1 / 38

Technology and the CBO: What should be on your horizon.

Technology and the CBO: What should be on your horizon. Michael Dodge California Financial Services 209-595-0791 mdodge@calschools.com. New or Old CBO what should we be looking at in Technology?.

mira-travis
Télécharger la présentation

Technology and the CBO: What should be on your horizon.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technology and the CBO: What should be on your horizon. Michael Dodge California Financial Services 209-595-0791 mdodge@calschools.com

  2. New or Old CBO what should we be looking at in Technology? • If we were to turn the clock back 20 years and predict what sorts of technology business people would be using in the future, the Internet and cell phones would have ranked high on the list. 

  3. New or Old CBO what should we be looking at in Technology? • A similar exercise today is harder to do, given the exponential pace at which technology is advancing.  So what should we be expecting or planning for? • Lets look at short term

  4. New or Old as the CBO you should know: • Evaluating your Network • What does BYOD mean? • Tablets toys or business tools • The cloud and the future • What’s in it for me?

  5. Evaluating your network • The future for technology is not the computer, tablet or smart phone but rather the network. • We should be building robust networks for the future. • How do you evaluate your network?

  6. Network Terms • Datagram • DCE • DDNS (Dynamic Domain Name System) • Default Gateway • DECnet • Default route • DHCP (Dynamic Host Configuration Protocol) • Distribution Layer • DMZ (Demilitarized Zone) • DNS (Domain Name Server) • Domain • Download • DSI • DSL (Digital Subscriber Line) • DSSS (Direct-Sequence Spread-Spectrum) • DTIM (Delivery Traffic Indication Message) • Dynamic IP Address • E-1 • E3 • EAP (Extensible Authentication Protocol) • EAP-PEAP (Extensible Authentication Protocol-Protected Extensible AuthenticationProtocol) • EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) • Encapsulation • Encryption • Ethernet • Ethernet Switch • Fault Tolerance • Fibre Distributed Data Interface (FDDI) • Fiber Optics • Finger • Firewall • Firmware • FTP (File Transfer Protocol) • Fragment • Fragmentation • Fragmentation • Frame • Full Duplex • Fully Qualified Domain Name (FQDN) • Gateway • Gbps (Gigabits per second) • Half Duplex • Hardware • Hacker • Header • Heterogeneous network • High Performance Parallel Interface (HIPPI) • Host • Hub • HTTP (HyperText Transport Protocol) • IEEE (The Institute of Electrical and Electronics Engineers) • Infrastructure • Infrastructure Mode • Internet • Internet Control Message Protocol (ICMP) • Internetwork Packet eXchange (IPX) • IP Address • IPCONFIG • IPSec (Internet Protocol Security) • ISM band • ISP (Internet Service Provider) • LAN (Local Area Network) • Layer • Latency • LEAP (Lightweight Extensible Authentication Protocol) • Local Loop • Low Voltage Differential Signaling (LVDS) • 802.11a • 802.11b • 802.11g • Access Point • Adapter • Ad-hoc • AES (Advanced Encryption Standard) • Amplifier • Asymmetric Digital Subscriber Line (ADSL) • Asynchronous Transfer Mode (ATM) • Backbone • Bandwidth • Beacon Interval • Bit (Binary Digit) • Boot • Bridge • Broadband • Broadcast storm • Browser • Buffer • Burst Mode • Byte • Cable Modem • Challenge-Handshake Authentication Protocol (CHAP) • Checksum • Circuit switching • Client • Client-server model • Compression • Core Layer • Congestion • Connection Oriented • Connectionless • Cryptography • CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) • CTS (Clear To Send) • Daisy Chain • Database

  7. Network Terms • MAC (Media Access Control) Address • Mbps (Megabits Per Second) • Media Gateway Control Protocol (MGCP) • Medium • Multicasting • Multilink Point-to-Point Protocol (MP) • Multimedia • Multiplexing • Multipoint • MultiProtocol Label Switching (MPLS) • NAT (Network Address Translation) • NAT (Network Address Translation) Traversal • Network • Network Layer • NNTP (Network News Transfer Protocol) • Network Time Protocol (NTP) • Node • Octet • OFDM (Orthogonal Frequency Division Multiplexing) • Optical Fiber • OSI • Packet • Packet Switching • Passphrase • PEAP (Protected Extensible Authentication Protocol) • Pipelining • Ping (Packet INternet Groper) • PoE (Power over Ethernet) • POP3 (Post Office Protocol 3) • Port • PPPoE (Point to Point Protocol over Ethernet) • PPTP (Point-to-Point Tunneling Protocol) • Preamble • RADIUS (Remote Authentication Dial-In User Service) • Repeater • Requests for Comments (RFCs) • RJ-45 (Registered Jack-45) • RJ-45 (Registered Jack-45) • Roaming • Router • RTP (Real-time Transport Protocol) • RTS (Request To Send) • Serial Line Internet Protocol (SLIP) • Server • SMTP (Simple Mail Transfer Protocol) • SNMP (Simple Network Management Protocol) • Software • SOHO (Small Office/Home Office) • SPI (Stateful Packet Inspection) Firewall • Spread Spectrum • SSID (Service Set IDentifier) • Static IP Address • Static Routing • STM-1 • Subnet Mask • Synchronous Transfer Mode (STM) • Switch • T1 • T3 • TCP (Transmission Control Protocol) • TCP/IP (Transmission Control Protocol/Internet Protocol) • Telnet • Terminal server • Throughput • Time Division Multiplex (TDM) • TFTP (Trivial File Transfer Protocol) • TKIP (Temporal Key Integrity Protocol) • TLS (Transport Layer Security) • Token Ring • Topology • TX Rate • UDP (User Datagram Protocol) • Upgrade • Upload • URL (Uniform Resource Locator) • Voice over IP (VoIP) • VPN (Virtual Private Network) • WAN (Wide Area Network) • Wavelength • Wavelength Division Multiplexing (WDM) • WEP (Wired Equivalency Protocol) • WINIPCFG • WLAN (Wireless Local Area Network) • WPA (Wi-Fi Protected Access) • WPA2 (Wi-Fi Protected Access 2) • WPA-Personal • WPA-Enterprise • xDSL

  8. Overwhelmed with Terms? What does all this mean to me as the CBO?

  9. Basic Terms the CBO needs to know: • Latency • Mbps • OC1 • PoE • Router • Switch • T1 • T3 • Throughput • VLAN • WAN • WLAN • Access Point • Backbone • Bandwidth • Core Layer • Cat3, Cat5, Cat5e, Cat6 • Distribution Layer • DSI • DS3 • Fiber • Gigibit – Gbps • LAN • Layer

  10. Wireless Speed • Speed of wireless should be looked at from throughput. The term “throughput” refers to the amount of video, music, Internet traffic, or gaming data that can pass through your wireless network under real-world conditions. • Wi-Fi Standard / Data Transfer Rate / Throughput Rate. 802.11b / 11Mbps / 4Mbps802.11a / 54Mbps / 23Mbps802.11g / 54Mbps / 19Mbps802.11n / 300Mbps / 82Mbps

  11. Wire Speed

  12. Network for layman • Think of a Highway • 2 lanes, 4 lanes, 8 lanes • Number of cars • Speed of traffic • Type of vehicles

  13. Simple things to check • Speed Tests – upload / download • Bandwidth – size of your pipe • Latency – distance from your source • Network Bottle necks • Access point • Switches • cabling • Device Bottle necks • Network card in device • Chip speed of computer • Video card speed in computer

  14. BYOD What does it really mean? • BYOD and District-issued smart devices are no longer simple text-based email readers. Rather, they are high-resolution, video-capable devices that are purely wireless and mobile.

  15. BYOD • Applications being run on smart devices are robust, real-time, and mission critical. Recent studies indicate that almost 66 percent of the world’s mobile data traffic will be video by 2014. Demanding applications combined with rapid growth can quickly overwhelm existing wireless local area network (WLAN) architectures, significantly affecting users’ experiences and productivity.

  16. Challenges of BYOD • Supporting Wireless network • Controlling Security of the Network • Supporting the Unknown Device • Bandwidth • FERPA, CIPA, HIPPA, PCI DSS – Compliance Issues • Family Educational Rights & Privacy Act • Children’s Internet Protection Act • Health Information Portability & Accountability Act • Payment Card Industry Data Security Standard • Costs

  17. TABLETS or TOYS • For Business and Administration are Tablets Toys or Business Tools? • What are you using them for? • Note taking? • Business work? • Email?

  18. TABLETS or TOYS • Trend or Hype? • Do they support Excel, Power point not just word processing? • Do they support Outlook or District email? • Do they support local printing? • Do they support attendance applications? • Do they support State Applications (SACS,etc)?

  19. TABLETS or TOYS • Are they secure? • Are they a District Standard? • The Future or a passing Fad?

  20. What is Cloud Computing • The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

  21. Cloud Computing – Applications & Docs Via the Web

  22. Cloud Computing – Applications & Docs Via the Web

  23. Advantages Of Cloud Computing • Reduced CostCloud technology is paid incrementally, saving organizations money. • Increased StorageOrganizations can store more data than on private computer systems. • Highly AutomatedNo longer do IT personnel need to worry about keeping software up to date. • FlexibilityCloud computing offers much more flexibility than past computing methods. • More MobilityEmployees can access information wherever they are, rather than having to remain at their desks. • Allows IT to Shift FocusNo longer having to worry about constant server updates and other computing issues, government organizations will be free to concentrate on innovation.

  24. Disadvantages of Cloud Computing • Need access to the internet • Need appropriate bandwidth and speed • Reliability • Lack of control • Locked into apps

  25. The Near Future • Portable Power • Wireless Power • Near Field Communications • BYOD Connections • Wearable Computers • 3-D Printers • Handheld Projectors • Personal Assistants • Robot Cars

  26. Portable Power • Most technology is subject to Moore’s Law, which says things gets better and cheaper the longer we go. As any smart phone user knows, batteries have somehow resisted this trend. • Despite the increasingly complex and amazing things phones can do – or actually, because of them – battery life is either not keeping pace or getting shorter. Until a breakthrough is made, we’ll have to improvise. • A good solution in the meantime is portable power in the form of separate charging devices.

  27. Wireless Power • Protective cases that double as charging skins are making this possible for exisiting technology (such as those from Hyperion and Myedour) • So far, most such wireless power devices – including Duracell’s popular PowerMat, which charges a number of gizmos at once – have used magnetic induction, which requires physical contact. • On the horizon, however, is magnetic resonance technology, which allows charging from a few feet away. • That means phones and other devices are finally set to lose their last remaining tethers – the cord.

  28. Near Field Communications • Speaking of wireless technologies, near-field communications (NFC) has been that young, up-and-coming rookie who hasn’t yet fulfilled his potential for several years now. • NFC has been touted as the key to mobile payments – or m-commerce – since it allows the secure transfer of data through the simple tapping together of two enabled devices. • The holdup, according to m-commerce experts, has been in deciding how to slice up transaction fees. The traditional partners in the system, from credit card networks, to issuing banks, to merchants, have resisted giving up cuts to the newcomers, which include software and handset makers and even wireless providers. But some of those new players, notably Google, don’t really care about getting financial remuneration every time the user makes a purchase – they’re more interested in the data he or she is generating.

  29. BYOD Connections • BYOD connections are growing everywhere: • Doctors office • Starbucks • MacDonalds • Workshops • Schools • With the growth of smartphones we are offering connections for smart devices everywhere. • The trend makes a lot of sense, since smartphones are very personal gadgets – it’s not called an “i” phone for nothing – and workers don’t want to have to lug two of them around. Work phones and personal phones are thus destined to merge, which presents something of a problem for corporate information technology departments. How does a business department let workers use their own devices, yet still keep them secure?

  30. Wearable Computers • Google Glass, Wrist Phones, etc…. • In demos, Google’s glasses have enabled wearers to take pictures and videos, have video conferences with each other, map directions and navigate, and otherwise perform many smartphone functions. Yet, all of this will happen on a screen that is effectively worn in front of your eyes. • Apple, Samsung and others are also reportedly working on “smart” watches, which will similarly bring many smartphone functions to a wrist-worn device. • It may sound goofy or science-fictiony right now, but application developers will inevitably think up ways to use these new devices in ways that will probably make them indispensable.

  31. 3-D Printers • Technology analysis firm Gartner might have put three-dimensional printing at the very top of its annual hype cycle last year, but that’s not necessarily a knock on the field. • The popular notion about 3-D printing right now is that it’s mainly being used by hobbyists to create simple toys and knick-knacks, but according to a recent report, this sort of “additive manufacturing” accounts for between 20 and 25 per cent of the industrial parts being made today, which puts the technology well on its way to wide-scale acceptance.

  32. Handheld Projectors • So you’ve got a PowerPoint presentation to make? • There are a few options for showing it, with the most common – and most old-school – involving the lugging of your laptop to the conference room, where it’s hooked up to a projector. • Some smartphones can do this now, although the big projector is still necessary. • Enter pico projectors: tiny devices that are even smaller than the smartphone itself. They’re not as good or bright as their bigger cousins, but they’re also completely portable and getting better all the time, so much so that phone makers are starting to incorporate them into their devices themselves. Samsung tried it last year with the Galaxy Beam, but the phone didn’t do very well because of its otherwise underwhelming features. • Packing pico projectors into smartphones is still a little on the expensive side, but with the cost of the technology coming down, they will inevitably be finding their way into more and more devices.

  33. Personal Assistants • Computers are getting pretty good at predicting things about us, provided we give them enough information to work with. • Web browsers watch our browsing and suggest the next thing for us. • Siri and others work by starting them up and asking for help. • That’s changing, though, with machines starting to understand context better. Google Now, a feature in Android phones launched last year, is a good example. If you input an appointment into your calendar, for example, Google Now will map out directions to it and scan traffic leading up to it, then alert you as to when it thinks you should leave. • Secretaries and real-life assistants should beware – their jobs are endangered.

  34. Robo Cars • So far, the champion of the cause has been Google, which sees robot cars as a project that simply needs to happen. Theoretically, the company could connect such vehicles to its navigation systems and watch the ad revenue from participating businesses roll in. • But traditional car companies have joined in, too, with both Lexus and Audi legitimizing the field this year with announcements at the Consumer Electronics Show in Las Vegas. • The race – pardon the pun – to develop more autonomous vehicles is on, with developments slowly leaking into commercialization along the way. Many of the newest models already have lane and distance sensors, as well as cameras in the back to detect oncoming hazards. Autonomous driving is likely to first happen on highways, thereby freeing drivers to do more productive things. • It won’t happen tomorrow, but with the competition joined, it’s likely to arrive sooner than anyone expects.

  35. What’s in it for me? • How many take notes? • How many use paper pads or note books? • How many use tablets? • How do you organize your notes? • How do you find topics you have taken notes for?

  36. A Deeper look at Evernote • Tired of searching through the mountain of papers on your desk for that post-it with your meeting date? • Try Evernote, an information organizational tool. Evernote works with three basic functions: capture, access, and find. Capture all of your information, from doctor appointments to business meetings, access it from a host of different sources like your computer, smart phone, or tablet, and find everything in mere moments. With all of your information stored in one clearly marked space, you’ll save time and energy best spent elsewhere, like your growing company! Best of all, Evernote is a free application, so you can test out their organizational method and see if it is the right fit for you, without breaking the bank.

  37. Evernote Demo • Notebooks • Stacks • Notes • Audio • Clips • Search • Share • Attachments

  38. Questions - Comments • Michael Dodge – 209- 595-0791 • mdodge@calschools.com

More Related