Mobile and Social Networking in the Enterprise
John G. Kelley @MainframePM
LinkedIn.com/In/MainframePM
InsertCustomSessionQR if Desired.
Background
• Over 40 years in Information Technology– USAF Computer Operations
• Honeywell GCOS • Burroughs & Univac• IBM VM with DOS III & OS/VS1• IBM PROFS Administrator • ARPANET connected DEC PDP 11/70• OASys (server) with networked Zenith 128 Personal Computers, Word Processing,
Spreadsheets
– Computer Associates • Systems Engineer supporting VM, VSE, and MVS Operations software
– Automated Operations, Report Distribution & Archiving, Automated Scheduling, Change Management, Tape Management Systems
• Regional Technical Manager
2 @MainframePM
Background
• Mobile Phone User for 30 Years!• Over 25 years Instructor/Consultant
• Mainframe– z/OS basics, TSO/ISPF, MVS/JCL, and REXX programming– Automated Operations, Scheduling, Report Distribution &
Archiving, Change Management, Tape Management
• UNIX/Linux– System use & administration, shell programming, automated
scheduling
• LinkedIn, Twitter, Tumblr, YouTube, & Periscope– MainframePM on all these Social Networks
3 @MainframePM
1970s &1980s• 1973 1st handheld mobile call• 1975 1st digital camera: 8 lbs .01 MP • 1978 UNIX to UNIX Copy Protocol
– UUCP leads to Usenet
• 1979 Usenet News Groups• 1980 CompuServe Chat• 1983 Cellular 1G network (analog) • 1984 Prodigy online portals & news• 1988 Internet Relay Chat (IRC): File sharing, link sharing
Evolution of Mobile and Social Networking
4 @MainframePM
1990s• 1990 1ST commercial digital camera
• 1991 Cellular 2G (digital) GSM system (Finland); Gopher: Menu-driven internet file access
The World-Wide Web is born through HTTP
• 1992 1st SMS Text sent by computer
• 1993 1st person to person text (Finland);1st Smartphone, IBM Simon;
1st Web Browser: Mosaic
• 1996 ICQ Multi-user messaging: Emoticons, and chat talk begins
• 1997 Six Degrees social network: Profiles & friends
• 1998 1ST downloaded additional content: ringtone; Mobile payments for
parking & vending machines (Finland)
• 1999 1st & 2nd commercial systems to mimic banks (Philippines)
Live Journal: Blogs, Forums & Groups
Evolution of Mobile and Social Networking
5 @MainframePM
21st Century: 2000 - 2004 • 2001
– 3G mobile network (Japan); Wikipedia, MySpace
• 2002– Friendster: Meet new people & expand your social network
• 2003– The Android Company: OS for Digital Camera to OS for Smartphones– LinkedIn: Business networking; MySpace: Private messaging, public comments– HI5: Photo sharing, social gaming & status updates
• 2004– Flickr: Photo sharing; Facebook: Harvard Only
Evolution of Mobile and Social Networking
6 @MainframePM
2005 - 2009 2005 Widespread 3G (200Kbps-2Mbps) networks make the mobile internet
practicalGoogle buys Android CompanyYouTube: Video streaming & sharingReddit: Entertainment & networking
• 2006 Facebook goes public for users 13 and older: over 1.4 billionusers by the end of the year.Twitter: micro-blogging
• 2007 iPhone; Android OS by GoogleTumblr: Live streaming & micro-blogging
2009 1st 4G LTE mobile networks (Norway & Sweden)Whatsapp Personal & group chat for iOS, Android, Windows phones
Evolution of Mobile and Social Networking
7 @MainframePM
2010 – 2015 2010 4G LTE (100Mbps-1Gps: United States & Japan)
Instagram: Photo sharing; Pinterest: Shared interests
• 2011 Instagram for iOS• 2012 Snapchat: Limited life photo-chatting
Digital camera sales peak; Instagram for AndroidFacebook buys Instagram
• 2014 Digital camera sales stabilize at 30% of peak due mostlyto Smartphones
• 2015 Periscope: Live video streams from TwitterFacebook averages just under 1.2 billion active users monthly out of 1.7-1.8 billion users. (Twitter 288 million)
Evolution of Mobile and Social Networking
8 @MainframePM
• iPhone 6 Plus– Dual core, 1GB RAM, 128GB Storage– 8MP back + 1.2MP front cameras, 5.5” HD Screen
• Galaxy S6– Octa-core, 3GB RAM, 128GB Storage– 16MP back + 5MP front cameras, 5.1” HD+ Screen
• LG G4– Hexa-core, 3GB Ram, 32GB Storage– Expandable to 2 TB Storage!– 16MP back + 8MP front cameras, 5.5” HD+ Screen
Smartphone Specs 2015
9 @MainframePM
Pew Research found
• 86% of people aged 18 to 29 have a smart phone.
• 83% of those ages 30 to 49, and
• all told, 68% of adults have a smartphone.
• The only group more likely to have a smartphone than Millennials was people living in households earning $75,000 or more annually, Pew found. There, 87% had them.
Elizabeth Weise, USATODAY 3:37 p.m. EDT October 29, 2015
Mobile and Social Media Impacts
10 @MainframePM
• Black Friday 2015– Mobile shopping visits
exceed desktop visits for the 1st time.
– Mobile drove 37% of actual online sales.
• 22% Smartphones
• 15% TabletsAndroid Central 11/28/2015
“For marketers, mobile apps represent a tremendousopportunity to directly connect with their most loyalcustomers, while delivering revenue-impacting customersatisfaction and conversion metrics.”
The American Marketing Association
“Because it appeared quickly, social media has developeda reputation by some for being a passing marketinginterest, and therefore, an unprofitable one. The statistics,however, illustrate a different picture. According toHubspot, 92% of marketers in 2014 claimed that socialmedia marketing was important for their business, with80% indicating their efforts increased traffic to theirwebsites. And according to Social Media Examiner, 97%of marketers are currently participatingin social media—but 85% of participants aren’t surewhat social media tools are the best to use.”.
Jayson DeMersSEO and online marketing strategist, in Forbes.com
Mobile and Social Media Impacts
11 @MainframePM
Mobile and Social Media Impacts
12
• The “Company App Store” – Internal social media sites expanding the intranet and making it
mobile. • Enterprise Systems Automation: Is There An App For That?
– Providing platform and device-specific interfaces, not based on where the software runs, but where end users need to access it is essential. [. . .] software needs to be aware of the devices that may access it [. . . and] your mobile users are likely to ask, “Is there an app for that?”
John KelleyEnterprise Executive: October 2014
– Google search changes will promote mobile-friendly sites• By Zoe Kleinman Technology reporter, BBC News
@MainframePM
Mobile and Social Media Impacts
13
• Social Networks for the Enterprise– Facebook at Work: a business-focused version of Facebook using tools you’re already familiar with to
interact with coworkers. Work accounts are only visible to other people at your company.
– Google at Work: includes tools like Gmail, Drive & Calendar to run Google globally, and Google Cloud Platform solutions that power services like Search and YouTube.
– Yammer: Microsoft’s business social network, integrated within Office 365 to allow teammates to work and comment on the same documents from anywhere in the world. The network is private, but you can loop customers and vendors into conversations.
– Convo: Described as a “platform for work conversations,” Convo provides messaging, a real-time feed for all your conversations, and the ability to highlight and comment on documents without having to leave the platform.
– Socialcast: This network’s unique selling point is how easy it makes it to solicit feedback from large and small groups—including a digital form of a town hall. It also includes the ability to embed real-time feeds into conversations, reducing the need to switch between applications mid-conversation.
Source: HP Technology at Work / 2016 /February
@MainframePM
Mobile and Social Media Impacts
14
• Take “work from home” to “work from anywhere”
– Wifi Hotspots & 4G LTE capable devices means you don’t have to find the nearest Panera, or Starbucks to get it done.
– Apps for Remote Access: SSH, FTP, RDP, TN3270
• Can utilize VPN for secure access, but they may also store sensitive data, such as passwords, on the device.
@MainframePM
Mobile and Social Media Impacts
15
• BYOD – Bring your own device– Unavoidable unless you ban all personal computers, tablets,
and phones from the premises. – It’s likely that employees will have sensitive enterprise
information on their personal devices.• Employees may note access codes and passwords on
their portable devices, and don’t assume that they will use a password vault app.
• It’s possible this highly sensitive data is stored in plain text on a device with no encryption, and no access protection.
3 out of 4 professionals use personal devices to access corporate data
@MainframePM
Mobile and Social Media Impacts
16
• Breaking News!– Photography, Video, and Audio Recording apps on
Smartphones• Full HD or HD+ photos and videos• Often do not require unlocking the phone to
activate. – Every person with a Smartphone is a potential
reporter.– Social Media apps for video capture & live
streaming• Periscope (Twitter) posts live streaming video• Boomerang (Instagram) takes serial photos
@MainframePM
17
What can be done to prevent negative impacts of BYOD and Social Networking?
Twitter search• #mobile• #socialmedia
@MainframePM
Addressing Impacts
Bring Your Own Device
18 @MainframePM
“With BYOD gaining acceptance in enterprise level IT, [. . . ] any business enterprise [. . .] needs to be well versed in Microsoft Windows, Mac OS X, iOS and Android operating systems”
John KelleyEnterprise Executive: October 2014
“It’s a UNIX system. I know this.”Jurassic Park 1993
BYOD Security
19
• EMM (Enterprise Mobility Management)– People, processes & technology focused on
managing mobile devices, wireless networks, and other mobile computing services.
• MDM (Mobile Device Management)– Client/Server software solutions
• Server issues commands to mobile devices which the client implements.
@MainframePM
MDM Key features
20
• Mobile Device Management– PIN enforcement. Also seen as a password to the system, admins can manage
PINs to lock individual devices.– Full disk encryption -- or containerized encryption -- of data or disks. An MDM
product should be able to enforce encryption on any device it manages.– Remote wipe. In case of loss or theft.– Secures data at rest and in transit. Ability to stop certain data from being copied or
sent while on the device.– Jailbroken or rooted device detection. Jailbreaking poses a significant risk
because it allows users to install unapproved software and make changes to the mobile device's operating system (OS).
– GPS tracking, VPN integration, certificate management, and Wi-Fi policies.
• Look for MDM products that support all mobile devices: phones, and tablets.
@MainframePM
BYOD DO’s
21
• K Royal, Vice President, Assistant General Counsel for CellTrust, gives 5 best practices for securing mobile devices.
1. Develop practical policies & strategies.– Inform your employees of the
policies and mechanisms and educate them about why these are being implemented.
@MainframePM
BYOD DO’s
22
2. Use passwords, PINs, & other available security mechanisms such as fingerprint identification.– EMM/MDM platforms can force the
issue.
3. Use encryption.– Renders personal and corporate data
useless for the person who steals or finds the device
– Look for MDM solutions that support AES encryption for calls both as they occur and their archived recordings.”
@MainframePM
BYOD DO’s
23
4. Implement remote wipe and lock.
5. Control what can be stored & where.
– Email attachments are often stored on devices when they are opened. Look for EMM/MDM solutions that can turn off the automated process or require a password to access those attachments from storage.
@MainframePM
BYOD Don’ts
24
• MDM software typically does not
– perform web filtering
– backup data
• Separate software may be required.
@MainframePM
MDM installation
25
• MDM software may be provided as an OS installed on an enterprise virtual server, a container, using cloud-based SaaS, or as a dedicated hardware platform.
@MainframePM
• End-users download the associated app from the Apple App Store or Google Play.– Once downloaded and authenticated the site’s MDM policy is
installed on the device.
Social Media
26
• 10 Things you should NOT post on Social Media!– Condensed from multiple sources
@MainframePM
Social Media Standards
27
Things NOT to post on Social Media
1. Scheduling information, and current location indicating time away from home.
2. Your personal information, such as: phone numbers, email addresses, home address, children’s names, etc.
3. Password clues: favorite pet, mother’s maiden name, etc.
@MainframePM
Social Media Standards
28
Things NOT to post on Social Media4. Financial information:
credit cards, income, savings, or spending.
5. Work and ideas that are not copyrighted.
6. TMI about your life, relationship problems, inappropriate relationships, bodily functions, illnesses, ad nauseum…
@MainframePM
Social Media Standards
29
Things NOT to post on Social Media 7. Nude images, images of drug/alcohol abuse.
8. Embarrassing pictures/videos of yourself, your friends, co-workers, or family.
9. Negative opinions about your job, company, and bosses.
10. Extreme political, racial, or religious viewpoints, and offensive content.
@MainframePM
In August, biohackers took the stage at the DefCon hacker's convention in LasVegas. … 2015 was the first year the biohackers had their own breakout sessions.Alex Smith of the implant-vending firm Cyberise.me offered this provocative setup tohis session: "Ever cloned an office access card but been afraid you'd be caught andsearched? In this talk I'll show you how to clone RFID cards to subdermalimplants to avoid detection.
The RFID and near-field communication devices [. . .] have ranges of just a fewinches. That makes the idea of a hacker triggering the device from across the roompretty remote — not impossible, but less likely. Just be careful when you shakehands; the person you're touching could be interrogating your implant.
… an emerging technology that could doom future implants — wearable electronics.The goal of so-called "e-textiles" is to integrate the sensors so seamlessly that theyare indistinguishable from fabric. "We are in contact with textiles for more than 90percent of our lives, and they are starting to become intelligent," says one report fromthe market forecast firm IDTechX. "From clothing to bandages, bed linen to industrialfabrics, new products integrating e-textiles are being created." Why get an implantwhen your clothes can do the work without breaking the skin?
Dallas ObserverJanuary 5, 2016
Wearables and Implants
31 @MainframePM
• By 2020 5G networks (1-10Gps)Faster & more bandwidth
DARPA found an easy way to implant chips in brains
In both science and science fiction, the pinnacle of human evolution is a brain that connects directly to a computer.
Kristen V. Brown
Fusion.net 2/9/2016
Wearables and Implants
32 @MainframePM
Alec Ross: You Will Be Able to Speak 100 Languages 10 Years From Now
[. . .] Google Translate is the most astonishing piece of mobile software [. . .] It’s one step away from Douglas Adams’ “Babel Fish” [. . .]
Jim Edwards
Jan 15, 2015 Business Insider
we're still separated by the 6,500 spoken languages in the world. Skype Translate is, rather ambitiously, looking to change that.Translate adds real-time language translation in both audio and text to your Skype call.
Justin Mahboubian-Jones14 May 2015 Stuff.TV