TekSmith Systems » Blog | TekSmith Systems http://www.teksmithsystems.com Fri, 13 Feb 2015 16:26:40 +0000 en-US hourly 1 http://wordpress.org/?v=4.0.1 Your Smart TV May Be Spying On You http://www.teksmithsystems.com/2015/02/13/your-smart-tv-may-be-spying-on-you/ http://www.teksmithsystems.com/2015/02/13/your-smart-tv-may-be-spying-on-you/#comments Fri, 13 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/13/your-smart-tv-may-be-spying-on-you/ Smart devices are wonderful. The latest smart phones all have virtual assistants you can just ask questions rather than bothering with the ...]]> spyingSmart devices are wonderful. The latest smart phones all have virtual assistants you can just ask questions rather than bothering with the whole typing thing. That’s both fantastic and convenient. The day’s coming when keyboards will be relegated to the dustbin of history.

It’s not just smartphones, either. Television manufacturers have done a remarkable job at reinventing themselves and staying relevant in the world of handheld devices. After all, who wants to watch the latest blockbuster movie on a tiny, five-inch screen? TVs have progressed to the point where the remote is no longer necessary. From the comfort of your sofa, you can simply tell your TV what channel you want it to go to, or which app to launch, and it does it. Samsung and all the other major television manufacturers have incorporated that feature into their latest sets, and it has been widely applauded.

What’s the Downside?

The downside is simply this: In order to understand what those voice commands mean, a computer has to digitally record, then interpret them. You read that correctly. It makes a digital copy of your spoken words. All of them. Understand that all smart TVs work exactly the same way. This exact feature is coming to the fore because Samsung made it a point to mention it specifically in their privacy policy.
How many times have you had a private, personal conversation with someone while watching TV? If you stop and think about it, you’ll probably come to the realization that it happens more often than you first thought. The TV has become such a fixture in our lives that we don’t even think about it, and why should we? For decades, our TV’s were just passive boxes that dutifully displayed the images we wanted. The whole idea of a “smart TV” is still somewhat alien to us, and we’re struggling to adapt with this new concept.
What it means for consumers is that the company that owns the TV is digitizing every word you say while you’re within “earshot” of the set. According to the Samsung privacy policy, all your spoken words are shipped off to a third party, and that party converts them to text. The question then becomes, “what does that third party do with all that data?” That’s an excellent question, and nobody really seems to know.
Of course, as Samsung says, you can avoid all this simply by turning off the voice feature of your “smart TV,” but then you’re in the somewhat-troubling situation of having paid a premium for a smart set, only to immediately dumb it back down. If that was your plan, you could have just saved some money and an extra step by not buying the smart TV in the first place. While this is a “solution,” it’s not really a solution. All of this to say, be careful what you say around your Smart TV. You really don’t know who’s listening, or what they’re doing with your words.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/13/your-smart-tv-may-be-spying-on-you/feed/ 0
What Radio Shack’s Demise Can Teach You About Your Business http://www.teksmithsystems.com/2015/02/12/what-radio-shacks-demise-can-teach-you-about-your-business/ http://www.teksmithsystems.com/2015/02/12/what-radio-shacks-demise-can-teach-you-about-your-business/#comments Thu, 12 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/12/what-radio-shacks-demise-can-teach-you-about-your-business/ Who doesn’t love Radio Shack? The company is as much a part of American retailing lore as Sears and Roebuck and Macy’s. ...]]> radioshackWho doesn’t love Radio Shack? The company is as much a part of American retailing lore as Sears and Roebuck and Macy’s. The TRS-80 the company made famous was instrumental in the popularization of the personal computer, and for decades the store was the go-to location for cables, components, and a dazzling variety of gadgets and hardware you just couldn’t get anywhere else. Sure, there were the occasional product flops (does anyone remember the CueCat? No? There’s a very good reason for that). Somewhere along the way though, the world started changing, and Radio Shack didn’t change with it, or at least not fast enough to matter.

What Happened?

Back in the late 70s and 80s, RadioShack was poised to be THE name in electronics retail. The only store you would ever need. The problem was, their often over-paid managers had lots of big ideas and they tried them all. Simultaneously and haphazardly.

They tried to be the super-electronics store, but with a small footprint. They tried to be the mammoth PC manufacturer and for a while the TRS-80 even outsold Apple, but they didn’t keep up with the times. The venerable TRS-80 became known as the “Trash 80” within a few years, and its PCs were being outperformed by Dells, IBMs and Apples. They tried to be the cellphone giant, only to sell the business at exactly the wrong time. They tried to be Best Buy and Circuit City combined, but of course, with a small footprint and limited inventory, they wound up being neither.

At every turn their strengths became weaknesses. The vision of their leadership, while bold and exciting, was not executed with any kind of focus, and that’s the real shame. Businesses tend to be at their best when they focus on one thing and apply all their available resources to doing that one thing really well. As RadioShack dabbled in dozens of different things, never really giving any one of them its undivided attention, more focused businesses sprang up around them and began systematically taking market share from them.

It’s clear that you don’t kill a billion-dollar company overnight, but the retailer’s descent accelerated with the commercialization of the internet and the rise of Amazon. Having been relegated to being a niche presence in retail, focusing on cables and the other essential hardware that make computers run, Radio Shack suddenly found even this ground shifting beneath their feet. Why run down to your local Radio Shack and pay 30-40% more for the cable you need when you can just have it delivered to your door? That’s how Radio Shack became a business without a point or purpose.

It was a good store. It could have been a great store. It could have been one of the defining companies of the computer age, and it’s a real pity that it wasn’t. Radio Shack, you will be missed, and to business owners everywhere, take care not to make the same mistakes they made, or you may well be joining them.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/12/what-radio-shacks-demise-can-teach-you-about-your-business/feed/ 0
Hybrid Cloud Computing a Winning Combination http://www.teksmithsystems.com/2015/02/11/hybrid-cloud-computing-a-winning-combination/ http://www.teksmithsystems.com/2015/02/11/hybrid-cloud-computing-a-winning-combination/#comments Wed, 11 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/11/hybrid-cloud-computing-a-winning-combination/ When looking at cloud computing options for your business, you should examine the benefits and the drawbacks of both public and private ...]]> hybrid_cloudWhen looking at cloud computing options for your business, you should examine the benefits and the drawbacks of both public and private cloud services. A public cloud gives you the flexibility to work from virtually anywhere and share and collaborate on data with many different people. A private cloud, on the other hand, gives you the added security you need to protect your important files from prying eyes, but sacrifices some of the wider-scale availability you get with a public cloud. Today, most companies are choosing a hybrid cloud computing approach in order to gain access to the benefits of both public and private cloud options.

The Benefits Of A Public Cloud
The public cloud model is much more open when compared to private options. Often, your data is stored on servers with that of other companies, even though you can only see your files. These solutions are much more cost-effective for businesses and make it easier for them to share data among their own employees, vendors, and even customers.

The Advantages Of A Private Cloud
This is a more closed cloud system that offers tighter security and more stringent controls. Private clouds are usually only used and able to be seen by the individual companies operating them. They are the perfect solution for storing files that need more security and are the right place to host applications and other business-critical software and data. Private clouds are more expensive, however, when compared to available public cloud storage options.

Hybrid Solutions Provide Balance
When business owners are searching for more cost-effective solutions for their storage needs, they are often looking for solutions that give them easy access to their data and give them the security and flexibility they need at a price they consider affordable. For many companies, the solution to storage needs lies in a hybrid approach using both private and public clouds for storage. Some companies may even choose to host some files locally on their own servers and move the rest to a public cloud environment.

However business professionals choose to break it apart, a hybrid solution is often the best option for businesses looking to expand the storage options while keeping costs under control. For mission-critical applications and sensitive data, a smaller private cloud can be used, and for other aspects of the business, a public cloud is almost always the best and most cost-effective solution. Ideally, these environments will work across the business as one homogeneous and seamless storage solution, making it easy for everyone in the company to understand and use them.

Cloud storage solutions have become one of the key ways in which companies can reduce costs while increasing their storage capabilities and ability to share files and work from virtually any location. Hybrid solutions are often the best fit for companies as a combination of the cloud options will give them the security they need while offering added work flexibility at a reduced cost.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/11/hybrid-cloud-computing-a-winning-combination/feed/ 0
“Misfortune Cookie” Security Flaw Leaves Millions Vulnerable http://www.teksmithsystems.com/2015/02/10/misfortune-cookie-security-flaw-leaves-millions-vulnerable/ http://www.teksmithsystems.com/2015/02/10/misfortune-cookie-security-flaw-leaves-millions-vulnerable/#comments Tue, 10 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/10/misfortune-cookie-security-flaw-leaves-millions-vulnerable/ In the wake of the now-infamous Sony hack, many new security vulnerabilities are being found across a wide range of devices. Check Point Software Technologies recently revealed a flaw found in millions of routers in use across the Internet that allow hackers to take control of the devices. The vulnerability, beingmisfortune_cookie called “Misfortune Cookie,” has been found on at least 12 million devices currently connected to the Internet.

What is the “Misfortune Cookie” Flaw?
The vulnerability can be found in the embedded web server software, RomPager from AllegroSoft. A hacker can attack the web server and exploit this bug allowing it to take control of the router. They can then use this control to steal data from both wired and wireless devices that are connected to the router.

Why is it so Prevalent?
A patch for this security flaw has been available since 2005, but about 98% of the routers using RomPager are still running without the patch that plugs this hole. The fact is many people never bother to update the firmware on their routers, and many users simply do not have the technical knowledge necessary to do it. Even if router manufacturers made sure that this flaw has been patched on their end, it is still often up to the users. Many experts believe that this flaw will continue to be seen for years to come because of this simple fact.

Not Just for Routers
Infected routers are not a new method of attack for hackers. Earlier this year, hackers used routers, home theater systems and even a smart refrigerator to send out hundreds of thousands of spam email messages across the Internet.

What Can You Do?
When you consider security, you must think in broader terms than just your computer. You need to consider your entire network. This is especially true if the router is used by a small business. In addition to always running good antivirus software, you have to take the time to patch your router with the latest software from the manufacturer. This is the best defense against these types of security flaws. The router manufacturers should have detailed instructions available on how to patch your router. Many are prepared to offer assistance to your business if needed.

Lack of Awareness
Business owners and CEO’s alike are largely unaware of the threats against their companies’ networks each and every day. This lack of awareness can lead to dangerous results as business owners fail to allocate the proper resources to secure their networks. These resources must be used on security measures to ensure that both internal company data and the personal data of customers remains safe from the prying eyes of hackers looking to steal this information and use it for their own nefarious purposes.

Many business owners are unaware that their systems are under attack on a regular basis. Hackers are constantly seeking new victims and will never stop. To ensure your business remains secure from the threats of hackers, you have to remain vigilant and make security a top priority for your business. If you don’t, your business could become the next victim of the hackers and you could find your valuable data could be stolen right out from under you.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/10/misfortune-cookie-security-flaw-leaves-millions-vulnerable/feed/ 0
Solving Big Data Privacy Issues http://www.teksmithsystems.com/2015/02/09/solving-big-data-privacy-issues/ http://www.teksmithsystems.com/2015/02/09/solving-big-data-privacy-issues/#comments Mon, 09 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/09/solving-big-data-privacy-issues/ Today, companies are able to collect massive amounts of data about their customers and their shopping habits. This data can provide companies ...]]> data_roadblocksToday, companies are able to collect massive amounts of data about their customers and their shopping habits. This data can provide companies with valuable insights into what products they could sell and how they should market those products to consumers. However, there are a few problems in the collection of data for many companies seeking to learn more about their consumers.

How To Read The Data
While a lot of the data they receive about their customers comes in formats easy for computers to read, much of it comes in a different form. These types of data could be hand written notes that were jotted down as part of a survey, or even correspondence they received from a customer. The problem with this data is computers have difficulty reading it and then translating it into meaningful information for a company to act upon.

Giving The Data Context
Even if a company gains the ability to read data from large reports or survey questions, it will still have to find a way to automatically distinguish what is said in those reports. For example, take the word “bug” that might be found in a report. Most computers could pick this word out of the report, but they will have a hard time distinguishing between a computer bug, a creepy crawly bug or even a VW bug. Because of this limitation, the results from a simple search could give data that is skewed and inaccurate, making it virtually useless.

Big data can be a great tool for companies, but if they fail to put it in the proper context, it will not give them any meaningful insights into their businesses or their customers. Reading and translating the data accurately is the only way to ensure results that can actually be used by a business to enhance its products and improve their customers’ shopping experiences.

Privacy Concerns
There is a huge fear that big data could mean the end of privacy as we know it. While it is true that more and more of your information is being collected, many companies are trying to collect this data in a manner that not only gives them the meaningful insights they need, but also protects your privacy. Software utilized to read this type of data is being designed and optimized to strip out certain types of data in an attempt to limit the privacy risks of customers.

The push of big data has become a trend that almost all companies, small and large, are taking advantage of every day. With the increasing ability of technology to collect massive amounts of data about customers comes a need to create new systems that are smart enough to read and sort through it all and then present it in an organized fashion that can be used to improve products and customer experience. This presentation represents the biggest challenge faced by companies looking to exploit big data, and it must be solved if they ever hope to benefit from the information it can provide.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/09/solving-big-data-privacy-issues/feed/ 0
Email Is Still Vital Despite Shifting Trends http://www.teksmithsystems.com/2015/02/07/email-is-still-vital-despite-shifting-trends/ http://www.teksmithsystems.com/2015/02/07/email-is-still-vital-despite-shifting-trends/#comments Sat, 07 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/07/email-is-still-vital-despite-shifting-trends/ Social media has become much more than just a place for individuals to hang out and share their latest stories and pictures. ...]]> email-still-vitalSocial media has become much more than just a place for individuals to hang out and share their latest stories and pictures. Today, businesses are more involved than ever, and many companies have doubled down on social media, abandoning their traditional websites and email address for a Facebook page and a Twitter account.

However, despite the shift in trends, email combined with a traditional web presence still has a place in business and, if leveraged correctly, can still be a very powerful tool for your business.

The Benefits of Email
No matter what the latest social craze is or how “sexy” a business wants to appear to their potential markets, the benefits of email are still tangible and cannot be denied. Everyone today has at least one email address, and everyone knows how to read and send email. This creates a large market potential for companies looking to expand. Email is also brand-able. Every address is unique, and your company’s public email address can be yet another way for people to instantly recognize who you are and what you do. Email marketing has risen to become one of the most powerful sources of income for many companies and currently shows no signs of slowing down, making it a resource you shouldn’t ignore.

There Are Drawbacks
Despite all these benefits, there are some drawbacks to using email for your business. Spam has become a huge problem worldwide with companies investing millions to try and sift through the hundreds upon thousands of emails that come in. Users are increasingly having to be careful about what email to open and what to ignore as emails can contain harmful content such as viruses and malware. For companies looking to craft great, compelling emails, they must learn how to create HTML email that looks good across a wide range of browsers if they hope to be effective.

Email Is Not Dead Yet
Even with Facebook and other social media outlets creating new messaging formats that are quickly picking up steam, email is still a big part of the world. So much so that even Facebook and Google+ understand this as they try to incorporate email as part of their own messaging systems. Email has also become a great way to send out information such as newsletters that customers want to read but don’t want or need to respond to in any way. While it’s true that email use has declined over the years, it is still something that is, at the very least, checked on a regular basis by all users online.

Today, email is still a vital part of every business and is both a tool for communication and a tool for marketing to customers. It is important to remember, however, that the conversation with our customers doesn’t end when you click the send button. You must seek out these consumers where they hang out online and use the combined power of social media and email to create a healthy and thriving customer base.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/07/email-is-still-vital-despite-shifting-trends/feed/ 0
Mobile, Cloud and Security Issues http://www.teksmithsystems.com/2015/02/06/mobile-cloud-and-security-issues/ http://www.teksmithsystems.com/2015/02/06/mobile-cloud-and-security-issues/#comments Fri, 06 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/06/mobile-cloud-and-security-issues/ With the advancement of technology comes a host of new problems that IT leaders must tackle. In the past, IT leaders have ...]]> mobile-cloud-securityWith the advancement of technology comes a host of new problems that IT leaders must tackle. In the past, IT leaders have had to wrestle with a variety of issues, from what types of computers to buy to how many servers they should use to ensure a strong internal network. Today, times have changed and the evolution of technology has brought many advancements to business networks. However, there are many newer technologies that businesses are beginning to use that keep IT leaders up at night as they worry about how best to implement and maintain them in the coming years.

Mobile
IT leaders and department heads still struggle over how to properly integrate mobile systems such as smartphones and tablets into their businesses. IT departments want to be sure the mobile technology they choose offers their users meaningful connectivity and functionality while also giving administrators the control they need over the devices to maintain some semblance of order in the company’s technology infrastructure. Many leaders struggle with various policies such as bring-your-own-device or bring-your-own-app policies, as these guidelines often move the technology outside of the watchful eyes of IT and make it much more difficult to control.

The Cloud
Currently there is a big shift to the cloud by both individuals and businesses. While the cloud offers many great features and can often be used at a fraction of the cost of local storage, there are still many concerns for IT leaders when shifting to the cloud. Speed, reliability and security are all top priorities among IT heads everywhere, along with exactly what type of cloud should they implement and how much of the business can they safely migrate while still maintaining a reliable network.

Security
Data breaches are happening on such a regular basis now that many of us don’t even notice the latest one when it makes the news. However, security remains a big concern for IT heads everywhere. No company wants to become the next victim of a big data breach so IT leaders continue to invest both time and money resources to try and shore up the defenses of the networks they are charged with protecting. Unfortunately, these resources are often limited making it difficult for IT to create the web of security they are hoping for to ensure that company data remain safe.

These new technologies and threats have created an interesting environment for IT leaders. Companies are increasingly shifting their IT offsite to other companies and have become increasingly reliant on cloud and mobile based systems. In order to properly implement these systems and ensure they work for and not against the company, IT leaders need resources and people with the skills to handle these new technologies. Many IT heads have said that they don’t have the resources they need, making it difficult for them to serve their company properly and provide users with the IT technologies they expect.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/06/mobile-cloud-and-security-issues/feed/ 0
Email Habits That Cost You Valuable Time http://www.teksmithsystems.com/2015/02/05/email-habits-that-cost-you-valuable-time/ http://www.teksmithsystems.com/2015/02/05/email-habits-that-cost-you-valuable-time/#comments Thu, 05 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/05/email-habits-that-cost-you-valuable-time/ Email is a valuable tool to any business. It is used by everyone and has become the top communication method used by ...]]> email-habits-costEmail is a valuable tool to any business. It is used by everyone and has become the top communication method used by people worldwide. However, from time to time it has also become a great source of frustration for users who feel overwhelmed by the vast amounts of data that arrive in their inbox. There are steps you can follow to take control of your email inbox so you stop wasting your valuable time sorting email and devote more time to other matters that are vastly more important to business.

Overflowing Your Inbox with Too Much Information
Many people like to stay on top of everything, but subscribing to too many newsletters or email notifications will quickly fill your inbox with information you don’t need, forcing you to sort through it on a regular basis so your box doesn’t overflow. Subscribe to those newsletters and notifications you know are mission critical and consider creating rules to sort them automatically to keep your inbox from bursting with too much information. Letting messages run wild makes it difficult for you to find real emails that need your attention.

Using Email for Everything
So much happens through email today, but you must ask yourself if it is really necessary. In some cases the answer is yes, as the paper trail is good to have. However, in other instances you could accomplish the same thing in a fraction of the time simply by using chat applications or even picking up the phone and calling the person you are about to email.

Writing Long Emails
Writing long email takes valuable time away from other more important tasks. Brevity and clarity are as important as good grammar when composing a message. Remember, most people don’t want to spend huge amounts of time reading your long emails. Consider keeping your emails short and to the point so you can get on with other more important work.

Spending Too Much Time in Your Inbox
You don’t need to dive into your email every couple of minutes; spending too much effort in organizing your inbox will waste valuable time that could be devoted to other projects. Balance is key here. Consider checking your email at slightly longer intervals and devote only a few minutes to organization, or you could find your whole day has vanished as you attempt to place every email in a specific location.

Never Archiving or Deleting
While many users want to keep every single email they ever receive, the truth is most of these emails aren’t important and serve only to clutter up an inbox and make it difficult to find other, more important correspondence. Instead of saving everything, delete any email that is not business critical and regularly archive your email for those rare cases where you must access them. This will result in a much cleaner inbox that is easy to search and navigate so you can send off those emails much faster than before.

Email won’t be going away any time soon, and it is still one of the best tools for conducting business. It can overwhelm you, however, and make it difficult to actually conduct business. Following these few easy steps will help you organize your email once and for all.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/05/email-habits-that-cost-you-valuable-time/feed/ 0
Leveraging the Power of Crowdsourcing http://www.teksmithsystems.com/2015/02/04/leveraging-the-power-of-crowdsourcing/ http://www.teksmithsystems.com/2015/02/04/leveraging-the-power-of-crowdsourcing/#comments Wed, 04 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/04/leveraging-the-power-of-crowdsourcing/ Crowdsourcing has become one of the best ways for companies to learn about what consumers think of their products and how they ...]]> leveraging-power-crowdsourcingCrowdsourcing has become one of the best ways for companies to learn about what consumers think of their products and how they feel about their brand. It has also become one of the top ways for companies to connect with their customers and form meaningful connections to the brands they sell.

What Is Crowdsourcing?
Crowdsourcing is the process of obtaining ideas about your business’s products and services from a large group of people – usually your customers. Crowdsourcing often takes place online, using social media and other online communities instead of enlisting the more traditional help sources, namely employees and other vendors.

Why Crowdsource?
As a business, you probably recognize that your customers know as much about your brand or brands as you do. Sometimes they may actually know more than you do about them. Crowdsourcing can help you gain meaningful and true insights from the users of your brands. Your customers can help you improve your existing products and could help you create new products that they want and will buy from you. They can help you generate buzz for new products and give you insights into new campaigns and advertising.

How Businesses Are Using It
Businesses are using crowdsourcing in a variety of ways to help increase product awareness or just simply to improve customer loyalty. Crowdsourcing is a great research tool as well, and when combined with a promotion campaign can also increase awareness of your brand. By leveraging the power of already loyal customers, businesses can educate themselves on their brand and learn where they should take the brand in the future.

Lays, for example, has become a leader in crowdsourcing with many campaigns designed to really connect with their customers. Their latest campaign, “Do Us a Flavor”, allowed their customers to create custom flavored chips and submit them online. The winner will not only get a new flavor of potato chips out of it, but also a $1 million dollar prize.

Starbucks has also engaged its customers with its “create a cup” contest. Their customers are encouraged to decorate cups and submit pictures of them. The winning cup will become a limited-edition printed cup sold in Starbucks everywhere.

Doritos has created a “boldness” campaign that encourages its customers to “live boldly” and prove it by sending in pictures of how they are living bold. They create various missions that their customers must fulfil for various rewards. This simple little campaign fits nicely with their business and allows them to increase brand awareness while learning exactly who is buying their brand.

The above examples demonstrate how powerful crowdsourcing truly can be. With one campaign, companies learn so much about how consumers feel about their products and what they believe the company should be doing, while at the same time generating excitement for their brand and growing their business.

With crowdsourcing, businesses can tap into their already established networks of loyal customers and leverage the power of that group in new and fresh ways.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/04/leveraging-the-power-of-crowdsourcing/feed/ 0
FTC Warns of Data Collection from Gadgets http://www.teksmithsystems.com/2015/02/03/ftc-warns-of-data-collection-from-gadgets/ http://www.teksmithsystems.com/2015/02/03/ftc-warns-of-data-collection-from-gadgets/#comments Tue, 03 Feb 2015 16:00:00 +0000 http://www.teksmithsystems.com/2015/02/03/ftc-warns-of-data-collection-from-gadgets/ The Internet of Things hopes to bring a new wave of connectivity options to seemingly mundane devices including your refrigerator and other ...]]> ftc-warns-dataThe Internet of Things hopes to bring a new wave of connectivity options to seemingly mundane devices including your refrigerator and other household appliances. This new age of connected devices has already begun – thermostats have already been released that make your home or office “smart”, allowing you to control them with your smartphone from virtually anywhere. However, with these new kinds of connectivity, businesses now have an unprecedented ability to collect personal data about you and your habits that has prompted a warning from the U.S. Federal Trade Commission.

Potential Privacy Threat
Edith Ramirez of the FTC has warned consumers and businesses that these devices have the potential to collect vast amounts of what until now has been personal data on someone’s habits, credit card purchases, family, friends and even religious practices. These data could create a more complete personal picture of an individual that might not be pertinent, but could alter a person’s ability to, for example, obtain employment due to a false impression that it might create. Some fear it could even go farther and sour a university or college against a potential candidate seeking education after high school or prospective employers for applicants of all ages.

Positive Potential
The FTC has acknowledged that the Internet of Things and the data it can collect could bring about some positive reforms as well that could improve health and even boost the potential for economic growth for both businesses and individuals. At the same time, companies can use these data to further develop their products to bring consumers the gadgets they want and need, enhancing the quality of life for all involved. However, the FTC believes these benefits shouldn’t come at the expense of an individual’s privacy rights.

Business Responsibility
Businesses will be the entities collecting and sorting through this vast amount of data, and the FTC urges companies to proceed with caution and only collect data that is relevant and necessary. The data that are collected should be handled with great care, and companies should work diligently to not paint a potentially-inaccurate picture. On top of that, companies must be responsible with sharing this information to ensure a person’s rights are not violated, and that they are not harmed in any way as a result of the collection.

The Internet of Things will no doubt be the next big Internet revolution, and in the coming years more and more of our possessions, such as our houses and cars, will become increasingly connected to the Internet. This will allow us more control and customization than we have ever had before. With that connectivity also comes the ability of businesses to collect and learn more about our habits and even tell them much more personal information. It is up to businesses to handle this amount of data responsibility and remember the privacy rights of all concerned.

Used with permission from Article Aggregator

]]>
http://www.teksmithsystems.com/2015/02/03/ftc-warns-of-data-collection-from-gadgets/feed/ 0