Category Archives: iPhone
I headed into my Lost Coast Trail backpacking trip confident that I would accomplish my goal to hike from Mattole Trailhead to Shelter Cove and return. I knew it was going to rain a couple of days, but the forecast called for 10 mph winds. I also knew I had some bad timing for when the low tides occurred during the first part of the week. But I did not dig deep enough into this data to be properly prepared for what was ahead.
The drive down to northern California through the Redwoods was great, my car loves roads like the Redwood Highway. I visited the BLM office in Arcata first thing Monday morning to get my waterproof map, so with that map also on my iPhone equipped to use GPS, I was well prepared for navigation.
The low tide on Monday was not going to allow me to get past the first high tide hazard stretch so I had a leisurely hike past a herd of cattle to end up camping next to the Punta Gorda Lighthouse. It was a beautiful evening as I overlooked a beach full of seals.
Low tide on Tuesday was at 9:33 am at 3.2 feet, so I entered the beginning of this 4 mile stretch before 9:00 am. Based on most reports I had read this stretch was not going to be a problem even if you were a few hours on either side of low tide. Unfortunately, I did not consider the actual height of the low tide. The trek through this segment was tough even without navigating the dangerous rock points of which there are about 5 that are really challenging. Some you can climb up and over, but the rocks were really slippery probably due to the higher then normal waves preceding the approaching storm. So I worked my butt off hiking over the beds of football size boulders. As I neared the last few hazard spots it seemed like it was far more dangerous then it should have been.
Then the last point before Spanish Flat nearly did me in. It was a point where you had to go between a large rock as the waves were crashing, however, it was all under water. As I tried to see around the corner to determine what I was up against I caught a full face on wave that nearly pulled me into the ocean. At that point I couldn’t worry about waiting for the best wave timing so I jumped into waist deep water and made it around. I was soaked but relieved to have survived.
I stopped at Spanish Flat, put on dry clothes and checked the tide tables to discover that the low tides that I was experiencing were the highest low tides of the year. That explained things, but now I was concerned about the next day’s stretch of tide hazardous coast with another 3.2 foot low tide, not to mention my concern about coming back.
So I opted to camp at a nice beach fortress just below Spanish Ridge. The winds were gaining strength which was good for drying out but it was also a bit foreboding knowing that rain was on the way. Yep, the rain started at sundown and the wind just kept getting stronger.
I decided to stay put through Wednesday with plans to hike up the Spanish Ridge Trail over to the Cooksie Spur Trail on Thursday.
I was up before sunrise Thursday morning with my backpack ready to go, just needed to take down the tent. I was so happy that it had not been raining for a few hours and the tent was dry. Unfortunately all hell broke loose at sunrise. The rain and the wind hit what I would call typhoon force. My line holding my tent fly broke, my tent stakes were being uprooted, water was rushing in so I had to go. Taking down a tent in gale force winds is challenging but I captured everything, but somehow lost my reading glasses. Of course I was instantly soaked but my Marmot Gore-Tex jacket was taking care of me.
I decided to go straight up the side of Spanish Ridge and intersect with the trail which worked out fine thanks to the map I had with GPS location on my iPhone. The wind was blowing from the south so it was mostly going to be at my back.
My goal was to climb the 2400 foot Spanish Ridge Trail and then take the Cooksie Spur Trail over to Cooksie Creek since I would need water. Well half way up the climb (see blue dot on map) I was realizing that this wind was a real problem. As it whipped up the slopes it must have gained even more power, so much so that I was barely able to stand up. Then I really got hit, actually blown off my feet, and I was a 240 lb object. I was totally expose at this point, no trees or large rocks to shelter behind, so I laid face down next to a small rock that gave my head a little relief. I was pinned down about 45 minutes with the wind occasionally lifting me when it hit me between my body and backpack. Oh yes, and the rain was as hard as you could imagine. So here I am face down trying not to be blown off the mountain and I’m getting cold. The night before I had listened to a chapter in Lawton Grinter’s book “I Hike” about his experience with hypothermia, so I knew that the shivering, loss of feeling in my hands and feet and the desire to burrow were typical of hypothermia. What was a bit fascinating from being in this predicament was getting a taste of what it may be like to face the real possibility of death so my conversation with God was with great urgency.
Of course the human spirit doesn’t just give up, I had to do something because my current situation was hopeless. I fought to stand which was really hard because my legs were not working as I would have liked. Something told me that I needed to climb out of this, however, I had no way of knowing what was ahead, but my GPS map at least assured me that I was on track. I walked with my back to the wind using my trekking poles as braces to counter the force and I made it to an area where a small cornice offered some relief from the heavy wind. At this point I knew I had to warm up so I pulled out a wool shirt to add a layer under my rain jacket. Buttoning that shirt with my cold fingers was far more challenging than I could have imagined. This seemed to give me new motivation to press on at all costs. And pressing on was brutal. There were a few sections where the wind was at my back so I used it to essentially fly up the mountain, however, coming to a stop was never pretty. Then my backpack cover blew loose but was still attached to my backpack creating a spinnaker type sail that dragged me for 20 feet. In between my attempts to move forward I spent more time on my face trying to regroup. Overall it took me about 3 hours to travel about a mile through the really bad section of the ridge.
Of course I did finally make it to the top and when I got off the Spanish Ridge Trail and onto the much calmer Cooksie Spur Trail I was singing praise to God for allowing me to live. From the looks of the map I knew that the Cooksie Trail was also going to present an exposed ridgeline so I opted for the best tree sheltered spot to pitch my tent with the goal to get into my sleeping bag and warm up. That evening was not great but it was so much better than what I had just experienced. I was very content to make it through the night with just 13 ounces of water. I had dry clothes, mostly wool, so I did eventually warm up.
The forecast for Friday was sunshine which held true, so I set out with the need to get to Cooksie Creek for water. I also decided that I had had enough of the Lost Coast and I really wanted to hike back to my car with dreams of a good meal and warm bed. But the hike out Friday turned out to be a lot tougher than I expected. Thank God for my GPS map locator since finding the trail to the creek was rather confusing. For some reason I thought that the trail was going to follow the creek back to the coast, but as I kept examining my map I realized I must cross the creek and then climb 650 feet and another 2 miles just to get back to the coast.
Well of course the creek was swollen from all the rain so crossing it created some anxiety. Unfortunately I lost my backpack rain cover as I was crawling over a log for part of the crossing. I was really bummed about the simple climb because my legs were dead tired, but the weather was great and the motivation to end this trip lifted my effort. This was a typical view as I returned to the coast.The first beach segment on this final coastal leg required navigating a few difficult points but it was at the (high) low tide. Surprisingly I ran into a single woman just entering this difficult stretch and it was an hour after low tide. I warned her that she might want to reconsider trying to make it to Spanish Flat, and I’m not sure what she decided. The rest of the hike out was not dangerous but it was exhausting.
Walking on loose sand with tired legs was tough, but the motivation was strong and the sunset was beautiful.
When I finally got to my car at sundown (long day) I was met with yet another disappointment. I noticed that my gas cover was ripped open and then I noticed that all of my windshield wiper blades had been stolen. This was just so rude. Luckily I intentionally had less than half a tank which probably meant they didn’t get any gas. However, if it had been raining that would have been one dangerous drive back to Ferndale. I did get to Ferndale and I had possibly the greatest NY Strip Steak ever and a much needed warm bed.
I kicked off the Bring Your Own Device (BYOD): A Summit for Decision-Makers (summary article) as the keynote speaker last week in Ann Arbor, Michigan. This Summit was put on by Merit, who provides the network service needs of higher education, K-12 organizations, government, health care, libraries, and other non-profits for the state of Michigan. It brought together public and private sector technology and security leaders, as well as experts from academia and a wide array of vendor sponsors, to discuss hot trends for employees who are bringing their own devices to work.
I was interested in presenting on this BYOD topic because I understand the concerns but I also feel we need to put the issue into proper perspective. BYOD is officially defined as the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes. This is the valid concern which causes us to question our preparedness for dealing with bandwidth and security issues associated with BYOD. But the acronym has become synonymous with challenges relating to the explosion of mobile internet access devices which tend to pressure our network management more than security risks. My Keynote entitled, BYOD: We just need to keep up, focused on the emerging concerns from Wear Your Own Device (WYOD) and the evolution of The Internet of Things (IoT).
Wearable devices today are not really pressing our infrastructure or security concerns, however, that is the calm before the storm. The focus for these wearables today typically points to some form of activity or health monitoring. Interaction with the Internet or local WiFi is minimal now typically because of power consumption issues. However, the stage is set for these small useful devices to interact with our personal Internet space. And the most significant use will evolve out of the NFC based authentication made popular by the Apple Pay entry for transacting purchases. The key here is the validation of mobile devices, typically today’s smartphones, as authenticators of our personal identity. Replacement of the credit card swipe for retail purchases will lead the way, however, we in IT will get to explore and support all of the other uses that will play off this technology. For us in higher education we will see this become our student’s ID Card for building access, attendance and even remote test proctoring. The technology challenge is not daunting, however, the shift of our support mentality may be difficult. We will need to protect the effectiveness of these activities along with ensuring the security. It will mean a lot more technology responsibility on our plates.
I was chatting with one of our professors and our conversation ventured into the importance of mobile devices. The topic related to why it was so important for Microsoft to gain a foothold in the mobile phone market and I explained to him the intricate connection between the consumer’s phone and their computing platform of choice. But I also told him that the mobile phone would someday be the most important component for authenticating identity which is critical for financial transactions. I’m not sure I knew exactly how that was going to play out but it is always fun to stimulate non-techies into imagining what the future might hold. I did tell him about how important cell phones were in Africa for providing a means of transferring money. So it was a natural assumption to connect the cell phone to the online or digital economy as a means of providing more secure form of authentication. And when you talk more secure you typically relate that to a dual form of authentication based on something you have and what something is better than cell phones. Anyways, this conversation led to being asked to give a talk on this topic for the local Rotary.
I relate this conversation as a lead in for the story today about how Apple might offer a means for how we pay for stuff. Apple is hinting that it may explore this territory of payment services and that the fingerprint authentication on the new iPhones was implemented with this in mind. But the real impetus may be that Apple has amassed the most impressive number of personal accounts, about 800 million, that are connected to a credit card. This number is huge especially when compared to the next closest, Amazon’s 237 million. And what was the trick to getting this many purchase ready accounts? Music Downloads through iTunes. Yes, the convenience of impulse buying for a song that I hear justified my synchronizing my credit card with my iTunes account. And I have been very pleased with the results; quick, efficient, receipt email, and trust. Yes trust, there has not been a significant security breach of Apple’s accounts.
So is Apple going to expand their payment services to include any online or even checkout counter transactions? Lot’s of issues that have to be worked out before that financial model is justified, but I would bet on it. I was originally thinking the mobile phone could provide an identity solution for verifying who you are using the 2 step authentication model. Apple has successfully expanded that to include biometrics which I think will inevitably be required in our insecure identity compromised world. Makes a whole lot more sense then offering a credit card and signing a receipt. Needless to say, control of the mobile phone market continues to grow in importance. The next authentication phase will probably involve scanning that chip they want to insert into our body, but I think for now we work from something that everyone wants to have on their body.
Our student News team wanted to do a story on our iGFU Mobile Portal. They tried to video record a demo off of an iPAD which was not going to work so iGFU author, Brian McLaughlin, made them a simple tutorial that we now use on our website. Checkout the tutorial if you have any interest in what a university mobile portal needs to be. Remember, our mobile portal is basically a skunk works project that leverages the flexibility and performance of HTML5 using Java and PHP to access useful data from general data feeds, Moodle and our PeopleSoft ERP.
The tutorial also highlights a couple of other useful tools. Brian made the video by using an App called AirServer that allows him to mirror an IOS device to his MacBook. He then records it with Quicktime and with a little editing on iMovie you get a very real view of a mobile app. Then we upload the video to our new ShareStream video distribution system which gives us total flexiblity to manage and distribute video (especially if we want to manage copyright). We are investigating if AirServer might offer a better path for iPad mirroring to projector in the classroom.
This year we realized that our mobile portal was ready for some real marketing. I guess up until now we were content to let our customers discover it and utilize it as they desired. What we came to realize was that way to many of our customers had never heard of our mobile portal. How could that be, isn’t IT and the services IT provides at the center of all that happens at a university??? Actually our mobile portal iGFU.georgefox.edu has received a lot of accolades mostly from Oracle Higher Education folks since we have done a great job in leveraging our PeopleSoft data for useful mobile services. So maybe it is better known outside of our university. Recently a couple of our iGFU developers were recognized by NWACC and given an Exemplary Practice Award.
This year we are actually promoting iGFU and usage stats this first week show us that most everyone may finally be using it. We have opted for some promotional gimmicks like allowing our food service provider or bookstore to offer deals that can only be redeemed on someone’s smart mobile device. This new IT Video promotes a number of services that IT provides including iGFU.The most common hits are for class schedule information right now but the administrative services especially for academics are receiving a lot of praise. The class roster service spawns options for a professor to communicate with their class, offer a survey, view photos of individuals or the entire class (on a Pad or Computer display), monitor Moodle Class Forums, show student’s major, and academic advisor(s).
Information for a specific course provides all the normal course description, books required and the syllabus if available. Course schedules show you what you have today as well as for the rest of the week. Students can map their Moodle assignment schedules into their Google Calendar, and the list goes on. The real key here is that if a Professor asks for something we always seem to be able to deliver with limited complexity. The administrative side of iGFU has also grown with services. The live budget update service has generated the most praise but another useful feature allows our development officers to lookup their prospects complete with all of their notes. Zoom into the prospects house with the linked Google Earth and certain priorities can be considered.
The bottom line is that our mobile portal has redefined what efficient presentation of data should look like. The directory lookup feature is now a standard page open on most of our administrator’s desktops. A major advantage which makes the mobile portal much more effective is how we can easily use our role based access structure from PeopleSoft to customize what each user is presented. So that is enough bragging about iGFU.
Thanks to recognition from Oracle it is not uncommon to be contacted by another university asking about how we created iGFU. Why go with a web design vs. and app design? How were we able to approve features with typical university committees. How were we able to access so much data from our ERP?
Going with the web design is the obvious choice if you want rapid and flexible deployment and no hassle device deployment. If you design your data access efficiently then performance is not an issue. This more then justifies the loss of some native app features. But the real key to our success comes from the design and development strategy. The most important design strategy is whether we are create something that would be useful for someone walking from lunch to class. Also no committees deciding or designing features. My key developer happens to be my DBA, so in his words he is able to accomplish so much because he holds the keys to the kingdom. He would never let another programmer gain so much access to the database. I let my developers respond directly to feature requests. They crank out another feature and we decide within IT whether it is acceptable for release and then we get appropriate pilot feedback if it deals with access control. But mostly we quickly turn around requests and fine tune a feature based on real user feedback.
This all may sound to simplistic but that is the key to a successful mobile portal. Of course talented programmers with great development tools working from a clean ERP system designed for web clients makes the job a whole lot easier. But any university holds the data necessary to build an effective mobile portal, finding some development talent empowered by some creative freedom could also release these mobile services to your customers. If you do not have the resources to develop a mobile portal yourselves then you may want to consider a couple of commercial option focused on PeopleSoft: HighPoint or BASHmobile
This post is to applaud Apple’s marketing strategy. They have truly parlayed the art of competitive silence into the most effect marketing strategy a company could ever hope for. The iPhone set the stage for this and carrier agreements somewhat justifies it. Pretending that the silence is for strategic protection is brilliant. I love the Apple employees who do actually buy into this completely, kind of an oath of operation. But the result is an immense amount of free advertising based on anticipation. Who had the greatest impact at the CES last week? The company that was not even there. Aren’t we all anxious about what Apple might announce on Jan. 26th or 27th?