China Mobile Leader’s Programme Mobile Technology Jon Crowcroft +gmail, hotmail +441223763633.

Slides:



Advertisements
Similar presentations
Jon Sackfield. When answering your phone your able to view who is calling you based on your contact list. When someone calls that isnt on your contact.
Advertisements

Welcome to your computer class!
Cellular Networks.
In a café Ola Kamieńska, Magda Tchorek and Magda Wojciechowska III C.
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
1 CONTEXT + INFERENCE Lessons MODULE 2 Meaning and discourse in English.
By Seán.  Here is our school  Our school got a Green Flag earlier this year for good recycling. Now we are trying to earn our Energy Flag even though.
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
 The hackers is a persons that they have a many knowledge in the area of ​​ computer and are capable of deceive the security.
Trusting the Trust Budi Rahardjo Inixindo Security Day Seminar The Executive Club, Jakarta, 19 March 2009.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
How small labels create big improvements Pan Hui Jon Crowcroft Computer Laboratory University of Cambridge.
ICT BADGE CUBS Stage 2 Stage 3
How the Internet Works Jon Crowcroft,
Opening a bank account.
Using the Internet? Is the internet a safe place?.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
ENGLISH – LEVEL VI WEEK II – LESSON 4 1. THE SECOND CONDITIONAL – REVISION If you could be an animal, what would you be? If you could be another person.
Social impacts of the use of it By: Mohamed Abdalla.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
HOW TO STUDY ENGLISH EFFECTIVELY
Dario Gonzalez.  Facebook makes most of its money through advertising.  You can also purchase "gifts" to send to your friends (birthday cards, calendars,
Carole Myers CIED What is Digital Security?  According to Ribble and Bailey, it is “the precautions that all technology users must take to guarantee.
·
Session 1.  Websites  Mobile Websites  WordPress Security  Reputation Marketing  Coming Soon ◦ Contractor Software ◦ Facebook Pages ◦ Mobile Apps.
STAY SAFE!! Don’t fall for the same old tricks !!.
What’s It Worth? - The Movies - CSX Business Explorer Post 333 December, 2010.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
(A radical interpretation) Tomo Lennox Bow Tie computer services Why Agile Works.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Unit 2 (task 28) In this PowerPoint I will tell you about 7 important IT job roles and if a candidate might want one what he would have to do to get one.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
My computer Life By Name. I know what these pieces of software are Text here Other things you have used or know about…
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
How the Internet Goes Wrong Jon Crowcroft,
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Foreign language in my future career.
Computer Owners’ Forum June 16, 2014 Oak Crest Connect Review of Meeting on 5/22/2014.
Calling all Ninjas! Get stealthy And increase productivity.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
Kenia’s best and famous store. Kenia K. 79 Lakeview Terrace St Waltham MA,
Communicate in Today’s World Speak Your Prospects Language.
Society & Computers PowerPoint
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
Counting Stars Lately I been, I been losing sleep Dreaming about the things that we could be But baby, I been, I been prayin' hard Said no more counting.
RB BONUS #2 SOCIAL MEDIA AND SECRET LEAD SOURCE. PICK A SOCIAL PLATFORM LinkedIn Facebook Google Plus Fill out your profile completely Go after a city.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
AKick Software’s Many Years of Excellence us: | Website: Toll Free:
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
I love # . Marketing in 10 minutes WHY? BUILD TARGET TRACK MEASURE.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
CSE 374 Programming Concepts & Tools
Protecting Devices The Future Citizen.
Protecting Devices The Future Citizen.
The Social Networking revolution
Data Science Meetup Matthew Renze Data Science Consultant
Wide Screen TV Template
ACS Deployment Scenarios
The Benefits of Saving Money.
Protecting Devices The Future Citizen.
Your message here! Old TV Template Your name.
All Sim Number Check Code Vodafone Number Check Code, Idea Number Check Code, Airtel Number Check Code, BSNL Number Check Code, Jio Number Check Code.
NVOC Single Sign-On (SSO) for Students!
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

China Mobile Leader’s Programme Mobile Technology Jon Crowcroft +gmail, hotmail linkedin, facebook, myspace

If I had more time, I would speak slower The great French writer, Proust said “If I had more time, I would have written a shorter letter”. Here are my shorter slides:-)

4 Areas We don’t want to pay for bits anymore I.e. cellular provider better make money from something else We do want to know who to trust Source of identity and risk reduction Especially for transactional software We woul like to go back 10 years to 1 week battery life handsets! Need to be smarter about resource use on mobile We’d like to automate malware out of existence Not just signing and virus scanning - better Computer Science!

Lessons from working with cellular providers They have lost control of the handset They will lose control of the radio/spectrum pretty soon Need to capitalise on last resources - e.g. Cell tower is good co-lo for cache/web/CDN SIM is great for ID Low transactional overhead billing system is excellent

From experience with Microsoft, Intel, NTT DoCoMo, BT, Telefonica, KAIST, MPI, Vodafone Etc etc etc Trust matters Ethics matter Spectrum should all be free Models based on empirical data matter measure everything about your users, networks, devices Social Structures are really really useful Old ideas (e.g. dataflow and functional programming) may have their day

Thank you… Questions? …