1 00:00:00,000 --> 00:00:00,500 2 00:00:00,500 --> 00:00:04,360 SPEAKER 1: Hello, just wanted to give you a tour of our three-TV Zoom Rooms 3 00:00:04,360 --> 00:00:04,870 setup here. 4 00:00:04,870 --> 00:00:10,000 So behind me are three 75-inch TVs, and connected to these TVs is just one PC 5 00:00:10,000 --> 00:00:11,350 sitting on a shelf over there. 6 00:00:11,350 --> 00:00:14,890 That PC is an Intel NUC and it's just running not only Windows, but also 7 00:00:14,890 --> 00:00:16,158 Zoom Rooms software. 8 00:00:16,158 --> 00:00:18,700 This is a little different from the typical Mac and PC client 9 00:00:18,700 --> 00:00:19,840 that most of us are using. 10 00:00:19,840 --> 00:00:22,100 Zoom Rooms is a separate piece of software from Zoom 11 00:00:22,100 --> 00:00:24,100 that's typically used in conference room setups. 12 00:00:24,100 --> 00:00:26,410 And what it does for us is it allows us to coordinate 13 00:00:26,410 --> 00:00:29,170 all of the different students' video feeds on the screens 14 00:00:29,170 --> 00:00:32,290 without having to manage them manually ourselves, 15 00:00:32,290 --> 00:00:34,780 as we would if we had three separate computers connected 16 00:00:34,780 --> 00:00:36,160 to three separate TVs. 17 00:00:36,160 --> 00:00:39,610 So one of my colleagues, [INAUDIBLE] is behind the scenes on his iPad. 18 00:00:39,610 --> 00:00:43,060 And any time I call on a student or they raise their hand to participate, 19 00:00:43,060 --> 00:00:46,210 what I'll do is say, Bob, what is your question or comment? 20 00:00:46,210 --> 00:00:50,020 [INAUDIBLE] will then find their name on the iPad interface, tap their name, 21 00:00:50,020 --> 00:00:53,200 and pin them on the screen so that they appear dead-center in the middle 22 00:00:53,200 --> 00:00:56,440 so that I can ideally then have a one-on-one conversation with them, 23 00:00:56,440 --> 00:00:57,550 or so it would seem. 24 00:00:57,550 --> 00:01:01,120 Indeed, we have one camera only on top of the middle TV here. 25 00:01:01,120 --> 00:01:03,890 And it's far enough away from where I stand, which is over there, 26 00:01:03,890 --> 00:01:06,680 so that it roughly looks like my eyeline matches up. 27 00:01:06,680 --> 00:01:10,390 We experimented in the past with having three separate cameras 28 00:01:10,390 --> 00:01:12,010 above each of the three TVs. 29 00:01:12,010 --> 00:01:14,320 And that ended up involving more switching between them 30 00:01:14,320 --> 00:01:15,737 and it didn't really add anything. 31 00:01:15,737 --> 00:01:18,010 So we simplified ultimately with just the one camera. 32 00:01:18,010 --> 00:01:22,452 Meanwhile, we have a PC connected to this vertical, tall screen 33 00:01:22,452 --> 00:01:25,660 here, the motivation for which is that we're running Zoom separately on there 34 00:01:25,660 --> 00:01:28,000 just so that I can have a big participants' window 35 00:01:28,000 --> 00:01:29,470 that's only a few feet from me. 36 00:01:29,470 --> 00:01:31,600 This way, I can see who has their hands raised. 37 00:01:31,600 --> 00:01:34,145 I can see who's voting yay or nay on something. 38 00:01:34,145 --> 00:01:37,270 Instead of cluttering the screen up here with additional information that's 39 00:01:37,270 --> 00:01:39,312 a little harder to find this way, I can see folks 40 00:01:39,312 --> 00:01:40,915 in a little more organized fashion. 41 00:01:40,915 --> 00:01:43,790 In the middle screen here, we have a confidence monitor, so to speak. 42 00:01:43,790 --> 00:01:45,760 So if I walk in front of the actual camera, 43 00:01:45,760 --> 00:01:49,510 this is where I would simply see myself, just to make sure I'm lined up properly 44 00:01:49,510 --> 00:01:52,090 and I am not actually mispositioned. 45 00:01:52,090 --> 00:01:54,310 Last is my own laptop, which is connected 46 00:01:54,310 --> 00:01:57,130 as an additional participant in the Zoom Room 47 00:01:57,130 --> 00:01:59,542 such that I'm just an ordinary user essentially here. 48 00:01:59,542 --> 00:02:02,500 And if I want to share my screen, I share it just like a student might, 49 00:02:02,500 --> 00:02:03,190 typically. 50 00:02:03,190 --> 00:02:07,532 And from my laptop can I then also see even a closer-up version 51 00:02:07,532 --> 00:02:09,490 of the participants' window or any other detail 52 00:02:09,490 --> 00:02:13,660 I might have, like my own slides, my lesson plan, my notes, or the like. 53 00:02:13,660 --> 00:02:16,300 Ultimately, this camera and the microphone 54 00:02:16,300 --> 00:02:18,700 that I'm wearing wirelessly here route to a small device 55 00:02:18,700 --> 00:02:19,840 that's here on this table. 56 00:02:19,840 --> 00:02:24,070 That's in turn routed into that same PC that's driving all of the screens here, 57 00:02:24,070 --> 00:02:25,012 ultimately. 58 00:02:25,012 --> 00:02:27,970 That's it for the tour, and let's go ahead and take a look at the class 59 00:02:27,970 --> 00:02:28,570 itself. 60 00:02:28,570 --> 00:02:31,000 All of this was pre-recorded a little bit 61 00:02:31,000 --> 00:02:33,667 ago by all of the students who opted into today's demonstration. 62 00:02:33,667 --> 00:02:36,708 Didn't want to keep folks waiting, so we're essentially just playing back 63 00:02:36,708 --> 00:02:38,720 some of the recording we did a little while ago. 64 00:02:38,720 --> 00:02:40,720 But what you're about to see now is some footage 65 00:02:40,720 --> 00:02:42,820 of the actual class that ensued thereafter, so you 66 00:02:42,820 --> 00:02:44,560 can see all of these working parts. 67 00:02:44,560 --> 00:02:46,580 And we'll cut from a few different angles back and forth, 68 00:02:46,580 --> 00:02:49,705 so you can get a sense of exactly what the experience is like, particularly 69 00:02:49,705 --> 00:02:52,450 on the teacher side. 70 00:02:52,450 --> 00:02:52,950 Good. 71 00:02:52,950 --> 00:02:56,220 So two-factor authentication is increasingly in use in various places. 72 00:02:56,220 --> 00:02:58,470 We'll talk about that in a little more detail tonight, 73 00:02:58,470 --> 00:03:00,845 but that certainly should give you a little more comfort. 74 00:03:00,845 --> 00:03:04,020 And that exists not only for websites and applications these days, 75 00:03:04,020 --> 00:03:06,780 but even hardware devices, potentially. 76 00:03:06,780 --> 00:03:08,160 Other thoughts, Barry? 77 00:03:08,160 --> 00:03:10,260 In the yes camp? 78 00:03:10,260 --> 00:03:15,890 SPEAKER 2: I am in the yes camp, and two-factor authentication 79 00:03:15,890 --> 00:03:19,750 as well as the urban myth that hackers go 80 00:03:19,750 --> 00:03:22,720 after Windows machines 90% of the time. 81 00:03:22,720 --> 00:03:27,440 And I'm on Mac 100% of the time, so I'm more secure. 82 00:03:27,440 --> 00:03:30,010 SPEAKER 1: Yeah, so it's not so much an urban myth. 83 00:03:30,010 --> 00:03:31,450 It really is just statistics. 84 00:03:31,450 --> 00:03:33,910 There's a lot more people running Windows and PCs. 85 00:03:33,910 --> 00:03:35,680 Therefore, they are a juicier audience. 86 00:03:35,680 --> 00:03:39,610 The urban myth would be that Macs are more secure, software-wise, perhaps. 87 00:03:39,610 --> 00:03:42,940 Apple is not necessarily any better than Microsoft or Google 88 00:03:42,940 --> 00:03:46,708 for that matter at security, but the threats perhaps are fewer. 89 00:03:46,708 --> 00:03:48,250 [? Tia, ?] I saw your hand go up too. 90 00:03:48,250 --> 00:03:49,090 In the yes column? 91 00:03:49,090 --> 00:03:49,840 SPEAKER 3: Yes. 92 00:03:49,840 --> 00:03:51,880 I'm just going to say yes for now. 93 00:03:51,880 --> 00:03:54,490 [LAUGHTER] 94 00:03:54,490 --> 00:03:55,090 Yes for now. 95 00:03:55,090 --> 00:03:56,620 And I have the two-factor authentication. 96 00:03:56,620 --> 00:03:57,703 I have the right software. 97 00:03:57,703 --> 00:04:00,605 But I'm just going to say for now yes, because you never 98 00:04:00,605 --> 00:04:01,855 know what tomorrow will bring. 99 00:04:01,855 --> 00:04:02,070 [LAUGHTER] 100 00:04:02,070 --> 00:04:05,590 SPEAKER 1: Well, feel free to flip your vote when you are convinced otherwise. 101 00:04:05,590 --> 00:04:09,040 In fact, as several of you already have, we're down to 11 to 11 102 00:04:09,040 --> 00:04:11,050 now, so there's some skepticism already. 103 00:04:11,050 --> 00:04:12,850 Now, how about those of you in the no camp? 104 00:04:12,850 --> 00:04:16,000 If a couple folks wouldn't mind raising your virtual hands, 105 00:04:16,000 --> 00:04:21,459 what makes you claim that, no, your own Mac or PC are not secure? 106 00:04:21,459 --> 00:04:22,089 Any thoughts? 107 00:04:22,089 --> 00:04:24,294 Yeah, [? Macy? ?] 108 00:04:24,294 --> 00:04:27,300 SPEAKER 4: I think the two-factor is only six stages. 109 00:04:27,300 --> 00:04:32,060 So it's not that hard to hack, like what you mentioned if you know programming. 110 00:04:32,060 --> 00:04:36,210 You write a code, and then you can still do all the possibilities. 111 00:04:36,210 --> 00:04:39,470 SPEAKER 1: Yeah, so theoretically you could guess these codes. 112 00:04:39,470 --> 00:04:42,698 Fortunately, these tools do tend to have mechanisms 113 00:04:42,698 --> 00:04:44,990 built in where at least I know from personal experience 114 00:04:44,990 --> 00:04:48,500 if I mistype the code once, the darn thing locks me out for a minute. 115 00:04:48,500 --> 00:04:51,740 So yes, I can try again, but I can try only very slowly. 116 00:04:51,740 --> 00:04:54,470 And frankly, a smart system would not let 117 00:04:54,470 --> 00:04:57,020 you brute-force your way through the code, so to speak, 118 00:04:57,020 --> 00:04:58,520 trying all possible codes. 119 00:04:58,520 --> 00:05:04,308 Surely after three attempts, five, 10, 20, somewhere in that low number range, 120 00:05:04,308 --> 00:05:06,350 they should probably just assume that you are not 121 00:05:06,350 --> 00:05:09,500 who you are pretending to be and just lock you out altogether and perhaps 122 00:05:09,500 --> 00:05:13,730 require that you, the device owner, have to go back to your IT administrator 123 00:05:13,730 --> 00:05:15,460 or the like.