COLLW | Page 14

TU T O R I A L S 3.75 PDUs Per Half-day Tutorial Monday, June 8, 1:00pm–4:30pm (Half-day Afternoon) ML Wearables: Navigating the Perfect Storm of Sensors, Big Data, Privacy, and Security Philip Lew, XBOSoft One of the latest facets of the mobile paradigm is mobile wearables—a new generation of personalized technology that knows us better than our closest friends do. How many of your friends know how far you walked or what you ate today? Although you may think mobile wearables are just for geeks, they will become commonplace very quickly. Our challenge is to develop applications that can synthesize context from the gigantic amount of data these devices and their sensors generate. Ensuring the privacy and security of device usage and its data will be of highest concern. Philip Lew systematically analyzes context—the most important element in future design and development of mobile applications while incorporating big data, privacy, and security. Using examples, Philip shows the contextual elements you need to consider now and discusses how to identify key factors for a future generation of wearable products based on discovering anticipatory services. MM Test Attacks to Break Mobile and Embedded Software Jon Hagar, Grand Software Testing In the tradition of James Whittaker’s book series How to Break Software, Jon Hagar applies the testing “attack” concept to the domain of mobile and embedded software systems. First, Jon defines the environments of mobile and embedded software. He then examines the issues of software product failures caused by defects found in these types of software. Next, Jon shares a set