About
Articles by Jer
Activity
-
Excited to join the Utah State Bar Corporate Counsel Section's leadership team as the Community Relations Officer. Thank you for the nomination…
Excited to join the Utah State Bar Corporate Counsel Section's leadership team as the Community Relations Officer. Thank you for the nomination…
Liked by Jer Jones
-
This is pretty incredible for a handful of "small town" Saint George companies to pull off. Nicely done! #techwishes #lifeatvasion #makeawish…
This is pretty incredible for a handful of "small town" Saint George companies to pull off. Nicely done! #techwishes #lifeatvasion #makeawish…
Shared by Jer Jones
-
Educational Technology Fire-sale 😊 To my investor / entrepreneur friends interested in acquiring an EdTech business, please reach out. All…
Educational Technology Fire-sale 😊 To my investor / entrepreneur friends interested in acquiring an EdTech business, please reach out. All…
Shared by Jer Jones
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Volunteer
Encircle
- Present 3 years 7 months
Human Rights
Encircle homes offer essential mental health services, resources, and tools for LGBTQ+ youth, young adults, and families.
-
Executive Committee
IEEE Utah Section
- 4 years
Science and Technology
UT Section: Nomination CTTE ’09
Awards Chair ’09, UEC Rep. ’08-‘11
Executive over 1000+ active members -
Founder and Artist
Lisztonian.com
- Present 23 years 3 months
Arts and Culture
Converted personal hobby into global resource for license-able music recordings
• Combined market/competitive analysis with strategy resulting in 40,000,000+ unique downloads
• Captured market via SEO achieving ranking as an iTunes top-50 audio podcast year after year
• User base representing 1TB+ monthly MP3 bandwidth and 1,000,000+ hours of downloaded music -
Representative
Utah Engineers Council
- 2 years 4 months
Science and Technology
Scholarship CTTE ’09/’11, Awards CTTE ‘10
-
Treasurer
Computer Society Utah Chapter
- 1 year
Science and Technology
2 years as chair over 300+ active members. Increased activity attendance by +500%
-
Chair
Computer Society Utah Chapter
- 2 years 1 month
Science and Technology
Chair over 300+ active members
Increased activity attendance by 500+%
Re-ignited membership excitement -
Membership Development Coordinator
IEEE Computer Society
- 2 years
Science and Technology
Coordinator over the Western US and Canada (10,000+ members) focusing on growing membership development.
-
Member
IEEE 2675 DevOps Standards Working Group
- Present 10 years
Science and Technology
The purpose of this standard is to specify required practices for operations, development and other key stakeholders to collaborate and communicate to deploy systems and applications in a secure and reliable way. This standard will specify practices for groups including development, operations and other key stakeholders to collaborate and communicate effectively to build, package and deploy software and systems in a secure and reliable way. All of these activities and functions shall be…
The purpose of this standard is to specify required practices for operations, development and other key stakeholders to collaborate and communicate to deploy systems and applications in a secure and reliable way. This standard will specify practices for groups including development, operations and other key stakeholders to collaborate and communicate effectively to build, package and deploy software and systems in a secure and reliable way. All of these activities and functions shall be integrated within the complete life-cycle.
Publications
-
Mobile Software as a Medical Device (SaMD) for the Treatment of Epilepsy
Frontiers in Human Neuroscience
See publicationDigital health technologies for people with epilepsy (PWE) include internet-based resources and mobile apps for seizure management. Since non-pharmacological interventions, such as listening to specific Mozart's compositions, cognitive therapy, psychosocial and educational interventions were shown to reduce epileptic seizures, these modalities can be integrated into mobile software and delivered by mobile medical apps as digital therapeutics. Herein, we describe: (1) a survey study among PWE…
Digital health technologies for people with epilepsy (PWE) include internet-based resources and mobile apps for seizure management. Since non-pharmacological interventions, such as listening to specific Mozart's compositions, cognitive therapy, psychosocial and educational interventions were shown to reduce epileptic seizures, these modalities can be integrated into mobile software and delivered by mobile medical apps as digital therapeutics. Herein, we describe: (1) a survey study among PWE about preferences to use mobile software for seizure control, (2) a rationale for developing digital therapies for epilepsy, (3) creation of proof-of-concept mobile software intended for use as an adjunct digital therapeutic to reduce seizures, and (4) broader applications of digital therapeutics for the treatment of epilepsy and other chronic disorders. A questionnaire was used to survey PWE with respect to preferred features in a mobile app for seizure control. Results from the survey suggested that over 90% of responders would be interested in using a mobile app to manage their seizures, while 75% were interested in listening to specific music that can reduce seizures. To define digital therapeutic for the treatment of epilepsy, we designed and created a proof-of-concept mobile software providing digital content intended to reduce seizures. The rationale for all components of such digital therapeutic is described. The resulting web-based app delivered a combination of epilepsy self-care, behavioral interventions, medication reminders and the antiseizure music, such as the Mozart's sonata K.448. To improve long-term patient engagement, integration of mobile medical app with music and multimedia streaming via smartphones, tablets and computers is also discussed. This work aims toward development and regulatory clearance of software as medical device (SaMD) for seizure control, yielding the adjunct digital therapeutic for epilepsy, and subsequently a drug-device combination...
-
Your Money. Your Business. 6 Business Principles to Advance Your Personal Finances.
Diminished 7th LC
See publicationMost personal finance books give tips and tricks to gain a financial upper hand. This book is different. Tricks come and go… they expire… and they may not fit your unique circumstances. Instead, this book teaches principles and concepts that will help you discover your own methods to support your financial and life goals.
More than a toolkit for your wallet, this book seeks to train our brains to think about personal finances in a way that has proven successful to businesses for…Most personal finance books give tips and tricks to gain a financial upper hand. This book is different. Tricks come and go… they expire… and they may not fit your unique circumstances. Instead, this book teaches principles and concepts that will help you discover your own methods to support your financial and life goals.
More than a toolkit for your wallet, this book seeks to train our brains to think about personal finances in a way that has proven successful to businesses for centuries. These core business principles are distilled down to their essence, and applied to personal finance in a way that just makes sense. -
Computer & Technology Careers
Utah Engineers Council Journal
See publicationAs technology continues to penetrate and permeate the lives of people across the globe, the need for skilled professionals to create, manage, maintain, and distribute technology has steadily increased. This article provides a summary of present technology career projections for growth within this highly critical field of engineering.
-
An Engineer’s Quest for Equilibrium
Utah Engineers Council Journal
See publicationAs we progress in our career the demands on our time seem to grow
proportionally. As engineers, our employers rely on our ability to
dedicate extreme energy and an alert awareness to the complex
problems we encounter each day. -
Can You Grow Both Your Career and Family?
IEEE GOLDRush
Discussion on parallel family/career growth for new career entrants.
-
A Software Development Environment for Building Context-Aware Systems for Family Technology
Brigham Young University, Thesis
See publicationThe purpose of this thesis was to utilize existing technologies to create a development environment suitable for creating context-aware applications and systems specific to home and family living conditions. After outlining the history of context-aware applications and the challenges that face family-centric systems in this field, a development environment was implemented that solves the unique challenges that face application development for family-centric, context-aware applications. In…
The purpose of this thesis was to utilize existing technologies to create a development environment suitable for creating context-aware applications and systems specific to home and family living conditions. After outlining the history of context-aware applications and the challenges that face family-centric systems in this field, a development environment was implemented that solves the unique challenges that face application development for family-centric, context-aware applications. In particular, research cited in this document indicates that a browser-based user interface is the most appropriate interface for a family environment. The flexibility of the interface, as well as the familiarity of the application structure allows family members of varying levels of comprehension to use a given application. The use of a browser interface for a context-aware system creates unique challenges such as the ability to integrate with external applications and external devices. In addition to overcoming the restrictions of web browsers, the development environment was designed to support the unique user environment presented by a family structure. This includes mechanisms for the long-term adaptability of the system to the changing lifestyles of the family members, as well as the infrequent, but necessary ability to adjust the structure of the family unit due to the addition or prolonged absence of family members. Another problem that the development environment was required to solve was the varying levels of computer comprehension that exist among different family members. An application that targets an entire family unit must meet the usability needs of all levels of comprehension. The development environment was created to account for this wide array of usability requirements.
-
IT Security Education is Enhanced by Analyzing Honeynet Data
ITHET 6th Annual International Conference
Honeynets have increasingly been deployed by information technology (IT) professionals in industry for studying the methods and tools of malicious attackers. Educational institutions, because of their open access, offer a particularly enticing setting for connecting a Honeynet. The specific challenge for educational institutions is maintaining continuity in Honeynet research and operation as both undergraduate and graduate students complete their studies and leave. Furthermore, the analysis of…
Honeynets have increasingly been deployed by information technology (IT) professionals in industry for studying the methods and tools of malicious attackers. Educational institutions, because of their open access, offer a particularly enticing setting for connecting a Honeynet. The specific challenge for educational institutions is maintaining continuity in Honeynet research and operation as both undergraduate and graduate students complete their studies and leave. Furthermore, the analysis of Honeynet data requires a broad spectrum of security experience and skills. In this research, students installed an anonymous generation II Honeynet in the IT Security Lab at Brigham Young University (BYU) to assist in their educational experience in information assurance and security (IAS). The lab provides a secure setting for students to configure and monitor a honey wall connected to the Internet with its networked Windows and Linux honeypots. The objective of this research was to enhance undergraduate security training by 1) determining the impact of a Honeynet upon BYU security best practices, 2) assisting students to conduct personal research on the BYU Honeynet, and 3) providing live vulnerability training.
Other authorsSee publication -
Honeynets: an educational resource for IT security
SIGITE
a Honeynet is a system designed to attract troublemakers lurking about on the Internet. Honeynets are a creation of the IT security world intended to draw the attention of hackers, identify the tools in their toolkit, and learn their modus operandi. Our thesis is that Honeynets can be deployed safely in an educational environment to provide students with real-time security education. Honeynets provide vital information on current security threats, attacker tools, and attacker mentality. When…
a Honeynet is a system designed to attract troublemakers lurking about on the Internet. Honeynets are a creation of the IT security world intended to draw the attention of hackers, identify the tools in their toolkit, and learn their modus operandi. Our thesis is that Honeynets can be deployed safely in an educational environment to provide students with real-time security education. Honeynets provide vital information on current security threats, attacker tools, and attacker mentality. When implemented properly, Honeynets can also provide IT students with experience in a wide range of skills, helping to focus those skills on network and information security. Furthermore, the research that comes from Honeynets can be shared with IT security professionals to help raise awareness and increase security throughout the world. In a society where technology changes rapidly, the inability to provide IT students with the most current tools and information can quickly become a major detriment to IT education. Due to communication delays and the difficulty in keeping educators current in technology, IT students often receive outdated information. A Honeynet experiment is underway in the IT Security Lab of a higher education institution focused on educating IT engineers. The conclusion of current research is that Honeynets can indeed be an effective educational resource and tool to help solve the dynamically changing challenges in security education.
Other authorsSee publication
Honors & Awards
-
Award of Merit for Oustanding Service as Computer Society Chair 2011
IEEE Utah Section
-
Award of Notable Services and Contributions towards advancement of IEEE and the Engineering Professions
IEEE
-
Award of Merit for Oustanding Service as Computer Society Chair, 2010
IEEE Utah Section
-
COA for Service as UEC Committee Chair/Liason, 2010
IEEE Utah Section
-
COA for Service as Awards Ceremony Chair, 2009
IEEE Utah Section
-
COA for Service as Computer Society Chapter Treasurer, 2009
IEEE Utah Section
-
COA for Service as UEC Committee Chair/Lisason, 2009
IEEE Utah Section
-
COA for Service, Nomination Committee
IEEE Utah Section
-
Senior Member
IEEE
-
Commencement Speaker for BYU School of Engineering
-
-
Academic Scholarships
-
Fritz Burns
Academic Full
University Half
Joseph & Ruth Smith
Discover Card
Languages
-
Japanese
-
Recommendations received
36 people have recommended Jer
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content