Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:02,035 --> 00:00:05,238
If you've ever connected
an external device to your tablet
2
00:00:05,238 --> 00:00:09,309
or your mobile phone, then you've had to
go through the Bluetooth pairing process.
3
00:00:09,542 --> 00:00:13,213
This is a security function
that allows you to control exactly what
4
00:00:13,213 --> 00:00:16,916
devices are able to communicate
to your mobile phone or your tablet.
5
00:00:17,150 --> 00:00:20,186
This commonly requires you
to view or verify
6
00:00:20,286 --> 00:00:23,556
a particular phrase
or personal identification number.
7
00:00:23,656 --> 00:00:26,726
To be assured that you're
really connecting the device you have
8
00:00:26,726 --> 00:00:27,961
in front of you.
9
00:00:27,961 --> 00:00:30,997
This pairing process
is something you only have to do one time.
10
00:00:31,164 --> 00:00:34,467
From that point forward,
any time these devices are together,
11
00:00:34,501 --> 00:00:37,504
they will automatically connect
and network with each other.
12
00:00:38,004 --> 00:00:40,507
The process
I'll give you in this video for Bluetooth
13
00:00:40,507 --> 00:00:43,510
pairing is a very generic one,
but each of the steps
14
00:00:43,510 --> 00:00:46,679
may vary just a little bit
depending on the device you're using.
15
00:00:46,846 --> 00:00:50,917
Make sure you check with the manufacturer
to understand the exact pairing process,
16
00:00:51,151 --> 00:00:54,154
and what buttons or settings
you should configure to make sure
17
00:00:54,154 --> 00:00:57,957
these devices can connect to each other
and communicate using Bluetooth.
18
00:00:58,925 --> 00:01:00,026
The first step in the pairing
19
00:01:00,026 --> 00:01:04,030
process is making sure that both devices
are configured to use Bluetooth.
20
00:01:04,164 --> 00:01:05,065
Some devices,
21
00:01:05,065 --> 00:01:08,701
like a mobile phone, allow you to disable
the Bluetooth functionality,
22
00:01:08,835 --> 00:01:12,772
so make sure that it's turned on on
both of the devices that you're pairing.
23
00:01:13,006 --> 00:01:16,209
You'll then set the devices
to a discoverable mode
24
00:01:16,209 --> 00:01:20,180
so that they can be seen by each other,
and this may require certain
25
00:01:20,180 --> 00:01:24,317
set of key sequences on a Bluetooth device
to put it into that mode.
26
00:01:24,551 --> 00:01:28,354
For example, if you have a headset,
it may be holding a particular button
27
00:01:28,354 --> 00:01:32,959
or pushing a button a number of times
that puts it into this discoverable mode.
28
00:01:33,326 --> 00:01:37,764
Once your device is in this discoverable
mode, it should show up in the list
29
00:01:37,764 --> 00:01:41,868
of available devices for Bluetooth,
and there may be a number of devices
30
00:01:41,868 --> 00:01:46,272
on this list, especially if you're in
an area with a lot of Bluetooth devices.
31
00:01:46,539 --> 00:01:49,642
You'll want to choose the device
you're working with from the list
32
00:01:49,642 --> 00:01:52,712
of available Bluetooth devices
in your immediate area.
33
00:01:52,946 --> 00:01:57,484
You'll then be prompted to either confirm
or to enter a personal identification
34
00:01:57,484 --> 00:01:58,818
number or Pin.
35
00:01:58,818 --> 00:02:01,721
This ensures that there is some security
and you know
36
00:02:01,721 --> 00:02:04,858
exactly what devices
you're adding to your mobile phone.
37
00:02:05,191 --> 00:02:05,859
And that's it.
38
00:02:05,859 --> 00:02:08,228
You're
now paired with your Bluetooth device,
39
00:02:08,228 --> 00:02:10,763
and you can usually test connectivity
at that point
40
00:02:10,763 --> 00:02:14,100
to make sure that both of those devices
are able to communicate with each other.
41
00:02:15,368 --> 00:02:15,835
Many of our
42
00:02:15,835 --> 00:02:18,872
mobile phones are communicating
to multiple satellites
43
00:02:18,872 --> 00:02:22,876
every day using GPS
or the Global Positioning System.
44
00:02:23,243 --> 00:02:26,012
These GPS satellites
were originally created by the U.S.
45
00:02:26,012 --> 00:02:27,080
Department of Defense,
46
00:02:27,080 --> 00:02:31,184
and there are currently over 30 GPS
satellites in orbit around the Earth.
47
00:02:31,451 --> 00:02:35,155
This allows us to get very precise
navigation from our devices,
48
00:02:35,255 --> 00:02:38,291
and as long as our phone is able
to hear the signals coming from
49
00:02:38,291 --> 00:02:40,160
at least four of these satellites,
50
00:02:40,160 --> 00:02:44,564
we can now get very precise information
about where we happen to be in the world.
51
00:02:45,031 --> 00:02:47,734
Our phones are able to calculate
where we happen
52
00:02:47,734 --> 00:02:51,437
to be based on timing differences
from all of these different satellites.
53
00:02:51,638 --> 00:02:55,341
We're able to calculate longitude,
latitude and altitude
54
00:02:55,441 --> 00:02:57,210
of where we may be located.
55
00:02:57,210 --> 00:03:00,146
We don't commonly see the signals
that we're receiving
56
00:03:00,146 --> 00:03:04,384
from a GPS satellite, but
we do see the results of these signals.
57
00:03:04,517 --> 00:03:08,087
We commonly see this when we have maps,
or when we need directions
58
00:03:08,087 --> 00:03:09,556
to a particular location.
59
00:03:09,556 --> 00:03:14,561
And our phone can calculate exactly where
we are relative to where we need to be.
60
00:03:14,961 --> 00:03:18,331
Our phones are also very smart,
and how they gather information
61
00:03:18,331 --> 00:03:18,932
about where
62
00:03:18,932 --> 00:03:23,570
we're located in the world, and often
GPS is one of those primary sources.
63
00:03:23,703 --> 00:03:28,241
But our phones can also use Wi-Fi
connectivity and identify cellular towers
64
00:03:28,241 --> 00:03:32,712
in our area to narrow down more precisely
where we might happen to be.
65
00:03:34,314 --> 00:03:34,814
In a larger
66
00:03:34,814 --> 00:03:38,918
organization, you may be responsible
for managing all of these mobile devices
67
00:03:38,918 --> 00:03:41,921
that are being used by employees
of your organization.
68
00:03:41,955 --> 00:03:44,791
One way to manage
this is through the use of a mobile
69
00:03:44,791 --> 00:03:47,760
device management solution or an MDM.
70
00:03:47,961 --> 00:03:51,197
This means that you can manage
all of the company owned phones
71
00:03:51,197 --> 00:03:54,601
or any phones that users might own
that they bring to work.
72
00:03:54,634 --> 00:03:58,104
We call this
bring your own device or be wired.
73
00:03:58,838 --> 00:04:03,876
This allows the manager of the MDM
to sit at a single console and gain access
74
00:04:03,876 --> 00:04:07,547
to the configurations of all of the mobile
devices in their environment.
75
00:04:07,880 --> 00:04:11,751
This is especially important if company
data is being stored on these devices.
76
00:04:11,784 --> 00:04:15,521
We need some way to manage the security
and update the configuration
77
00:04:15,521 --> 00:04:18,391
settings
of all of those mobile phones and tablets.
78
00:04:18,391 --> 00:04:19,859
If the manager wants to ensure
79
00:04:19,859 --> 00:04:24,063
that certain applications are installed,
the data is protected, or that certain
80
00:04:24,063 --> 00:04:28,134
capabilities of the phone are enabled
or disabled, such as the camera.
81
00:04:28,334 --> 00:04:31,337
You can do all of that using the MDM.
82
00:04:31,404 --> 00:04:34,574
We commonly use our phones
as one large storage device,
83
00:04:34,574 --> 00:04:37,443
but when you have part of the phone
being used for personal use
84
00:04:37,443 --> 00:04:41,814
and part of the phone being used for work
use, you may want to use an MDM
85
00:04:41,814 --> 00:04:44,817
to be able to partition
out the company data
86
00:04:44,984 --> 00:04:49,222
and protect that differently than the rest
of the private data on that phone.
87
00:04:49,489 --> 00:04:53,793
This also means that if you need to delete
or remove any of that company data,
88
00:04:53,993 --> 00:04:57,864
you can do that on the mobile device
without affecting any of the user's
89
00:04:57,864 --> 00:04:59,432
private data.
90
00:04:59,432 --> 00:05:03,202
This might also be a good way to increase
the security of your mobile devices.
91
00:05:03,236 --> 00:05:06,239
For example,
you can use the MDM to manage the type
92
00:05:06,239 --> 00:05:09,242
of access control
that's being used on a mobile phone.
93
00:05:09,242 --> 00:05:12,211
For example, you may require
that the screen automatically
94
00:05:12,211 --> 00:05:16,182
lock after a certain amount of time
and that users are using a minimum
95
00:05:16,182 --> 00:05:19,285
of a personal identification number
to unlock the phone.
96
00:05:20,153 --> 00:05:23,222
This can also make things very easy
for the end user.
97
00:05:23,222 --> 00:05:26,826
Instead of having the user manage
the email configuration
98
00:05:26,826 --> 00:05:30,797
and set up all of the detailed
configuration settings for that email,
99
00:05:30,963 --> 00:05:34,667
you can simply push out
the email configuration from the MDM.
100
00:05:34,934 --> 00:05:38,805
The user doesn't have to configure
or set up anything on their mobile device,
101
00:05:38,971 --> 00:05:41,007
and if changes need to be made later,
102
00:05:41,007 --> 00:05:44,077
you can simply push those changes
from the MDM console.
103
00:05:44,644 --> 00:05:48,815
The MDM is also a good way to add enhanced
security to these devices.
104
00:05:48,981 --> 00:05:52,985
For example, your security controls
may require two factor authentication
105
00:05:52,985 --> 00:05:54,320
on these devices.
106
00:05:54,320 --> 00:05:58,124
There may be a personal identification
number, or you may require users
107
00:05:58,124 --> 00:06:01,127
to include biometrics
when they're unlocking the phone.
108
00:06:01,327 --> 00:06:02,862
You might also use the MDM
109
00:06:02,862 --> 00:06:06,566
to push down applications that are useful
for two factor authentication.
110
00:06:06,733 --> 00:06:10,169
For example, your company might use
a pseudo random authentication
111
00:06:10,169 --> 00:06:13,206
app that provides a number
that would be used in conjunction
112
00:06:13,206 --> 00:06:17,110
with your username and password
each time you log in to a service.
113
00:06:17,677 --> 00:06:21,147
And of course, the MDM can control
what applications are available
114
00:06:21,147 --> 00:06:22,348
on that mobile phone.
115
00:06:22,348 --> 00:06:23,883
There may be certain applications
116
00:06:23,883 --> 00:06:27,720
that are required for you to use
in the corporation, and the MDM can ensure
117
00:06:27,720 --> 00:06:30,990
that those applications are installed
automatically on your phone.
118
00:06:31,290 --> 00:06:35,728
The MDM can also be used to prevent
certain applications from being installed.
119
00:06:35,895 --> 00:06:38,598
So if the security of this device
is important,
120
00:06:38,598 --> 00:06:42,001
you may have certain applications
that are restricted or forbidden
121
00:06:42,001 --> 00:06:44,070
from being installed
on your mobile device.
11770
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.