Category Archives: iPhone

I Lost to the Lost Coast

LostCoastStart

Ready for the Lost Coast

I headed into my Lost Coast Trail backpacking trip confident that I would accomplish my goal to hike from Mattole Trailhead to Shelter Cove and return. I knew it was going to rain a couple of days, but the forecast called for 10 mph winds. I also knew I had some bad timing for when the low tides occurred during the first part of the week. But I did not dig deep enough into this data to be properly prepared for what was ahead.

The drive down to northern California through the Redwoods was great, my car loves roads like the Redwood Highway. I visited the BLM office in Arcata first thing Monday morning to get my waterproof map, so with that map also on my iPhone equipped to use GPS, I was well prepared for navigation.

This slideshow requires JavaScript.

The low tide on Monday was not going to allow me to get past the first high tide hazard stretch so I had a leisurely hike past a herd of cattle to end up camping next to the Punta Gorda Lighthouse. It was a beautiful evening as I overlooked a beach full of seals.

HighTideProblem

First Stretch of Tide Challenged Coastline

Low tide on Tuesday was at 9:33 am at 3.2 feet, so I entered the beginning of this 4 mile stretch before 9:00 am. Based on most reports I had read this stretch was not going to be a problem even if you were a few hours on either side of low tide. Unfortunately, I did not consider the actual height of the low tide. The trek through this segment was tough even without navigating the dangerous rock points of which there are about 5 that are really challenging. Some you can climb up and over, but the rocks were really slippery probably due to the higher then normal waves preceding the approaching storm. So I worked my butt off hiking over the beds of football size boulders. As I neared the last few hazard spots it seemed like it was far more dangerous then it should have been.

DifficultPoint

A Challenging Point

Then the last point before Spanish Flat nearly did me in. It was a point where you had to go between a large rock as the waves were crashing, however, it was all under water. As I tried to see around the corner to determine what I was up against I caught a full face on wave that nearly pulled me into the ocean. At that point I couldn’t worry about waiting for the best wave timing so I jumped into waist deep water and made it around. I was soaked but relieved to have survived.

Spanish Flat

Spanish Flat

I stopped at Spanish Flat, put on dry clothes and checked the tide tables to discover that the low tides that I was experiencing were the highest low tides of the year. That explained things, but now I was concerned about the next day’s stretch of tide hazardous coast with another 3.2 foot low tide, not to mention my concern about coming back.

SpanishFlatCampsite

Spanish Flat Campsite

So I opted to camp at a nice beach fortress just below Spanish Ridge. The winds were gaining strength which was good for drying out but it was also a bit foreboding knowing that rain was on the way. Yep, the rain started at sundown and the wind just kept getting stronger.

SpanishRidge

Beginning of Spanish Ridge

I decided to stay put through Wednesday with plans to hike up the Spanish Ridge Trail over to the Cooksie Spur Trail on Thursday.

I was up before sunrise Thursday morning with my backpack ready to go, just needed to take down the tent. I was so happy that it had not been raining for a few hours and the tent was dry. Unfortunately all hell broke loose at sunrise. The rain and the wind hit what I would call typhoon force. My line holding my tent fly broke, my tent stakes were being uprooted, water was rushing in so I had to go. Taking down a tent in gale force winds is challenging but I captured everything, but somehow lost my reading glasses. Of course I was instantly soaked but my Marmot Gore-Tex jacket was taking care of me.

ClimbingSpanishRidge

Climb to Spanish Ridge Trail

I decided to go straight up the side of Spanish Ridge and intersect with the trail which worked out fine thanks to the map I had with GPS location on my iPhone. The wind was blowing from the south so it was mostly going to be at my back.

My goal was to climb the 2400 foot Spanish Ridge Trail and then take the Cooksie Spur Trail over to Cooksie Creek since I would need water. TroubleLocationWell half way up the climb (see blue dot on map) I was realizing that this wind was a real problem. As it whipped up the slopes it must have gained even more power, so much so that I was barely able to stand up. Then I really got hit, actually blown off my feet, and I was a 240 lb object. I was totally expose at this point, no trees or large rocks to shelter behind, so I laid face down next to a small rock that gave my head a little relief. I was pinned down about 45 minutes with the wind occasionally lifting me when it hit me between my body and backpack. Oh yes, and the rain was as hard as you could imagine. So here I am face down trying not to be blown off the mountain and I’m getting cold. The night before I had listened to a chapter in Lawton Grinter’s book “I Hike” about his experience with hypothermia, so I knew that the shivering, loss of feeling in my hands and feet and the desire to burrow  were typical of hypothermia. What was a bit fascinating from being in this predicament was getting a taste of what it may be like to face the real possibility of death so my conversation with God was with great urgency.

Of course the human spirit doesn’t just give up, I had to do something because my current situation was hopeless. I fought to stand which was really hard because my legs were not working as I would have liked. Something told me that I needed to climb out of this, however, I had no way of knowing what was ahead, but my GPS map at least assured me that I was on track. I walked with my back to the wind using my trekking poles as braces to counter the force and I made it to an area where a small cornice offered some relief from the heavy wind. At this point I knew I had to warm up so I pulled out a wool shirt to add a layer under my rain jacket. Buttoning that shirt with my cold fingers was far more challenging than I could have imagined. This seemed to give me new motivation to press on at all costs. And pressing on was brutal. There were a few sections where the wind was at my back so I used it to essentially fly up the mountain, however, coming to a stop was never pretty. Then my backpack cover blew loose but was still attached to my backpack creating a spinnaker type sail that dragged me for 20 feet. In between my attempts to move forward I spent more time on my face trying to regroup. Overall it took me about 3 hours to travel about a mile through the really bad section of the ridge.

BeginningCooksieTrail

Beginning of Cooksie Ridge

Of course I did finally make it to the top and when I got off the Spanish Ridge Trail and onto the much calmer Cooksie Spur Trail I was singing praise to God for allowing me to live. From the looks of the map I knew that the Cooksie Trail was also going to present an exposed ridgeline so I opted for the best tree sheltered spot to pitch my tent with the goal to get into my sleeping bag and warm up. That evening was not great but it was so much better than what I had just experienced. I was very content to make it through the night with just 13 ounces of water. I had dry clothes, mostly wool, so I did eventually warm up.

The forecast for Friday was sunshine which held true, so I set out with the need to get to Cooksie Creek for water. I also decided that I had had enough of the Lost Coast and I really wanted to hike back to my car with dreams of a good meal and warm bed. But the hike out Friday turned out to be a lot tougher than I expected. Thank God for my GPS map locator since finding the trail to the creek was rather confusing. For some reason I thought that the trail was going to follow the creek back to the coast, but as I kept examining my map I realized I must cross the creek and then climb 650 feet and another 2 miles just to get back to the coast.

SwollenCooksieCreekWell of course the creek was swollen from all the rain so crossing it created some anxiety. Unfortunately I lost my backpack rain cover as I was crawling over a log for part of the crossing. I was really bummed about the simple climb because my legs were dead tired, but the weather was great and the motivation to end this trip lifted my effort. This was a typical view as I returned to the coast.BackToTheCoastThe first beach segment on this final coastal leg required navigating a few difficult points but it was at the (high) low tide. Surprisingly I ran into a single woman just entering this difficult stretch and it was an hour after low tide. I warned her that she might want to reconsider trying to make it to Spanish Flat, and I’m not sure what she decided. The rest of the hike out was not dangerous but it was exhausting.

FinalStretch

Final Stretch with the sun going down

Walking on loose sand with tired legs was tough, but the motivation was strong and the sunset was beautiful.SunsetGoodbye

When I finally got to my car at sundown (long day) I was met with yet another disappointment. I noticed that my gas cover was ripped open and then I noticed that all of my windshield wiper blades had been stolen. This was just so rude. Luckily I intentionally had less than half a tank which probably meant they didn’t get any gas. However, if it had been raining that would have been one dangerous drive back to Ferndale. I did get to Ferndale and I had possibly the greatest NY Strip Steak ever and a much needed warm bed.

Get Ready for WYOD

I kicked off the Bring Your Own Device (BYOD): A Summit for Decision-Makers (summary article) as the keynote speaker last week in Ann Arbor, Michigan. This Summit was put on by Merit, who provides the network service needs of higher education, K-12 organizations, government, health care, libraries, and other non-profits for the state of Michigan. It brought together public and private sector technology and security leaders, as well as experts from academia and a wide array of vendor sponsors, to discuss hot trends for employees who are bringing their own devices to work.

Keynote Address for BYOD Summit

Keynote Address for BYOD Summit

I was interested in presenting on this BYOD topic because I understand the concerns but I also feel we need to put the issue into proper perspective. BYOD is officially defined as the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes. This is the valid concern which causes us to question our preparedness for dealing with bandwidth and security issues associated with BYOD. But the acronym has become synonymous with challenges relating to the explosion of mobile internet access devices which tend to pressure our network management more than security risks. My Keynote entitled, BYOD: We just need to keep up, focused on the emerging concerns from Wear Your Own Device (WYOD) and the evolution of The Internet of Things (IoT).

Wearable devices today are not really pressing our infrastructure or security concerns, however, that is the calm before the storm. The focus for these wearables today typically points to some form of activity or health monitoring. Interaction with the Internet or local WiFi is minimal now typically because of power consumption issues. However, the stage is set for these small useful devices to interact with our personal Internet space. And the most significant use will evolve out of the NFC based authentication made popular by the Apple Pay entry for transacting purchases. The key here is the validation of mobile devices, typically today’s smartphones, as authenticators of our personal identity. Replacement of the credit card swipe for retail purchases will lead the way, however, we in IT will get to explore and support all of the other uses that will play off this technology. For us in higher education we will see this become our student’s ID Card for building access, attendance and even remote test proctoring. The technology challenge is not daunting, however, the shift of our support mentality may be difficult. We will need to protect the effectiveness of these activities along with ensuring the security. It will mean a lot more technology responsibility on our plates.

Cell Phone Authenticating our Identity

I was chatting with one of our professors and our conversation ventured into the importance of mobile devices. The topic related to why it was so important for Microsoft to gain a foothold in the mobile phone market and I explained to him the intricate connection between the consumer’s phone and their computing platform of choice. But I also told him that the mobile phone would someday be the most important component for authenticating identity which is critical for financial transactions. I’m not sure I knew exactly how that was going to play out but it is always fun to stimulate non-techies into imagining what the future might hold. I did tell him about how important cell phones were in Africa for providing a means of transferring money. So it was a natural assumption to connect the cell phone to the online or digital economy as a means of providing more secure form of authentication. And when you talk more secure you typically relate that to a dual form of authentication based on something you have and what something is better than cell phones. Anyways, this conversation led to being asked to give a talk on this topic for the local Rotary.

I relate this conversation as a lead in for the story today about how Apple might offer a means for how we pay for stuff. Apple is hinting that it may explore this territory of payment services and that the fingerprint authentication on the new iPhones was implemented with this in mind. But the real impetus may be that Apple has amassed the most impressive number of personal accounts, about 800 million, that are connected to a credit card. This number is huge especially when compared to the next closest, Amazon’s 237 million. And what was the trick to getting this many purchase ready accounts? Music Downloads through iTunes. Yes, the convenience of impulse buying for a song that I hear justified my synchronizing my credit card with my iTunes account. And I have been very pleased with the results; quick, efficient, receipt email, and trust. Yes trust, there has not been a significant security breach of Apple’s accounts.

So is Apple going to expand their payment services to include any online or even checkout counter transactions? Lot’s of issues that have to be worked out before that financial model is justified, but I would bet on it. I was originally thinking the mobile phone could provide an identity solution for verifying who you are using the 2 step authentication model. Apple has successfully expanded that to include biometrics which I think will inevitably be required in our insecure identity compromised world. Makes a whole lot more sense then offering a credit card and signing a receipt. Needless to say, control of the mobile phone market continues to grow in importance. The next authentication phase will probably involve scanning that chip they want to insert into our body, but I think for now we work from something that everyone wants to have on their body.

Good Look at our iGFU Mobile Portal

Our student News team wanted to do a story on our iGFU Mobile Portal. They tried to video record a demo off of an iPAD which was not going to work so iGFU author, Brian McLaughlin, made them a simple tutorial that we now use on our website. Checkout the tutorial if you have any interest in what a university mobile portal needs to be. Remember, our mobile portal is basically a skunk works project that leverages the flexibility and performance of HTML5 using Java and PHP to access useful data from general data feeds, Moodle and our PeopleSoft ERP.

The tutorial also highlights a couple of other useful tools. Brian made the video by using an App called AirServer that allows him to mirror an IOS device to his MacBook. He then records it with Quicktime and with a little editing on iMovie you get a very real view of a mobile app. Then we upload the video to our new ShareStream video distribution system which gives us total flexiblity to manage and distribute video (especially if we want to manage copyright). We are investigating if AirServer might offer a better path for iPad mirroring to projector in the classroom.

Year of the Mobile Portal

This year we realized that our mobile portal was ready for some real marketing. I guess up until now we were content to let our customers discover it and utilize it as they desired. What we came to realize was that way to many of our customers had never heard of our mobile portal. How could that be, isn’t IT and the services IT provides at the center of all that happens at a university??? Actually our mobile portal iGFU.georgefox.edu has received a lot of accolades mostly from Oracle Higher Education folks since we have done a great job in leveraging our PeopleSoft data for useful mobile services. So maybe it is better known outside of our university. Recently a couple of our iGFU developers were recognized by NWACC and given an Exemplary Practice Award.

This year we are actually promoting iGFU and usage stats this first week show us that most everyone may finally be using it. We have opted for some promotional gimmicks like allowing our food service provider or bookstore to offer deals that can only be redeemed on someone’s smart mobile device. This new IT Video promotes a number of services that IT provides including iGFU.The most common hits are for class schedule information right now but the administrative services especially for academics are receiving a lot of praise. The class roster service spawns options for a professor to communicate with their class, offer a survey, view photos of individuals or the entire class (on a Pad or Computer display), monitor Moodle Class Forums, show student’s major,  and academic advisor(s).

iGFU Faculty MyGFU Screen

iGFU Faculty MyGFU Screen

Information for a specific course provides all the normal course description, books required and the syllabus if available. Course schedules show you what you have today as well as for the rest of the week. Students can map their Moodle assignment schedules into their Google Calendar, and the list goes on. The real key here is that if a Professor asks for something we always seem to be able to deliver with limited complexity. The administrative side of iGFU has also grown with services. The live budget update service has generated the most praise but another useful feature allows our development officers to lookup their prospects complete with all of their notes. Zoom into the prospects house with the linked Google Earth and certain priorities can be considered.

The bottom line is that our mobile portal has redefined what efficient presentation of data should look like. The directory lookup feature is now a standard page open on most of our administrator’s desktops. A major advantage which makes the mobile portal much more effective is how we can easily use our role based access structure from PeopleSoft to customize what each user is presented. So that is enough bragging about iGFU.

Thanks to recognition from Oracle it is not uncommon to be contacted by another university asking about how we created iGFU. Why go with a web design vs. and app design? How were we able to approve features with typical university committees. How were we able to access so much data from our ERP?

Going with the web design is the obvious choice if you want rapid and flexible deployment and no hassle device deployment. If you design your data access efficiently then performance is not an issue. This more then justifies the loss of some native app features. But the real key to our success comes from the design and development strategy. The most important design strategy is whether we are create something that would be useful for someone walking from lunch to class. Also no committees deciding or designing features. My key developer happens to be my DBA, so in his words he is able to accomplish so much because he holds the keys to the kingdom. He would never let another programmer gain so much access to the database. I let my developers respond directly to feature requests. They crank out another feature and we decide within IT whether it is acceptable for release and then we get appropriate pilot feedback if it deals with access control. But mostly we quickly turn around requests and fine tune a feature based on real user feedback.

This all may sound to simplistic but that is the key to a successful mobile portal. Of course talented programmers with great development tools working from a clean ERP system designed for web clients makes the job a whole lot easier. But any university holds the data necessary to build an effective mobile portal, finding some development talent empowered by some creative freedom could also release these mobile services to your customers. If you do not have the resources to develop a mobile portal yourselves then you may want to consider a couple of commercial option focused on PeopleSoft: HighPoint or BASHmobile

NFC could justify RFID thanks to Apple

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; color: #023749}p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; color: #023749; min-height: 14.0px}span.s1 {letter-spacing: 0.0px}span.s2 {text-decoration: underline ; letter-spacing: 0.0px}

I would guess that many of you caught the story this week about the strong rumors that Apple’s iPhone 5 and iPad 2 will support NFC, Near Field Communication. This basically says that those devices will be able to authenticate close range wireless transactions which probably means we will start referring to this as the iWallet. This makes total sense and the fact that Apple launches it guarantees that it will be adopted industry wide. So this reminds me of my prediction a few years back in my post New Telco Business Model when I mentioned the concept of our Cell Phones becoming our Identification card. Of course I was advising the Telcos to take the lead on this, but I knew they wouldn’t.

I predict this will move rapidly, especially once they add a few techniques that validate that you are the authorized owner of the mobile device. This offers a 2 key authentication option that is as good as login and password. What do I mean? Well, you can’t just let an iPhone have authority to make purchases or pass through gates, so you have to have a way to verify that this is your device. It could be as archaic as entering a password on your mobile device but I’m thinking it might better justify that RFID chip implanted in your forearm that you pair with. So that chip doesn’t really hold any personal information, it just allows you to authorize that it is OK for your Near Field Communication of private information to take place. I’m thinking airport security checkin but debiting my account for purchasing coffee would be important as well. This could be huge for solidifying iTunes as our identity of choice.

Careful Recommendation of iPad for Students

This weekend I need to write up a recommendation for our incoming freshman about how the iPad will satisfy their academic computing needs and what support options will be available to them from our IT organization. And I will need to be truthful. I probably can’t qualify my statements with a fallback like you have to believe that Apple will release that feature or they are bound to offer that service eventually. So just to give you a quick review. The lack of a clear printing option is an embarrassment especially for addressing the needs of a college student. Multitasking at least to the the extent mentioned for the iPhone 4 needs to show up sooner then later on the iPad. And the iPad needs some semblance of a file system or at least the ability to send or receive files to and from Internet Web sites. For the college student the iPad should be able to export a file to their LMS system’s homework dropbox.

I know that Apple is still trying to figure out how this iPad will be positioned and how long the techies will accept these feature crippling strategies. Unfortunately today we don’t have a choice. The iPad is in a category by itself with enough features to justify our acceptance. But you know, those iPad competitors are not far off. It will not be hard to duplicate the E-Reader and web surfing features. So when the competition finally hits the street offering file interaction for limited creation and editing. That is when we will see Apple rev the OS and reclaim the loyalty of their technical users. I just ask that Apple go their sooner then later, trust that you will sell just as many Macs after opening up the iPad.

Where is Apple Going?

Most questions lately that I am asked about Apple have to do with obvious limitations imposed by the iPad. And yes this has been well documented. The iPad could easily become the killer academic computing device, but it does not need to for another year.

Apple is currently experiencing their greatest success in adoption rate of MacBooks by universities. They really should ride that out until other market factors force them to upgrade the iPad to be a self sufficient computing device. This is a transition year for E-Textbooks so Apple does not want to put the cart in front of the horse. I also do not think Apple really knows how it will all play out. If they could force the world to always tether an iPad to a computer then they most likely would benefit greatly from that computer selection. But Apple is foremost a business that is making the smartest business decisions. They will lay the groundwork for many of the iPad needs by boosting the iPhone line. Within a year all of the iPad issues will be solved and they will begin to position the iPad as stand-alone computing device. But in that time period they will also acquire a vast number of new customers that will be primed for their next generation of computing devices that will most likely be entertainment driven. And do not underestimate the power that the eventual stand-alone iPad will have.

Apple is extremely well positioned for the technology buying trends for the future as well as for the advertising and entertainment trends. Think of the market that will be created by the many million new iPad customers who will be ready to seamlessly link their iPad into a more powerful “Entertainment” device. But that market foundation must still evolve with vast improvements to our Internet grid and lot’s of content copyright definition.

There are many who bash Apple for their proprietary agenda. But are you bashing from behind or ahead. I supported Microsoft in their rise as passionately as I may now support Apple. What I support is the technological innovation. When that ends it is time to bash the proprietary control, but during the rise I am willing to jump on board. It is OK to follow a leader if they are actually leading you to something better. Apple’s power and influence will dwarf what Microsoft was ever able to attain. However, Apple’s greatest success may be written by how they deal with their eventual leveling out.

Let Freedom Ring

I was recently interviewed by OurBlook with questions about the future of Education. They asked me to comment because of issues I have brought up concerning the iPad’s possible affect on Education. Their questions helped me better encapsulate this change in computing that is upon us. I do think that technology such as the iPhone on the low end and Netbook on the high end pointed our tech industry toward a more accessible computing solution for all. That may be the iPad but I do believe the iPad will at least open the door.

Manipulating American’s massive consumer engine to maximize profits is all that matters to the major international businesses. Automobiles, pharmaceuticals and yes personal computers are heavily marketed and we know we over buy but that may be changing for PCs. Not because we see the light but rather because the supplier’s profit engine has shifted to distribution and advertising. What a shame we have pushed these complicated computing devices into the consumer mainstream. Why should my parents have to worry about viruses and spy-ware. That’s why I am excited about this new generation of internet access devices led by the iPad. Our eyes will be opened and the masses will be allowed to participate. That will definitely have some influence on education.

Apple’s Marketing Strategy

This post is to applaud Apple’s marketing strategy. They have truly parlayed the art of competitive silence into the most effect marketing strategy a company could ever hope for. The iPhone set the stage for this and carrier agreements somewhat justifies it. Pretending that the silence is for strategic protection is brilliant. I love the Apple employees who do actually buy into this completely, kind of an oath of operation. But the result is an immense amount of free advertising based on anticipation. Who had the greatest impact at the CES last week? The company that was not even there. Aren’t we all anxious about what Apple might announce on Jan. 26th or 27th?

New Telco Business Model

In my last post I tossed out the option for Telcos to consider getting into identity management as a service to their customers. After a number of water cooler discussions about the possibilities it does seem to make a whole lot of sense. However, when was the last time we equated Telcos with having any sense? The concept would center on Telcos facilitating authentication through a mobile device. This is not a new idea; people with mobile devices are probably the same people with credit cards so why not use mobile devices as credit transactors.

How would this work? Bill Gates almost controlled the world with his goal to capture a fraction of a cent for every e-commerce transaction carried out with the help of Microsoft software. Unfortunately for Bill he did not equate the importance of controlling access to the Internet in the e-commerce process. The credit card business is based on a service fee of 2-3% of every transaction. That represents a significant cost of doing business. I would assume maybe 1% is needed to cover losses due to fraud. So why can’t the Telcos offer an authentication service to the credit card industry that justifies say 1% that is built on real authentication confirmed through their mobile networks. We’ll let the experts work out the economics, but the technology is already in place. Mobile devices are sophisticated enough to create any authentication scheme we want. We just need an authoritative confirmation from the network. And what better way to build that kind of trust then through a strong Telco customer relationship. Providing identity services that would justify a customer for life and allow for unlimited marketing possibilities. Of course all the customers want is an iPhone and with a Telco business model based on customer services the Telcos would not be opposed to standardizing on the network and device.

%d bloggers like this: