About Jill Jensen

As a kid, Jill put Dewey Decimal numbers on her books, so it’s no wonder she grew up to be an information architect and librarian. After making her mark on several B2B information services, she’s now putting pretty words to paper as Sysorex’s Marketing Communications Manager. During the summer, she can be found at the lake with Finn McCool, her Portuguese Water Dog.

Zombies, ghouls & IoT … oh my!

zombiesMindless henchmen under the spell of a master puppeteer, awakened to wreak havoc on civilization.

Are these scary thoughts the result of the new season of The Walking Dead? Maybe I’m having nightmares about Halloween ghouls, inching ever closer in the dark? Nope. What’s got me pondering the undead is a cascade of crazy happenings involving the Internet of Things (IoT).

It started with this photo of a risqué website on a fridge in a big box store, tweeted by John McAfee.  Granted, John is out there, but he makes a good point: Internet-connected devices are already being used for nefarious purposes.

No sooner did John’s tweet hit my mobile than I became aware of the distributed denial of service attack (DDoS) on Brian Kreb’s site. Roughly 1.5 million security cameras (anyone see the irony here?) mostly manufactured in China, were aimed at krebsonsecurity.com, bringing the site to its knees.

The worst part is that, while the manufacturer is working hard on a fix, they have no way to remotely secure the cameras. Individual owners will have to download a patch and update the cameras themselves.

Hot on the heels of the attack on Kreb’s site was the massive, breathtaking, historic attack […]

By | October 26th, 2016|Categories: IoT|Tags: , , , |0 Comments

Capturing Pokemon

Pokemon“What on earth is going on at Veteran’s Park?”  As we drove by, I glanced over to see it teeming with people. Young people. All glued to their phones. While they may have looked like zombies, it dawned on me (as I’m sure it has you) that they were immersed in the game Pokémon GO.

For the uninitiated, Pokémon GO is an augmented reality game that blends digital elements with the physical world. Players capture Pokémon (pocket monsters) and grow/evolve them. The game includes PokéStops at physical locations, where players stock up on supplies, and battle locations called Pokémon Gyms.

What captured my attention was the crowds of real life people ranging far and wide, day and night, hunting Pokémon. And I wondered how retailers, museums, libraries and other public institutions might join in the fun and reap the benefits of the players just outside the door.

Currently, a location can’t declare itself a PokéStop or Gym, which are predetermined by the game (although, McDonald’s in Japan has a sponsorship deal turning 3000 restaurants into Pokémon Gyms.) But, if your business is already a Stop or Gym, you can place a lure at your location that attracts rare Pokémon. For roughly $10 a day, hoards of people will follow Pokémon right to your door.

Or, is there a Stop […]

By | August 4th, 2016|Categories: Big Data, Industry Buzz, IoT, Mobile|Tags: , , , , |1 Comment

Do we have an over-reliance on data?

Recently, a rather alarming headline appeared in my news feed (”Data dangers: Why publishers’ over-reliance on data puts them at risk”.) The author believes that newspapers publishers’ reliance on customer data makes them “vulnerable” because ad blockers and customer privacy legislation will lead to data scarcity. He makes an interesting point. Blockers and legislation will shape how data is collected and used. But, in this age of information, I’m not sure that data can be overly-relied upon. And, there are best practices when working with data that’s been acquired from website visitors which can mitigate concerns about data scarcity:

Handle with Care

Website visitors see their personal data as valuable, and rightly so. Treat it with care. Safeguard it. When possible, ask permission when gathering information.

Demonstrate Value

Collect the minimum information required, and demonstrate the value for the visitor. When creating sign-ups for an email newsletter, for example, resist the impulse to gather extensive demographic information. Readers know all you really need is their email address.

Before a visitor commits to providing personal information, explain what they will receive in return. Display a sample if possible, so that providing personal information becomes a value exchange.

Use What You Already Have

Examine the data you already have on hand with fresh eyes. For example, Shoom eTearsheets, while designed to provide proof […]

By | June 10th, 2016|Categories: analytics, Big Data, IoT|Tags: , , , , , |0 Comments