Smartphones like bedbugs, intrusive work and FOG computing

Roma 28 January 2015

 

Smartphones like bedbugs, intrusive work and FOG computing

Smartphone spying, intrusive work, fog computing - ComputArte copyright

What is the boundary between working life and life ?!?

If the emails reach you anywhere and anytime, it means that the work can expand well beyond the hours paid by the employer or company.

The "convenience" of being able to work without being in the office, in reality it means expanding the office to our entire "interconnected" life.

In Germany, a law is being considered that limits this invasion ( Source Line Edp

http://www.lineaedp.it/news/15754/staccare-dal-lavoro-dove-e-il-confine-di-scelta-quando-si-tratta-di-mobile-working/ )

That's BYOD ( Bring Your Own Device ) is a phenomenon welcomed with great enthusiasm by companies, and then retrace their steps in the face of the dangers to privacy and data security, is under the eyes of many.

The great enthusiasm for the "cloud" is turning into a lukewarm consideration in the face of the obvious and tangible dangers of industrial espionage ... something for which the "FOG computing" approach is starting to "adjust" ( fonte Bit Mat http://www.bitmat.it/blog/news/40322/fog-computing-quando-la-nebbia-si-combina-con-cloud ) .

FOG computing in addition to limiting the response latency for data processing on servers "scattered around the planet" and due to the bottlenecks of the infrastructure on which the data transmission relies, aims to restore control locally for obvious reasons of security and confidentiality ...

On the other hand, access information and resources through mobile phones and tablets engineered to spy on and steal data, it is a truth that has only recently come to the attention of the public. ( ref. article on Digitalic http://www.digitalic.it/wp/web-social/scienza/riprendere-il-controllo-della-propria-privacy-online-il-tema-della-protezione-estesa-online/87861 )

To corroborate this aberrated reality, There are, in addition to the considerations of industry experts, the first reports in Brussels ( source EDP line http://www.lineaedp.it/news/15774/smartphone-da-amici-a-cimici/ ) and also the news that is released by Edward Snowden regarding the continuing mass espionage that the NSA was ,and is able to do this thanks to the work done by the OTTs. ( it is. APPLE con UDID su I-phone fonte Datamanager http://www.datamanager.it/2015/01/snowden-documenti-tracciamento-degli-iphone/ )

Already in 2007 Yahoo was threatened with a daily fine of $ 250.000,00 if he had not "granted" unlimited access to his servers where ALL the data generated by the "suspects" were stored and ... not.

Therefore, it is essential to develop an awareness as soon as possible that reduces the use of technology designed and built to spy on us, and at the same time there is a strong need for technology that is respectful of privacy and that knows how to protect it from bullying and incorrect subjects.

 

ComputArte copyright

Leave a Reply

This site uses cookies to enhance your experience. By continuing to the site you accept their use. More info in our cookies policy.     ACCEPT