Digital Smarts Blog

You are here

15
Oct

Snapchat Explained

According to Snapchat CEO Emily White, computing has evolved from being a tool for solving problems to a medium for sharing feelings for young users. Snapchat is a popular messaging service that allows users to send text and photos that disappear after being opened by the recipient. If what White says is true, this may explain the complaint that young technology users know how to communicate, but have no idea how the technology works nor how to put it to use to solve problems. This could also explain why there seem to be fewer young adults looking to enter computer related fields in the workforce.

15
Oct

Snapchat Explained

According to Snapchat CEO Emily White, computing has evolved from being a tool for solving problems to a medium for sharing feelings for young users. Snapchat is a popular messaging service that allows users to send text and photos that disappear after being opened by the recipient. If what White says is true, this may explain the complaint that young technology users know how to communicate, but have no idea how the technology works nor how to put it to use to solve problems. This could also explain why there seem to be fewer young adults looking to enter computer related fields in the workforce.

14
Oct

Do Not Track

Technologists have been concerned about the privacy implications of online tracking systems for years. A Wall Street Journal series called What They Know brought widespread public attention to the issue by showcasing how marketers gather data on online users. Policy makers have begun devising ways to give users a choice about when they are tracked online. If you are concerned about who is tracking you and your family, you should become familiar with Do Not Track, a unique and powerful way of dealing with the problem of online tracking. It provides users with a voice for telling companies they do not want to be tracked online.

14
Oct

Do Not Track

Technologists have been concerned about the privacy implications of online tracking systems for years. A Wall Street Journal series called What They Know brought widespread public attention to the issue by showcasing how marketers gather data on online users. Policy makers have begun devising ways to give users a choice about when they are tracked online. If you are concerned about who is tracking you and your family, you should become familiar with Do Not Track, a unique and powerful way of dealing with the problem of online tracking. It provides users with a voice for telling companies they do not want to be tracked online.

13
Oct

Internet Safety Software That May Not Be Safe

In an effort to protect families from digital threats, law enforcement agencies across country have been endorsing and distributing software called ComputerCOP. The program claims to help parents monitor their childrens’ online computer use and protect against predators, however a recent investigation has found that the software has severe security flaws that could be putting sensitive information at risk. The Electronic Frontier Foundation reports that the software includes a keylogging feature that transmits keystrokes to a third party. Even worse, the information is transmitted without encryption, exposing passwords and other sensitive data to attackers. If you need to remove this software from your computer, you can follow these directions on the EFF site.

13
Oct

Internet Safety Software That May Not Be Safe

In an effort to protect families from digital threats, law enforcement agencies across country have been endorsing and distributing software called ComputerCOP. The program claims to help parents monitor their childrens’ online computer use and protect against predators, however a recent investigation has found that the software has severe security flaws that could be putting sensitive information at risk. The Electronic Frontier Foundation reports that the software includes a keylogging feature that transmits keystrokes to a third party. Even worse, the information is transmitted without encryption, exposing passwords and other sensitive data to attackers. If you need to remove this software from your computer, you can follow these directions on the EFF site.

10
Oct

Toyota Teen Driver Resources

If you have a teen driver in your household, you may find the parent resources on the Toyota web site very useful in starting your discussions about texting or talking on the phone and driving. Take a look at the Parents Toolkit and the materials on evaluating your own driving and technology use, because the behavior you model has a huge impact on your children’s driving habits.

10
Oct

Toyota Teen Driver Resources

If you have a teen driver in your household, you may find the parent resources on the Toyota web site very useful in starting your discussions about texting or talking on the phone and driving. Take a look at the Parents Toolkit and the materials on evaluating your own driving and technology use, because the behavior you model has a huge impact on your children’s driving habits.

9
Oct

Bullying Transparency

Terry Heick’s recent article on Edutopia about bullying and cyberbullying, Transparency: Bullying Redefined and Identified, is a must read for teachers and parents alike. The piece reminds readers that bullying is not an “it,” but instead is both a symptom and an output of what is happening far beyond the walls of our schools. Heick makes a most interesting point worth remembering: “If nothing else, it might be helpful to somewhat ‘normalize’ being bullied -- not to make it acceptable, but to remove the stigma from it. Everyone, at some point, has been bullied. There is no reason for shame -- only transparency.” That certainly is a perspective worth inserting into the conversation.

9
Oct

Bullying Transparency

Terry Heick’s recent article on Edutopia about bullying and cyberbullying, Transparency: Bullying Redefined and Identified, is a must read for teachers and parents alike. The piece reminds readers that bullying is not an “it,” but instead is both a symptom and an output of what is happening far beyond the walls of our schools. Heick makes a most interesting point worth remembering: “If nothing else, it might be helpful to somewhat ‘normalize’ being bullied -- not to make it acceptable, but to remove the stigma from it. Everyone, at some point, has been bullied. There is no reason for shame -- only transparency.” That certainly is a perspective worth inserting into the conversation.

8
Oct

Resources to Fight Bullying and Harassment

Edutopia recently updated their list of websites, organizations, articles, planning guides, lesson plans, and other resources that are dedicated to preventing bullying and harassment. For parents, teachers and districts, it is definitely worth a look and is just in time for October’s National Bullying Prevention Month, an initiative of the PACER Center.

8
Oct

Resources to Fight Bullying and Harassment

Edutopia recently updated their list of websites, organizations, articles, planning guides, lesson plans, and other resources that are dedicated to preventing bullying and harassment. For parents, teachers and districts, it is definitely worth a look and is just in time for October’s National Bullying Prevention Month, an initiative of the PACER Center.

7
Oct

Screen Time and Kids – It’s a Delicate Dance

It is a delicate dance figuring out how much screen time is too much for kids in a world where it is also important for them to be digitally savvy. A National Public Radio Education blog entry entitled Kids and Screen Time: Cutting Through the Static explains why it is so important, especially in the formative years, that kids have lots of face to face time. Real life interaction will give them practice reading emotion in voices and posture, and will help them navigate the turmoil of early adolescence. That is a kind of social learning that just won't fit in the palm of your hand.

7
Oct

Screen Time and Kids – It’s a Delicate Dance

It is a delicate dance figuring out how much screen time is too much for kids in a world where it is also important for them to be digitally savvy. A National Public Radio Education blog entry entitled Kids and Screen Time: Cutting Through the Static explains why it is so important, especially in the formative years, that kids have lots of face to face time. Real life interaction will give them practice reading emotion in voices and posture, and will help them navigate the turmoil of early adolescence. That is a kind of social learning that just won't fit in the palm of your hand.

6
Oct

Spy App Maker Indicted

We recently discussed the availability of smartphone spy apps that allow users to monitor a target’s smartphone, including calls, texts, social and media postings, while also tracking the smartphone’s location and secretly activating its microphone to take recordings. The technology is similar to that used by police to track suspects, however the use of this kind of surveillance by private individuals may actually violate federal law. Federal officials have indicted the maker of one of these spy apps called StealthGenie, making it the first criminal case that has been brought against the marketing and selling of a mobile spyware app. There has been no official ruling on the subject yet, but activists against domestic violence have long expressed concern that surveillance software can lead to attacks on women suspected of infidelity. Time will tell if this kind of app is declared legal, but in the meantime if someone seems to have too much information on you or a family member learn how to check for mobile spyware on your own device.

6
Oct

Spy App Maker Indicted

We recently discussed the availability of smartphone spy apps that allow users to monitor a target’s smartphone, including calls, texts, social and media postings, while also tracking the smartphone’s location and secretly activating its microphone to take recordings. The technology is similar to that used by police to track suspects, however the use of this kind of surveillance by private individuals may actually violate federal law. Federal officials have indicted the maker of one of these spy apps called StealthGenie, making it the first criminal case that has been brought against the marketing and selling of a mobile spyware app. There has been no official ruling on the subject yet, but activists against domestic violence have long expressed concern that surveillance software can lead to attacks on women suspected of infidelity. Time will tell if this kind of app is declared legal, but in the meantime if someone seems to have too much information on you or a family member learn how to check for mobile spyware on your own device.

4
Oct

Phone Lock Up

You should have a password set up to protect the information on your cell phone - that’s Digital Smarts 101. Until now, though, phone manufacturers like Apple and Google could unlock that code if given a court order. Now Apple has announced that the new operating system for iPhones, iOS 8, will not give the company access to passcode-protected phones, making it technologically impossible to comply with governmental requests. Google/Android is following suit, upsetting the FBI and other law enforcement agencies.

What measures can government agencies take to make someone unlock his or her phone? A defendant or witness can be held in contempt of court and jailed for failing to unlock a phone, but there is a possibility that the Fifth Amendment protection against self-incrimination could block such demands. Such a case will probably have to be settled by an appeals court or even travel as high as the Supreme Court. Interestingly enough, it appears that a giving a fingerprint isn’t considered testifying against yourself, making Apple’s fingerprint ID system just a way of the government collecting biometrics. Either way, this new policy takes the responsibility of corporations out of the equation. If you thought remembering your password was important before, it may now be even more difficult to get help opening your phone if you forget.

4
Oct

Phone Lock Up

You should have a password set up to protect the information on your cell phone - that’s Digital Smarts 101. Until now, though, phone manufacturers like Apple and Google could unlock that code if given a court order. Now Apple has announced that the new operating system for iPhones, iOS 8, will not give the company access to passcode-protected phones, making it technologically impossible to comply with governmental requests. Google/Android is following suit, upsetting the FBI and other law enforcement agencies.

What measures can government agencies take to make someone unlock his or her phone? A defendant or witness can be held in contempt of court and jailed for failing to unlock a phone, but there is a possibility that the Fifth Amendment protection against self-incrimination could block such demands. Such a case will probably have to be settled by an appeals court or even travel as high as the Supreme Court. Interestingly enough, it appears that a giving a fingerprint isn’t considered testifying against yourself, making Apple’s fingerprint ID system just a way of the government collecting biometrics. Either way, this new policy takes the responsibility of corporations out of the equation. If you thought remembering your password was important before, it may now be even more difficult to get help opening your phone if you forget.

3
Oct

An App That Could Save Your Life

Perhaps you have been told to create a contact in your phone labeled ICE, for “in case of emergency,” filled with the name and number of a spouse, parent, child or friend who should be notified if anything should happen to you. The problem with that is if your phone is locked with a passcode or fingerprint, it might be impossible for someone to find that contact in an emergency. Apple’s latest operating system, iOS 8, has created a possible solution to allow access to emergency contacts without unlocking the phone. The process to set it up is quite simple:

1) Click on the new Health app that is now part of every iPhone running iOS 8, and choose Medical ID from the lower-right-hand corner.

2) The first time you do this, you’ll get a descriptive screen about Medical ID and a button to Create Medical ID. On future visits to the Medical ID page, you’ll see an Edit button in the upper right.

3) Make certain that Show When Locked is activated (if you don’t, no one will be able to see this without first unlocking your phone). Then enter your name, date of birth, medical conditions, allergies, medications and critical notes about your health. You can also enter several emergency contacts. Judgment is key here, but for most people 2-3 contacts seems like a good number. You never know where you’ll be when an emergency strikes and who might not be reachable. It’s also probably a good idea to include a photo here, just to reassure someone who is trying to help you that they have the correct person’s information.

Although this feature requires you to give up a bit of privacy here, you are giving emergency responders and Good Samaritans a chance to get your information quickly.  For that reason, you might not want to include information about your health that isn’t critical for someone to know, and you might want to limit whose phone numbers you place there. There are a myriad of privacy issues that could arise, so you have to decide for yourself if having this information accessible on your or your children’s devices is a good safety solution for you. As a parent, you might just want that info readily available on a young teenage driver’s phone. For Android users there are similar apps available, such as Medical ID.

3
Oct

An App That Could Save Your Life

Perhaps you have been told to create a contact in your phone labeled ICE, for “in case of emergency,” filled with the name and number of a spouse, parent, child or friend who should be notified if anything should happen to you. The problem with that is if your phone is locked with a passcode or fingerprint, it might be impossible for someone to find that contact in an emergency. Apple’s latest operating system, iOS 8, has created a possible solution to allow access to emergency contacts without unlocking the phone. The process to set it up is quite simple:

1) Click on the new Health app that is now part of every iPhone running iOS 8, and choose Medical ID from the lower-right-hand corner.

2) The first time you do this, you’ll get a descriptive screen about Medical ID and a button to Create Medical ID. On future visits to the Medical ID page, you’ll see an Edit button in the upper right.

3) Make certain that Show When Locked is activated (if you don’t, no one will be able to see this without first unlocking your phone). Then enter your name, date of birth, medical conditions, allergies, medications and critical notes about your health. You can also enter several emergency contacts. Judgment is key here, but for most people 2-3 contacts seems like a good number. You never know where you’ll be when an emergency strikes and who might not be reachable. It’s also probably a good idea to include a photo here, just to reassure someone who is trying to help you that they have the correct person’s information.

Although this feature requires you to give up a bit of privacy here, you are giving emergency responders and Good Samaritans a chance to get your information quickly.  For that reason, you might not want to include information about your health that isn’t critical for someone to know, and you might want to limit whose phone numbers you place there. There are a myriad of privacy issues that could arise, so you have to decide for yourself if having this information accessible on your or your children’s devices is a good safety solution for you. As a parent, you might just want that info readily available on a young teenage driver’s phone. For Android users there are similar apps available, such as Medical ID.

Pages