Gadi Ben-Yehuda

Posts by Gadi Ben-Yehuda

Last week, I wrote about 3D Printing Plus and the creation of a market place that I call “Products-on-Demand” (hereafter, “PonD”.) This week, I’m going to write about what that market will look like in, say, five years when it’s much further along. Specifically, I’m going to explore what the technology will enable (with emphasis on some of the other trends I’ve detailed: always-on connected computers and networked sensors); how people and companies will use that technology for personal and professional ends; and government’s role in fostering and participating in the space.

__________________________________________________________

This is the fifth in a six-part series examining how innovation and social media are changing how agencies operate,
originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.

__________________________________________________________ Keep reading →

Governments at many levels have proven themselves to be instrumental in developing both a national and local software-developing community. Competitions like The Big App and Apps for Democracy have spread knowledge of government data sets as well as provided money and recognition to software-development firms. Forward-looking CIOs and CTOs realized that software-both its development and the finished product-could spur innovation and economic activity. They also realized that government could help the software-development community.
_____________________________________________
This is the fourth in a six-part series examining how innovation and social media are changing how agencies operate, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
___________________________________________________

Though it might sound futuristic, consider: this weekend, you could print your own circuit board. And here’s how you could print a wrench, courtesy of ZCorp. If you to use or modify someone else’s circuits, just look here, and if you need 3D designs, here are a few. As a bonus, here’s a way to turn a $10 laser into a communications station and, related, the GSA repository on GitHub. Keep reading →

How networks of public and private sensors can change how the public sector operates during routine or emergency operations.

It’s 1991, and some computer science professors are tired of walking into their computer lab of the University of Cambridge only to find an empty pot of coffee. Their solution: install a camera and connect it to the server so they could ascertain the status of the coffee pot from their desks. The rest is internet history. Keep reading →

How will the wide-scale adoption of always-on connected devices change the environment for federal leaders?

Of the five trends I outlined in my last post, the first, always-on connected devices, is so fundamental, so important, so paradigm-shifting, that it is quickly becoming invisible. Keep reading →

Social media and a renewed emphasis on innovation and DIY – exemplified by the Maker Movement and the rise of intrapreneurs – is transforming how government agencies operate and how they interact with citizens. Within the past four years, the number of networked computers that can connect to public or private sensors and feed into or draw from massive databases has exploded, both in terms of absolute numbers and relative to the population.

The effect of these converging factors is that governments at every level are finding new ways to improve three critical tasks: Keep reading →

I ‘m in Seoul, South Korea, this week for a Global e-Government Forum. Seoul is 13 hours ahead of Washington, DC, so for more than half the day, it’s tomorrow. But that’s not the only way that Seoul is in the future. The smell of kimchi mixes with the omnipresent electronica of smartphone rings and tablet notifications.

The Samsung building is visible from my hotel room, and its logo appears on at a majority of devices I’ve seen in this city. I’ve learned that this country is home to nearly 50 million people and 30 million smartphones, about 10% higher than smartphone usage in the U.S. Keep reading →

Some companies, famously, have game rooms for employees. Most organizations require that their employees abstain from gaming while at work, and some go so far as to block not only gaming Websites, but many social sites as well.

When employees bring their own smartphones to work, however, and when they connect to the internet using their own networks, employers cannot simply block a site on their own server and think they’ve solved the problem of distracting technology. Keep reading →

Three years ago, the satirical news site, The Onion, published a story titled “Report: 90% Of Waking Hours Spent Staring At Glowing Rectangles.”

One early paragraph reads:

Researchers were able to identify nearly 30 varieties of glowing rectangles that play some role throughout the course of each day. Among them: handheld rectangles, music-playing rectangles, mobile communication rectangles, personal work rectangles, and bright alarm cubes, which emit a high-pitched reminder that it’s time to rise from one’s bed and move toward the rectangles in one’s kitchen.

_____________________________________________________
This is the third in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________
Though the article clearly has a mocking tone, there is a clear reason for interacting as we do with those glowing rectangles: some are merely the technological membrane through which we interact with other people, while others are the entry-ways to the technological world in which we create or consume media of all kinds, from music and videos to personal and professional email and documents.

And precisely because people have access to their music, to their pictures, to their personal social networks all the time, they expect to be able to access that content and those networks all the time, even when (a) their devices cannot connect to their private network or (b) their devices alone are not able to display the media they want to consume – because their batteries are drained, for example, or because the particular device is not optimized for the type of media they need.

The Benefits of Connecting

There are numerous reasons that employees may want to connect their personal devices (BYOD) to their work computers or office networks. First, if space is an issue on their hard drives, they can play music from their MP3 players (there is debate about music’s impact on productivity). Even if the issue is not space, but rather simply installing personal applications and/or data on a work machine, connecting an external player may be seen as a good work-around.

Second, personal devices run out of power and many can recharge through USB cables. Outlet space is often limited, especially in cubicles, which now comprise 70% of office spaces according to one report. In those circumstances, it seems logical to charge devices in series rather than in parallel.

Finally, and perhaps most persuasively, work is rarely confined to a single machine and the small devices people take with them everywhere are the perfect, and sometimes preferred media for storing documents that will be edited on multiple machines. And why not? Windows phones, iPhones, and Android phones all carry gigabytes of space that are available for those large PowerPoint presentations and image files that no one wants to send through email.

The Dangers of Connecting and How to Minimize Them

There are three main perils of connecting personal devices to work computers and networks. The primary concerns, of course, are malware and spyware. These twin dangers become more apparent whenever new viruses are discovered on Android phones, or the full implications of iPhone apps are realized.

Of secondary, but not insignificant, concern is that employees could use their personal devices to skirt the spirit of the official use-policy, if not its letter. For example, sites that place a toll on an organization’s bandwidth-Pandora, for example, or YouTube-may be blocked on workstations, but employees could run similar apps from their phones-Spotify and/or Amazon Prime Videos.

> Finally, there is simply the productivity issue. Do the media and applications that personal devices bring into the workplace ultimately boost, depress, or have no impact on productivity?

As with accessing work data, there are three ways that organizations can regulate connecting personal devices to work assets.

First, organizations can ban the practice entirely. Second, they can use technological filters, for example by requiring any device to have security enable before it can connect to a network or computer. Third, organizations can have only policy filters in place.

The most important point, however, is that the leadership addresses this issue in their mobile device use-policy and that all employees understand the risks in connecting their devices to work computers and networks.

Gadi Ben-Yehuda (Twitter: @GBYehuda) is Director for Innovation and Social Media at the IBM Center for the Business of Government.

Keep reading →


Data is often compared to water: people talk about data purity, data flow, and of course, data leaks.

One of the ways that companies try to avoid data leaks is through keeping tight control over the pipelines through which data moves, but when most (or all) of an organization’s employees carry smartphones through which they access data, it’s like having a spigot in every pocket. Organizations then face a choice: limit the functionality of devices by restricting their access to data, install technological filters on the devices to minimize the chance of a leak, or trust their employees to safeguard their devices and the data that they either hold or can access, or some combination of the latter two.
_____________________________________________________
This is the second in a five-part series examining the issues that governments and organizations need to address in the absence of a BYOD policy, originally published by the IBM Center for the Business of Government. For more news and insights on innovations at work in government, please sign up for the AOL Gov newsletter. For the quickest updates, like us on Facebook.
_____________________________________________________ Keep reading →

New college graduates entering the workforce this year may have gotten their first iPhone in high school and their first email address in middle school. While the class of 2007 used laptops for research in their dorm rooms, this year’s graduates could fact-check.

Surely, these new hires will have different expectations for the technology employers will provide and how it will be used. Keep reading →

Page 1 of 3123