Smart cities will deliver Innovation Centres

“Competition between Cities” has started

Smart city projects are among the most exciting technological initiatives around today and will play a major role in the world’s future growth. Modern technology lets us track and monitor pretty much anything in a major urban environment – noise, light, traffic, weather and so on – and use this data to improve people’s living and working conditions.

Traffic and parking availability is one area of smart city projects that is leveraging new technology to drive real change. New technology is emerging all the time that lets us manipulate networks more finely, taking advantage of more sensors, more cameras and more real-time data to improve road traffic.

Recent research showed that the average UK motorist spends over 2,500 hours in their lifetime driving around looking for car parking spacesThat’s an enormous 106 days – and in a hectic, built-up city like London, it takes an average of 20 minutes to find a parking space. Other statistics show that up to 30 per cent of city traffic is created by people driving around looking for an available parking space.

With population and vehicle figures always rising, it is hard to see these numbers falling without any kind of intervention. The UN estimates that by 2050 the world’s population will reach 9 billion people, the majority of this growth taking place in cities. This means urban populations will have grown to 6.3 billion by 2050, more than double the 2.8 billion living in cities today. So with all those extra people on the roads, tracking and controlling car and general traffic movements in a more intelligent, detailed way, will become vital.

Taming the beast

Technology provides the tools to make managing this ever-increasing traffic a reality. There are three key elements to dealing with this urban traffic as we move forward – identifying the problem, keeping road users informed and deploying smart mechanisms to keep traffic flowing. Addressing these lets us approach the issue progressively and practically.

Data monitoring and communicating with end-user mobile device apps is already part of modern urban living. We can receive the latest overground and subway train information direct to our smartphones when commuting, helping make the journey to work less of a hassle. Regarding traffic flow, one of the most interesting developments I have seen more of recently was in a “smart car park”, where sensors detect whether or not a car is parked in a particular spot and communicate that to drivers who have just arrived, telling them where available parking spaces with visual indicators of red and green lights – again saving time and keeping traffic flowing.

This model would work in a major city too. Smart cities already have technology in place to install a ‘mesh’ over the whole urban environment, with sensors installed to transmit real-time traffic data across the network. Sensors placed on buildings and on kerbsides could determine whether or not there is a car parked in a space and communicate this information to smartphone users – it could even bring Satellite Navigation and mapping technology into the mix to deliver true, real-time parking information to drivers. Drivers could save both time and frustration – forewarned is forearmed.

Powering the cities of the future

Faster mobile networks are at the heart of smart cities and are enabling people to do more on the move. As networks offer more cloud-based services and storage, this in turn leads to richer content and apps being available to end-users, which both informs and is informed by ever-smarter mobile devices.Smarter devices, faster networks and the cloud becoming ubiquitous all combine to power greater consumption of digital content – in short, users want more data all the time and want it now.

The Internet of Things (IoT) will also play a key role in smart city development. The sheer weight of Big Data generated by the IoT will impact everywhere, particularly on things like traffic flow – town planners will be able to gather the data, analyse it and use it to tailor future policy and projects.

The changing nature of the city as we know it

As smart cities get smarter we’ll be able to introduce new, joined-up services, based on gathering data through sensors and delivering it to smart devices to make life easier for both citizens and administrations. As well as projects like smart traffic management there are other knock-on benefits to be had – for example, parking space sensors could also be used to detect street temperatures in real-time, and tell municipalities whether they need to send out snow ploughs today.

Smart cities are very much about making yesterday’s dreams today’s reality. Back in the mid-twentieth century there was much talk of traffic jams and urban congestion being eliminated in the future. Technology has helped change the very nature of a city and encourage investment in smart cities as a result. Cities began life as religious centers which in time became defence centres and subsequently market centres and industrial centers. In the information era, cities will evolve to become innovation centres, and as economic competition becomes more about competition between cities rather  than just countries, having high levels of innovation and skilled people will be key. The smarter the city, the higher its innovation levels and the better equipped it will be to compete in the economic marketplace.

Gordon

Six tips for mobile device management security

There has been a lot of discussion this year about the increasing influx of consumer devices being used for both professional and personal purposes. Many organisations are feeling a little overwhelmed as they try to work out appropriate security levels and device management boundaries. When you take into consideration all the platform and application updates chewing through corporate bandwidth, plus the potential for rogue applications and malware to gain illicit access to company data, there are many headaches for security managers to deal with.

Here are six tips to help get the efficient and secure management of mobile devices under control:

1. Have a strong mobile policy

This may seem like an obvious tip, but there is often a clear disconnect between employees and employers’ expectations of how consumer devices will be used in the enterprise. Research from IDC found that not only were workers using their devices at twice the rate, they also tended to think employers were far more permissive of the use of consumer devices than they actually were. It is therefore very important to have a mobile use policy clearly defined to avoid these kinds of misunderstandings.

A mobile usage policy is a framework that defines who the users are and what devices, platforms and applications they can and can’t use. Enterprises must clearly define policies around reimbursement for services and what applications users can access via personal devices, along with clear guidance on who controls the data on devices.

2. Create an inventory of assets

How can you be assured of the security of employees’ mobile devices if you don’t know how many are out there and what they are? Implementing a robust and regularly updated inventory management system is a vital part of any mobile device management system. While many businesses do have an inventory of fixed and wireless assets, the majority of them are not updated and validated on a regular basis, leading to the potential for security issues to slip through the cracks via unknown devices or inappropriate usage. Businesses with accurate inventories have much clearer insight into their telecommunication environments and as such, more reliable information on which to base policy decisions.

3. Ensure proper configuration of devices

The sheer number of different devices and platforms out there can make the configuration of devices a challenging process. Factor in entry level handsets, smartphones, tablets with different operating systems and employees working in numerous different locations and the issue becomes even more complex. However, if a device is enrolled with a mobile device management server, a configuration profile defined and managed by IT admin can be implemented, enabling the device to interact with enterprise systems. An appropriate level of encryption can also be added to any commands coming from the server to ensure that settings cannot be altered without proper authorisation.

4. Implement appropriate security

Despite the influx of consumer devices into the workplace, many organisations haven’t implemented stronger security controls in response, leaving them at risk of security breaches or loss of sensitive data. Data encryption is a powerful piece of the mobile security puzzle and yet many businesses do not use it on a regular basis. In addition to implementing data encryption, enterprises need to inform workers about the risks of failing to comply with security protocols – there is a good chance that they are unaware of the risks associated with using their personal devices for professional purposes.

5. Regulate application protocols

Taking into consideration that there are thousands upon thousands of mobile applications out there, strong protocols need to be instituted for the deployment of any new applications and the management of existing applications. Malware is steadily creeping into the app world, so even applications from the app store need to be checked before they are allowed into the enterprise. Such malicious applications can take over the mobile device and operate in the background without the user knowing, searching for sensitive information such as passwords or banking details.

6. Provide training and end-user support

A relatively small percentage of the overall functionality of the average mobile device is used on a regular basis. With devices becoming more and more sophisticated, users could end up massively under-utilising all the functions that are at their disposal. As a result, most enterprises would benefit from providing user training, including how to set up email, device customisation, application selection and usage, understanding browser capabilities, using instant messaging, and mobile data services and understanding device functions and shortcuts. Support and training can increase worker efficiency and also reduce security risks, as employees better understand how their devices work.

Managing employee mobility doesn’t need to be a nightmare. With the right systems put into place, employees and employers alike can reap the benefits of mobility.

Original Publication

Six tips for mobile device management security

There has been a lot of discussion this year about the increasing influx of consumer devices being used for both professional and personal purposes. Many organisations are feeling a little overwhelmed as they try to work out appropriate security levels and device management boundaries. When you take into consideration all the platform and application updates chewing through corporate bandwidth, plus the potential for rogue applications and malware to gain illicit access to company data, there are many headaches for security managers to deal with.

Here are six tips to help get the efficient and secure management of mobile devices under control:

1. Have a strong mobile policy

This may seem like an obvious tip, but there is often a clear disconnect between employees and employers’ expectations of how consumer devices will be used in the enterprise. Research from IDC found that not only were workers using their devices at twice the rate, they also tended to think employers were far more permissive of the use of consumer devices than they actually were. It is therefore very important to have a mobile use policy clearly defined to avoid these kinds of misunderstandings.

A mobile usage policy is a framework that defines who the users are and what devices, platforms and applications they can and can’t use. Enterprises must clearly define policies around reimbursement for services and what applications users can access via personal devices, along with clear guidance on who controls the data on devices.

2. Create an inventory of assets

How can you be assured of the security of employees’ mobile devices if you don’t know how many are out there and what they are? Implementing a robust and regularly updated inventory management system is a vital part of any mobile device management system. While many businesses do have an inventory of fixed and wireless assets, the majority of them are not updated and validated on a regular basis, leading to the potential for security issues to slip through the cracks via unknown devices or inappropriate usage. Businesses with accurate inventories have much clearer insight into their telecommunication environments and as such, more reliable information on which to base policy decisions.

3. Ensure proper configuration of devices

The sheer number of different devices and platforms out there can make the configuration of devices a challenging process. Factor in entry level handsets, smartphones, tablets with different operating systems and employees working in numerous different locations and the issue becomes even more complex. However, if a device is enrolled with a mobile device management server, a configuration profile defined and managed by IT admin can be implemented, enabling the device to interact with enterprise systems. An appropriate level of encryption can also be added to any commands coming from the server to ensure that settings cannot be altered without proper authorisation.

4. Implement appropriate security

Despite the influx of consumer devices into the workplace, many organisations haven’t implemented stronger security controls in response, leaving them at risk of security breaches or loss of sensitive data. Data encryption is a powerful piece of the mobile security puzzle and yet many businesses do not use it on a regular basis. In addition to implementing data encryption, enterprises need to inform workers about the risks of failing to comply with security protocols – there is a good chance that they are unaware of the risks associated with using their personal devices for professional purposes.

5. Regulate application protocols

Taking into consideration that there are thousands upon thousands of mobile applications out there, strong protocols need to be instituted for the deployment of any new applications and the management of existing applications. Malware is steadily creeping into the app world, so even applications from the app store need to be checked before they are allowed into the enterprise. Such malicious applications can take over the mobile device and operate in the background without the user knowing, searching for sensitive information such as passwords or banking details.

6. Provide training and end-user support

A relatively small percentage of the overall functionality of the average mobile device is used on a regular basis. With devices becoming more and more sophisticated, users could end up massively under-utilising all the functions that are at their disposal. As a result, most enterprises would benefit from providing user training, including how to set up email, device customisation, application selection and usage, understanding browser capabilities, using instant messaging, and mobile data services and understanding device functions and shortcuts. Support and training can increase worker efficiency and also reduce security risks, as employees better understand how their devices work.

Managing employee mobility doesn’t need to be a nightmare. With the right systems put into place, employees and employers alike can reap the benefits of mobility.

Original Publication