+ All Categories
Home > Presentations & Public Speaking > Jim Novack in #awe2015 with Talent Swarm. Best practices tips

Jim Novack in #awe2015 with Talent Swarm. Best practices tips

Date post: 12-Feb-2017
Category:
Upload: dynatec-sa-especialistas-en-proyectos-de-ingenieria-a-nivel-mundial
View: 413 times
Download: 0 times
Share this document with a friend
35
Jim Novack eyebee Talent Swarm www.talentswarm. com June 8, 2015 How to Manage Enterprise AR Safety & Risks
Transcript
Page 1: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

Jim Novackeyebee Talent Swarmwww.talentswarm.comJune 8, 2015

How to Manage Enterprise AR Safety & Risks

Page 3: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 3

Airbnb is rolling out a new identity verification program that will eventually require all users around the world to connect their online identities with conventional forms of identification.Users have the choice of confirming their birthdate and partial social security number or uploading a scanned copy of a government ID and linking it with an online login through Airbnb, Facebook or LinkedIn. A ‘Verified ID’ badge will appear on profiles of users who have completed the process.“Trust is the key to our community. There is no place for anonymity in a trusted community,” Airbnb said in a blog post.The company said it would ask a quarter of its users in the United States to verify their IDs starting today, but will soon “expand this requirement to users around the world.”

Page 4: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 4

Intrusion Protection (Perimeter defense)

Page 5: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 5

Playboy Mansion secret access

Page 6: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 6

A new electronic personal identity card will be introduced in Germany on 1 November 2010. The complex overall system for managing the mandatory card and its contactless chip is on display at CeBIT 2010. The card has three functions: 1. biometric identity verification, 2. electronic identity verification, 3. authenticated electronic signature. Identity Verification (Only Authorized Enter)

Page 7: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 7

Identity TheftTailgating

Page 8: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 8Trojan Horse

Page 9: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 9

Page 10: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 10

Mimetic Polyalloy

Page 11: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 11

Biometric Verification

Page 12: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 12

Minority Report

Page 13: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 13

Page 14: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

• Telepresence (a remote viewer)

5/18/15 www.theAREA.org 14

Page 15: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 15Robonaut

Page 16: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 16

The Jedi Council Room - the ultimate telepresence conference room

This sounds like an extension of a Microsoft Research project, Viewport, that was first announced in 2012. The team in charge of Viewport proposed a system that included a camera rig that had a number of color and infrared cameras, along with a series of infrared projectors. The project said that the goal was to "reconstruct a 3D representation in real-time, which will be rendered in a shared virtual environment for immersive telecommunication."

http://gajitz.com/2-places-at-once-telexistence-bot-has-3-human-senses/

Page 17: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

• Augmented Reality (receiving information from a third party)

5/18/15 www.theAREA.org 17

http://umbra.sandia.gov/applications.html

DaqriODG

Page 18: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

• Virtual Reality (artificial environment)

5/18/15 www.theAREA.org 18

Page 19: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 19Talent Swarm

Page 20: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 20

Page 21: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

215/18/15

How to Manage Enterprise AR Safety & Risks?

Page 22: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 22

How to Manage Enterprise AR Safety & Risks?

Page 23: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

• Confidentiality (Authentication and Encryption and Private / Confidential)

• Integrity(Message not Modified)

• Availability(Usable)

5/18/15 www.theAREA.org 23

http://cacm.acm.org/magazines/2014/4/173222-security-and-privacy-for-augmented-reality-systems/abstract

Data Security Basics:

Page 24: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

AR “Laws” Should Minimally Account for:7. Do No Harm (3 Laws…)6. Respect privacy5. Activity Auditing (Intention Proper and DNH)4. Provide accuracy and source of information (level of trust and affinity to user)3. Verify identity of transmitter and receiver2. Trusted network with Confidentiality, Integrity of Messaging and Availability7. Unalterable Device ID (like cell phone IMEI)

5/18/15 www.theAREA.org 24

Page 25: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 25

● User identification● Key seed generation● Centralized Management ● Statistics Management

Encrypted message through regular communications network.

Authentication and seeds through Central Authority.

Central Authority (CA)

Page 26: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 26

All information is encrypted.

The central server contains information on the agenda, the keys and is responsible for verifying the identity of users and devices.

Communications (messages) never go through the central server.

The control packets are also encrypted communication.

Page 27: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 27

Who is providing the info?

Who has access to the video and audio streams?

Page 28: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

Activity Auditing (Intention Proper and Do No Harm)

5/18/15 www.theAREA.org 28

Page 29: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 29

Page 30: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 30

Page 31: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 31

Page 32: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 32

Page 33: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 33

Page 34: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 34

“Soft Landing”

Page 35: Jim Novack in #awe2015 with Talent Swarm. Best practices tips

5/18/15 www.theAREA.org 35

Booth 84 – AWE 2015Jim [email protected]

Come see us on July 1 in Sheffield, England at AR in the Strategic Enterprise (ARise)

Thank you!

Talent SwarmCollaborative Work Environment

eyebee AR Certification Services


Recommended