010 – 2015 2010 4G LTE (100Mbps-1Gps: United States & Japan)

Instagram: Photo sharing; Pinterest: Shared interests

• 2011 Instagram for iOS• 2012 Snapchat: Limited life photo-chatting

Digital camera sales peak; Instagram for AndroidFacebook buys Instagram

• 2014 Digital camera sales stabilize at 30% of peak due mostlyto Smartphones

• 2015 Periscope: Live video streams from TwitterFacebook averages just under 1.2 billion active users monthly out of 1.7-1.8 billion users. (Twitter 288 million)

Evolution of Mobile and Social Networking

8 @MainframePM

• iPhone 6 Plus– Dual core, 1GB RAM, 128GB Storage– 8MP back + 1.2MP front cameras, 5.5” HD Screen

• Galaxy S6– Octa-core, 3GB RAM, 128GB Storage– 16MP back + 5MP front cameras, 5.1” HD+ Screen

• LG G4– Hexa-core, 3GB Ram, 32GB Storage– Expandable to 2 TB Storage!– 16MP back + 8MP front cameras, 5.5” HD+ Screen

Smartphone Specs 2015

9 @MainframePM

Pew Research found

• 86% of people aged 18 to 29 have a smart phone.

• 83% of those ages 30 to 49, and

• all told, 68% of adults have a smartphone.

• The only group more likely to have a smartphone than Millennials was people living in households earning $75,000 or more annually, Pew found. There, 87% had them.

Elizabeth Weise, USATODAY 3:37 p.m. EDT October 29, 2015

Mobile and Social Media Impacts

10 @MainframePM

• Black Friday 2015– Mobile shopping visits

exceed desktop visits for the 1st time.

– Mobile drove 37% of actual online sales.

• 22% Smartphones

• 15% TabletsAndroid Central 11/28/2015

“For marketers, mobile apps represent a tremendousopportunity to directly connect with their most loyalcustomers, while delivering revenue-impacting customersatisfaction and conversion metrics.”

The American Marketing Association

“Because it appeared quickly, social media has developeda reputation by some for being a passing marketinginterest, and therefore, an unprofitable one. The statistics,however, illustrate a different picture. According toHubspot, 92% of marketers in 2014 claimed that socialmedia marketing was important for their business, with80% indicating their efforts increased traffic to theirwebsites. And according to Social Media Examiner, 97%of marketers are currently participatingin social media—but 85% of participants aren’t surewhat social media tools are the best to use.”.

Jayson DeMersSEO and online marketing strategist, in Forbes.com

Mobile and Social Media Impacts

11 @MainframePM

Mobile and Social Media Impacts

12

• The “Company App Store” – Internal social media sites expanding the intranet and making it

mobile. • Enterprise Systems Automation: Is There An App For That?

– Providing platform and device-specific interfaces, not based on where the software runs, but where end users need to access it is essential. [. . .] software needs to be aware of the devices that may access it [. . . and] your mobile users are likely to ask, “Is there an app for that?”

John KelleyEnterprise Executive: October 2014

– Google search changes will promote mobile-friendly sites• By Zoe Kleinman Technology reporter, BBC News

@MainframePM

Mobile and Social Media Impacts

13

• Social Networks for the Enterprise– Facebook at Work: a business-focused version of Facebook using tools you’re already familiar with to

interact with coworkers. Work accounts are only visible to other people at your company.

– Google at Work: includes tools like Gmail, Drive & Calendar to run Google globally, and Google Cloud Platform solutions that power services like Search and YouTube.

– Yammer: Microsoft’s business social network, integrated within Office 365 to allow teammates to work and comment on the same documents from anywhere in the world. The network is private, but you can loop customers and vendors into conversations.

– Convo: Described as a “platform for work conversations,” Convo provides messaging, a real-time feed for all your conversations, and the ability to highlight and comment on documents without having to leave the platform.

– Socialcast: This network’s unique selling point is how easy it makes it to solicit feedback from large and small groups—including a digital form of a town hall. It also includes the ability to embed real-time feeds into conversations, reducing the need to switch between applications mid-conversation.

Source: HP Technology at Work / 2016 /February

@MainframePM

Mobile and Social Media Impacts

14

• Take “work from home” to “work from anywhere”

– Wifi Hotspots & 4G LTE capable devices means you don’t have to find the nearest Panera, or Starbucks to get it done.

– Apps for Remote Access: SSH, FTP, RDP, TN3270

• Can utilize VPN for secure access, but they may also store sensitive data, such as passwords, on the device.

@MainframePM

Mobile and Social Media Impacts

15

• BYOD – Bring your own device– Unavoidable unless you ban all personal computers, tablets,

and phones from the premises. – It’s likely that employees will have sensitive enterprise

information on their personal devices.• Employees may note access codes and passwords on

their portable devices, and don’t assume that they will use a password vault app.

• It’s possible this highly sensitive data is stored in plain text on a device with no encryption, and no access protection.

3 out of 4 professionals use personal devices to access corporate data

@MainframePM

Mobile and Social Media Impacts

16

• Breaking News!– Photography, Video, and Audio Recording apps on

Smartphones• Full HD or HD+ photos and videos• Often do not require unlocking the phone to

activate. – Every person with a Smartphone is a potential

reporter.– Social Media apps for video capture & live

streaming• Periscope (Twitter) posts live streaming video• Boomerang (Instagram) takes serial photos

@MainframePM

17

What can be done to prevent negative impacts of BYOD and Social Networking?

Twitter search• #mobile• #socialmedia

@MainframePM

Addressing Impacts

Bring Your Own Device

18 @MainframePM

“With BYOD gaining acceptance in enterprise level IT, [. . . ] any business enterprise [. . .] needs to be well versed in Microsoft Windows, Mac OS X, iOS and Android operating systems”

John KelleyEnterprise Executive: October 2014

“It’s a UNIX system. I know this.”Jurassic Park 1993

BYOD Security

19

• EMM (Enterprise Mobility Management)– People, processes & technology focused on

managing mobile devices, wireless networks, and other mobile computing services.

• MDM (Mobile Device Management)– Client/Server software solutions

• Server issues commands to mobile devices which the client implements.

@MainframePM

MDM Key features

20

• Mobile Device Management– PIN enforcement. Also seen as a password to the system, admins can manage

PINs to lock individual devices.– Full disk encryption -- or containerized encryption -- of data or disks. An MDM

product should be able to enforce encryption on any device it manages.– Remote wipe. In case of loss or theft.– Secures data at rest and in transit. Ability to stop certain data from being copied or

sent while on the device.– Jailbroken or rooted device detection. Jailbreaking poses a significant risk

because it allows users to install unapproved software and make changes to the mobile device's operating system (OS).

– GPS tracking, VPN integration, certificate management, and Wi-Fi policies.

• Look for MDM products that support all mobile devices: phones, and tablets.

@MainframePM

BYOD DO’s

21

• K Royal, Vice President, Assistant General Counsel for CellTrust, gives 5 best practices for securing mobile devices.

1. Develop practical policies & strategies.– Inform your employees of the

policies and mechanisms and educate them about why these are being implemented.

@MainframePM

BYOD DO’s

22

2. Use passwords, PINs, & other available security mechanisms such as fingerprint identification.– EMM/MDM platforms can force the

issue.

3. Use encryption.– Renders personal and corporate data

useless for the person who steals or finds the device

– Look for MDM solutions that support AES encryption for calls both as they occur and their archived recordings.”

@MainframePM

BYOD DO’s

23

4. Implement remote wipe and lock.

5. Control what can be stored & where.

– Email attachments are often stored on devices when they are opened. Look for EMM/MDM solutions that can turn off the automated process or require a password to access those attachments from storage.

@MainframePM

BYOD Don’ts

24

• MDM software typically does not

– perform web filtering

– backup data

• Separate software may be required.

@MainframePM

MDM installation

25

• MDM software may be provided as an OS installed on an enterprise virtual server, a container, using cloud-based SaaS, or as a dedicated hardware platform.

@MainframePM

• End-users download the associated app from the Apple App Store or Google Play.– Once downloaded and authenticated the site’s MDM policy is

installed on the device.

Social Media

26

• 10 Things you should NOT post on Social Media!– Condensed from multiple sources

@MainframePM

Social Media Standards

27

Things NOT to post on Social Media

1. Scheduling information, and current location indicating time away from home.

2. Your personal information, such as: phone numbers, email addresses, home address, children’s names, etc.

3. Password clues: favorite pet, mother’s maiden name, etc.

@MainframePM

Social Media Standards

28

Things NOT to post on Social Media4. Financial information:

credit cards, income, savings, or spending.

5. Work and ideas that are not copyrighted.

6. TMI about your life, relationship problems, inappropriate relationships, bodily functions, illnesses, ad nauseum…

@MainframePM

Social Media Standards

29

Things NOT to post on Social Media 7. Nude images, images of drug/alcohol abuse.

8. Embarrassing pictures/videos of yourself, your friends, co-workers, or family.

9. Negative opinions about your job, company, and bosses.

10. Extreme political, racial, or religious viewpoints, and offensive content.

@MainframePM

30

What’s in store for the future?

Debut 1931

@MainframePM

In August, biohackers took the stage at the DefCon hacker's convention in LasVegas. … 2015 was the first year the biohackers had their own breakout sessions.Alex Smith of the implant-vending firm Cyberise.me offered this provocative setup tohis session: "Ever cloned an office access card but been afraid you'd be caught andsearched? In this talk I'll show you how to clone RFID cards to subdermalimplants to avoid detection.

The RFID and near-field communication devices [. . .] have ranges of just a fewinches. That makes the idea of a hacker triggering the device from across the roompretty remote — not impossible, but less likely. Just be careful when you shakehands; the person you're touching could be interrogating your implant.

… an emerging technology that could doom future implants — wearable electronics.The goal of so-called "e-textiles" is to integrate the sensors so seamlessly that theyare indistinguishable from fabric. "We are in contact with textiles for more than 90percent of our lives, and they are starting to become intelligent," says one report fromthe market forecast firm IDTechX. "From clothing to bandages, bed linen to industrialfabrics, new products integrating e-textiles are being created." Why get an implantwhen your clothes can do the work without breaking the skin?

Dallas ObserverJanuary 5, 2016

Wearables and Implants

31 @MainframePM

• By 2020 5G networks (1-10Gps)Faster & more bandwidth

DARPA found an easy way to implant chips in brains

In both science and science fiction, the pinnacle of human evolution is a brain that connects directly to a computer.

Kristen V. Brown

Fusion.net 2/9/2016

Wearables and Implants

32 @MainframePM

Alec Ross: You Will Be Able to Speak 100 Languages 10 Years From Now

[. . .] Google Translate is the most astonishing piece of mobile software [. . .] It’s one step away from Douglas Adams’ “Babel Fish” [. . .]

Jim Edwards

Jan 15, 2015 Business Insider

we're still separated by the 6,500 spoken languages in the world. Skype Translate is, rather ambitiously, looking to change that.Translate adds real-time language translation in both audio and text to your Skype call.

Justin Mahboubian-Jones14 May 2015 Stuff.TV

33

Thank you!

@MainframePM

John Kelley - MainframePM

@MainframePM

Mobile, and Social Networking in the Enterprise