App Helps Secure Mobile Devices, Reports Security Status To Processor

Broadcom adds WiFi Direct to its embedded device platform, furthers our internet-of-things future

28, 2013 /PRNewswire/ — Acquirers and ISOs now have a simple way to check merchants’ mobile processing security: SecurityMetrics MobileScan, an app created for merchants to identify potential security threats and protect devices through scanning and remediation. Through a quick mobile vulnerability scan, the app inspects many issues known to cause mobile insecurity such as a lack of password polices, Wi-Fi weaknesses, unauthorized peripherals, and known operating system vulnerabilities that may allow cybercriminals access to a merchant’s processing device. (Logo: http://photos.prnewswire.com/prnh/20130125/MM48717LOGO) More >> SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console that aggregates mobile device compliance results, tracks when vulnerability scans have run, and reports each merchant’s mobile device scan status. The app was built based on a foundation of Payment Card Industry (PCI) Data Security Standard (DSS) requirements in order to help mobile Point-of-Sale (mPOS) merchants follow PCI mobile payment acceptance security best practices. “Though convenient, mobile processing increases liability for both merchants and processing parties,” said Wen Free, SecurityMetrics VP of Business Development. “It’s only a matter of time before hackers target insecure mobile devices for profitable payment card data.” SecurityMetrics MobileScan, powered by MokiMobility (mokimobility.com), is available today in both Android and iOS app stores. For more information on a MobileScan program for your merchants, or if you’re interested in referral program opportunities, please call 801-995-6860. About SecurityMetrics (www.securitymetrics.com) SecurityMetrics protects electronic commerce and payments leaders, global acquirers, and their retail customers from security breaches and data theft. The company is a leading provider and innovator in merchant data security, and as an Approved Scanning Vendor and Qualified Security Assessor, has helped over 1 million organizations manage PCI DSS compliance and/or secure their network infrastructure, data communication, and other information assets.
For the original version including any supplementary images or video, visit http://www.darkreading.com/mobile/app-helps-secure-mobile-devices-reports/240160556

Mobile Trojan Defeats Dual Authentication

Security Benchmarks for Medical Devices

The app is consistently listed in the Top Ten Free Business applications, with a strong 4 out of 5 star customer rating on Google Play. Available in over 37 countries, the ADP Mobile Solutions app has become increasingly popular as more and more employees seek easier access to the HR information they care about most and want to take action on quickly. The Android OS now powers approximately 80 percent of all smartphones worldwide, according to research firm International Data Corporation (IDC).1 With built-in security and convenience, the ADP Mobile Solutions app gives employees all the tools needed to access their HR information. A user can view pay statements and benefits information, input and track time and attendance, review Flexible Spending Accounts (FSA) and retirement account information and download and print W-2 forms right from a mobile device. “The ADP Mobile Solutions app is the easiest way for employees to access their payroll, time and benefits information at a moment’s notice no matter where they are in the world,” said Don Weinstein, senior vice president, product management at ADP. “Given the penetration of Android devices worldwide, it was critical for us to offer the app on this platform. The explosive growth in adoption proves this and we are constantly evaluating and adding functionality to the existing suite of features employees can take advantage of on their mobile devices.” Today, more than 46,000 ADP clients totaling more than 1.28 million employee users–ranging from employees at small businesses to global companies–are leveraging the ADP Mobile Solutions app across all smartphone operating systems. Employees can easily download the app in minutes, log in to access their HR information, and begin relying on it as an integral component of their work day, wherever that day takes them. 1 IDC’s Quarterly Mobile Phone Tracker published August 7, 2013 ADP Mobile Solutions Requirements The ADP Mobile Solutions app is currently available to ADP clients who use one or more applicable ADP solution offerings, such as payroll, time and attendance, and benefits. The ADP Mobile Solutions application is free and available for download through the Apple App Store for iPhone, iPad and iPod touch devices and the Google Play App Store for Android(TM) devices. It is also available using the browser of Apple, Android(TM) and Blackberry devices by entering: https://mobile.adp.com.
For the original version including any supplementary images or video, visit http://www.marketwatch.com/story/adp-mobile-solutions-app-quickly-exceeds-300000-downloads-on-androidtm-devices-2013-08-27

Federal CIOs Face BYOD, Mobile App Security Challenges

app security, mobile app security

The Mashreq Payport is a fully EMV (Europay, MasterCard and Visa) chip & pin compliant mobile point of sale device. It enables customers to pay for delivery products at their doorstep by inserting their debit or credit card into the device. The delivery man will enter the sale amount, the customers can choose whether to include a tip, and then sign or enter their pin to complete the transaction. Farhad Irani, Head of Retail Banking Group at Mashreq, said the Mashreq Payport device was revolutionary, creating a new level of convenience for customers. The device is not exclusive to Mashreq customers, so those with other banks can also use the device. But in order to use the device, customers must first download the Mashreq Payport application onto their smartphone. The application is only available on Android and iPhone. Delivery companies Once a sale is completed a digital receipt is sent to the customers smartphone. Nimish Dwivedi, Head of Payments at Mashreq, said that the product would be initially utilised by delivery companies but was also suitable for mobile salesmen and in-store sales at fast food restaurants. Mashreq Payport will initially be launched at Pizza Express, Cold Stone Creamery, Popeyes, Al Maya Supermarket, and Champions Cleaners. Kamal Vachani, Group Director of Al Maya Group, said he was excited about the launch of Mashreq Payport.
For the original version including any supplementary images or video, visit http://gulfnews.com/business/banking/mashreq-launches-new-mobile-payment-device-1.1225126

Mashreq launches new mobile payment device

By Kenneth Corbin Wed, August 28, 2013 CIO As the federal government warms to the idea of allowing employees to use their own mobile devices for work and develops new device management policies, agency CIOs and others will still have to grapple with the challenges associated with application security, experts warn. The initial challenge for federal IT managers evaluating BYOD policies was to ensure that their agency’s infrastructure was secure enough for new devices to enter the network and provide for central management, according to Tom Suder, president of the mobile services provider Mobilegov . With those policies in place, agencies have cleared the way for the development and adoption of innovative new applications that could boost productivity in a mobilized workforce. But those apps invite a host of new security challenges. [ 11 Time Management and Productivity Apps for Android ] Mobile Device Management vs. Mobile Application Security “I think we’re definitely in exciting times here. We’re actually talking about doing better work for the government. I think we’ve shifted the conversation from mobile device management (MDM) and getting people — you know, authorizing devices on the network. Even the DoD has authorized iOS and Android devices on their network in conjunction with an MDM,” Suder said during an online presentation yesterday. “And I think we’re really getting to the point now where we’re going to have these real good mission apps, doing-your-job kind of apps, and I think it’s going to, you know, increase efficiency and make people do their jobs better, but I do think that we need to balance that with security, and there hasn’t been too many enterprise mobility apps out there, so I think this is definitely an area we need to be paying attention to,” Suder said.
For the original version including any supplementary images or video, visit http://www.cio.com/article/738863/Federal_CIOs_Face_BYOD_Mobile_App_Security_Challenges

ADP® Mobile Solutions App Quickly Exceeds 300,000 Downloads On Android(TM) Devices

The attackers behind the malware are believed to be Russian. Related Content Close the Mac Security Gap in Your Enterprise Versafe, the online fraud protection provider that identified this new banking Trojan, known as Perkele , says none of its customers have yet suffered any financial losses linked to the attacks. But it’s likely losses have occurred, says Jens Hinrichsen, the company’s vice president of business development. Perkele circumvents out-of-band authentication codes sent to mobile devices for online-banking sessions, according to Versafe. The ongoing evolution of increasingly sophisticated malware illustrates how organized crime rings are enhancing their abilities to launch cross-device and cross-channel attacks, Hinrichsen says. These attacks are breaking multifactor authentication, proving that banking institutions have to invest in layers of security and data encryption , says George Tubin, a security specialist for malware-protection provider Trusteer. “Banks have to realize that cybercriminals are actively focusing on the mobile channel,” he says. “And, yes, two-factor authentication does not ensure security because malware can bypass it. Banks have to protect the mobile device the same way they defend the online device, and also realize that criminals launch coordinated attacks across the channels.” Tubin says Trusteer also identified Perkele attacks and has taken action to help ensure its customers are protected.
For the original version including any supplementary images or video, visit http://www.bankinfosecurity.com/yet-another-mobile-trojan-hits-banks-a-6027/op-1

Mobile devices drive digital-content growth

Thailand also has high potential to provide digital-content outsourcing for the international market, according to an industry expert. Trirat Chatkaew, director of the Software Industry Promotion Agency (Sipa), said the digital-content market in Thailand offered great potential for continuous high growth, largely because of the growing trend for mobile devices, which are changing people’s lifestyle and behaviour as they increasingly access information and other content via such gadgets. Moreover, the broadband network now offers high speed, which allows users to more easily access digital content over the Internet. He added that companies were now making much more use of digital content such as advertising, short movies, presentations and 3D animation to present and promote their businesses, while “edutainment” also has an important role in driving digital content in the Kingdom. “The agency [Sipa] expects the digital-content industry in terms of animation and gaming in Thailand this year will be worth around Bt18 billion, comprising Bt10 billion from animation and Bt8 billion from gaming. The industry overall will grow by around 12-15 per cent this year. “Thai digital-content developers also have a good opportunity to provide outsourcing services and develop content to http://speedyplansindownloadfreepdf.blogspot.com/2013/07/how-to-become-alpha-male-john-alexander.html support companies in countries such as South Korea, China and Japan, as well as European countries,” said Trirat. The Thai digital-content industry in the next three to five years will have an annual value of about Bt30 billion, he said. Support from Sipa His agency, meanwhile, will drive and assist local developers of products and services to support both the local and international markets via a digital-content contest in categories such as education, short movies and advertising.
For the original version including any supplementary images or video, visit http://www.nationmultimedia.com/technology/Mobile-devices-drive-digital-content-growth-30213620.html

That lack is increasingly urgent as more and more mobile apps for Salesforce appear on the vendor’s App Exchange. MobileIron will offer “Anyware for Salesforce,” which provides from within the Salesforce web interface a range of administrative views, tools, actions, and reports that support a company’s mobile Salesforce users. The initial release of the Anyware cloud service supports iOS and Android devices. End users surf to anywhere.com to register their devices with a username and password, and a device profile is automatically downloaded to their phone or tablet. That’s the only step users need to take, according to Rege. Once registered, users see two icons on their device, one for Anyware and one for the Anyware app catalog, an enterprise-specific site for mobile apps. The catalog is set up by an Anyware administrator, who lists the approved custom and third-party apps that corporate users can, or should, download. The catalog links seamlessly with both Google Play and Apple App Store. As with those online stores, you click on an app in the Anyware catalog and it downloads and installs on your device. And also as with those online stores, users can rate and review the Anyware-listed apps.
For the original version including any supplementary images or video, visit http://www.computerworld.com/s/article/9241989/Mobile_device_management_shifts_to_the_cloud?pageNumber=1

Mobile device management shifts to the cloud

As designs get smaller, lighter and more power efficient, the connection of a wearable device to powerful smartphones or tablets that can process and send data to the cloud is critical. For this reason, smart mobile devices have become the hub for interconnecting everything. “The value of a wearable device lies in its ability to connect to a smartphone or the Internet with minimal impact on battery life,” said Rahul Patel, Broadcom Vice President, Marketing, Wireless Connectivity Combos. “As the market gains momentum, Broadcom is actively widening business opportunities in this growing space by offering the breadth of IP and customized components that enable creative new smart wearable devices to be connected.” Broadcom’s WICED portfolio provides the foundation for embedding low power, high performance, interoperable wireless connectivity into these devices. Emerging segment leaders are currently designing health and wellness devices based on Broadcom WICED technology, including blood pressure monitors, glucometers, smart watches, fitness bracelets and more. By supporting Wi-Fi Direct, a specification that allows two devices to communicate with each other securely via Wi-Fi without an access point or computer, Broadcom is opening the doors to the development of new, innovative smart accessories, clothing and other wearable sensors. As wearable technology becomes more prominent, wireless connectivity technologies that enable these devices to connect to smartphones are key to unlocking their true potential. Specifically: Near Field Communication (NFC) enables a consumer to buy a new wearable device and simply tap it to their smartphone so the devices can start to communicate instantly and securely. No more complicated menus or arduous setup processes. Bluetooth Smart and Wi-Fi allow the consumer to collect data from their wearable device (i.e. calories burned, heart rate, etc.) and transfer it to their smartphone or into the cloud without draining the battery.
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/27/broadcom-wiced-direct/

Advertisements

Mashreq launches new mobile payment device

Chunky mobile devices? Soft graphene could help you downsize

The Mashreq Payport is a fully EMV (Europay, MasterCard and Visa) chip & pin compliant mobile point of sale device. It enables customers to pay for delivery products at their doorstep by inserting their debit or credit card into how to become an alpha male john alexander the device. The delivery man will enter the sale amount, the customers can choose whether to include a tip, and then sign or enter their pin to complete the transaction. Farhad Irani, Head of Retail Banking Group at Mashreq, said the Mashreq Payport device was revolutionary, creating a new level of convenience for customers. The device is not exclusive to Mashreq customers, so those with other banks can also use the device. But in order to use the device, customers must first download the Mashreq Payport application onto their smartphone. The application is only available on Android and iPhone. Delivery companies Once a sale is completed a digital receipt is sent to the customers smartphone. Nimish Dwivedi, Head of Payments at Mashreq, said that the product would be initially utilised by delivery companies but was also suitable for mobile salesmen and in-store sales at fast food restaurants. Mashreq Payport will initially be launched at Pizza Express, Cold Stone Creamery, Popeyes, Al Maya Supermarket, and Champions Cleaners.
For the original version including any supplementary images or video, visit http://gulfnews.com/business/banking/mashreq-launches-new-mobile-payment-device-1.1225126

Broadcom adds WiFi Direct to its embedded device platform, furthers our internet-of-things future

28, 2013 /PRNewswire/ — Acquirers and ISOs now have a simple way to check merchants’ mobile processing security: SecurityMetrics MobileScan, an app created for merchants to identify potential security threats and protect devices through scanning and remediation. Through a quick mobile vulnerability scan, the app inspects many issues known to cause mobile insecurity such as a lack of password polices, Wi-Fi weaknesses, unauthorized peripherals, and known operating system vulnerabilities that may allow cybercriminals access to a merchant’s processing device. (Logo: http://photos.prnewswire.com/prnh/20130125/MM48717LOGO) More >> SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console that aggregates mobile device compliance results, tracks when vulnerability scans have run, and reports each merchant’s mobile device scan status. The app was built based on a foundation of Payment Card Industry (PCI) Data Security Standard (DSS) requirements in order to help mobile Point-of-Sale (mPOS) merchants follow PCI mobile payment acceptance security best practices. “Though convenient, mobile processing increases liability for both merchants and processing parties,” said Wen Free, SecurityMetrics VP of Business Development. “It’s only a matter of time before hackers target insecure mobile devices for profitable payment card data.” SecurityMetrics MobileScan, powered by MokiMobility (mokimobility.com), is available today in both Android and iOS app stores. For more information on a MobileScan program for your merchants, or if you’re interested in referral program opportunities, please call 801-995-6860. About SecurityMetrics (www.securitymetrics.com) SecurityMetrics protects electronic commerce and payments leaders, global acquirers, and their retail customers from security breaches and data theft. The company is a leading provider and innovator in merchant data security, and as an Approved Scanning Vendor and Qualified Security Assessor, has helped over 1 million organizations manage PCI DSS compliance and/or secure their network infrastructure, data communication, and other information assets. Among other things, SecurityMetrics offers PCI audits, mobile device vulnerability scanning, penetration testing, and forensic analysis.
For the original version including any supplementary images or video, visit http://www.darkreading.com/mobile/app-helps-secure-mobile-devices-reports/240160556

App Helps Secure Mobile Devices, Reports Security Status To Processor

The initial challenge for federal IT managers evaluating BYOD policies was to ensure that their agency’s infrastructure was secure enough for new devices to enter the network and provide for central management, according to Tom Suder, president of the mobile services provider Mobilegov . With those policies in place, agencies have cleared the way for the development and adoption of innovative new applications that could boost productivity in a mobilized workforce. But those apps invite a host of new security challenges. [ 11 Time Management and Productivity Apps for Android ] Mobile Device Management vs. Mobile Application Security “I think we’re definitely in exciting times here. We’re actually talking about doing better work for the government. I think we’ve shifted the conversation from mobile device management (MDM) and getting people — you know, authorizing devices on the network. Even the DoD has authorized iOS and Android devices on their network in conjunction with an MDM,” Suder said during an online presentation yesterday. “And I think we’re really getting to the point now where we’re going to have these real good mission apps, doing-your-job kind of apps, and I think it’s going to, you know, increase efficiency and make people do their jobs better, but I do think that we need to balance that with security, and there hasn’t been too many enterprise mobility apps out there, so I think this is definitely an area we need to be paying attention to,” Suder said. [ 10 Mobile Device Management Apps to Take Charge of BYOD ] “There has been a gap on mobile application security,” he adds. The government’s cautious embrace of new mobile devices and applications comes amid a broader evolution in the government’s $80 billion IT operation, and, like the move toward cloud computing, comes with a White House mandate.
For the original version including any supplementary images or video, visit http://www.cio.com/article/738863/Federal_CIOs_Face_BYOD_Mobile_App_Security_Challenges

Global Mobile Device Management Enterprise Software Market 2012-2016

The Global Mobile Device Management Enterprise Software market has also been witnessing an increasing demand from small and medium-sized enterprises. However, the emerging threat from open-source mobile device management solutions could pose a challenge to the growth of this market. TechNavio’s report, the Global Mobile Device Management Enterprise Software Market 2012-2016 has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market in the Americas, and the EMEA and APAC regions; it also covers the Global Mobile Device Management Enterprise Software market landscape and its growth prospects in the coming years. The report also includes a discussion of the key vendors operating in this market. The key vendors dominating this space include Airwatch LLC, Fiberlink Communications Corp., Good Technology Inc., and Mobilelron Inc. The other vendors mentioned in the report are BoxTone Inc., IBM Corp., SAP AG, Sophos Inc., SOTI Inc., Symantec Corp., and Zenprise Inc. Key questions answered in this report: What will the market size be in 2016 and what will be the growth rate? What are key market trends? What is driving this market?
For the original version including any supplementary images or video, visit http://www.sacbee.com/2013/08/26/5681536/global-mobile-device-management.html

Federal CIOs Face BYOD, Mobile App Security Challenges

app security, mobile app security

Electrochemical capacitor evolution While we should be stunned by how far we’ve increased computing power in downsized space (the first computers filled entire rooms) the efficiency of an energy-storage device the amount of energy stored per unit volume needs to catch up. The idea of increasing this efficiency is to pack more active, energy-storing materials in the same amount of space. As simple as that sounds, it’s very difficult to do. One common material used in energy storage devices is porous carbon . Porous carbon is produced by riddling a base material, such as coconut shell, with small pores, increasing the base material’s surface area . The pores are important for capacitive energy storage as in general terms, more pores means larger surface area for physical adsorption, which in turn leads to higher storage capacity. Traditional porous carbon, once made, has a set volume with fixed pores randomly scattered inside and out. It isn’t really possible to readjust the structure and jam more porous carbon in the same amount of space without crumpling a fraction of the pores that are especially crucial for capacitive energy storage. Introducing graphene Graphene a single-layer sheet of carbon atoms was first isolated in 2004 and since then, major efforts have been devoted to exploring its physics. It is the thinnest material known to man, yet tougher than diamond. It channels electrons pretty much with no resistance, making it the single most conductive material.
For the original version including any supplementary images or video, visit http://phys.org/news/2013-08-chunky-mobile-devices-soft-graphene.html

Mobile device management shifts to the cloud

August 27, 2013 News Highlights: Market for connected wearable components is expected to reach more than $1.5 billion by 2014 WICED Direct enables OEMs to design accessories, clothing and other wearable sensors that connect and transfer data to smart mobile devices and the cloud Innovations open doors for new products such as jewelry with proximity detection, helmets with action cameras and bracelets that lock/unlock doors Broadcom Corporation (NASDAQ: BRCM), a global innovation leader in semiconductor solutions for wired and wireless communications, today expanded its Wireless Internet Connectivity for Embedded Devices (WICED) portfolio with the introduction of WICED Direct. WICED is a platform that simplifies the implementation of Internet connectivity into an array of consumer devices. By integrating Wi-Fi Direct into the WICED platform, Broadcom is enabling OEMs to rapidly develop wearable products that communicate seamlessly to the cloud via smart mobile devices. For more news, visit Broadcom’s Newsroom. Experts predict nearly 15 million wearable smart devices will be sold this year, and nearly 70 million by 2017. As designs get smaller, lighter and more power efficient, the connection of a wearable device to powerful smartphones or tablets that can process and send data to the cloud is critical. For this reason, smart mobile devices have become the hub for interconnecting everything. “The value of a wearable device lies in its ability to connect to a smartphone or the Internet with minimal impact on battery life,” said Rahul Patel, Broadcom Vice President, Marketing, Wireless Connectivity Combos. “As the market gains momentum, Broadcom is actively widening business opportunities in this growing space by offering the breadth of IP and customized components that enable creative new smart wearable devices to be connected.” Broadcom’s WICED portfolio provides the foundation for embedding low power, high performance, interoperable wireless connectivity into these devices. Emerging segment leaders are currently designing health and wellness devices based on Broadcom WICED technology, including blood pressure monitors, glucometers, smart watches, fitness bracelets and more.
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/27/broadcom-wiced-direct/

The software, dubbed Anyware, is completely new code from MobileIron, which originally created a conventional enterprise server application for managing mobile devices. With Anyware, MobileIron intends to become a cloud service that can adapt to handle the mobile management needs of companies large and small. In a related announcement, MobileIron will offer Anyware specifically integrated with the mobile apps proliferating on the web-based CRM platform Salesforce.com. Currently, Salesforce administrators in the enterprise “have no access to enterprise mobility management,” says Ojas Rege, vice president of strategy for MobileIron . That lack is increasingly urgent as more and more mobile apps for Salesforce appear on the vendor’s App Exchange. MobileIron will offer “Anyware for Salesforce,” which provides from within the Salesforce web interface a range of administrative views, tools, actions, and reports that support a company’s mobile Salesforce users. The initial release of the Anyware cloud service supports iOS and Android devices. End users surf to anywhere.com to register their devices with a username and password, and a device profile is automatically downloaded to their phone or tablet. That’s the only step users need to take, according to Rege. Once registered, users see two icons on their device, one for Anyware and one for the Anyware app catalog, an enterprise-specific site for mobile apps. The catalog is set up by an Anyware administrator, who lists the approved custom and third-party apps that corporate users can, or should, download.
For the original version including any supplementary images or video, visit http://www.computerworld.com/s/article/9241989/Mobile_device_management_shifts_to_the_cloud?pageNumber=1

DEVICES – Product news, launches and more – August 2013

U.S. DHS, FBI warn of malware threats to Android mobile devices

(U//FOUO) Threats to Mobile Devices Using the Android Operating System

Google has updated its Google Now feature by adding new cards that will directly help travellers. Users will be able to see their car reservation details and even directions to the rental center in a new card in Google Now. Also, all event/concert ticket cards will also be automatically displayed in the users mobile when the user arrives at the event venue. Users will be able to get details on the last train or bus to go home in an another card. These updates are available in the latest version of the Google Search app for Android 4.1+ . EasyJet has launched an iPad application by name Inspire Me , an app for last minute holiday inspiration. Users can search by entering their preferred holiday type, budget and departure details. The app is available in 14 languages and users can save up to ten flights on a wish-list. Wednesday 21 August 2013: Singapore-based Flocations has launched its iPhone app . This app features over 5,000 travel packages sourced from 60 travel agencies in Singapore. In April 2013, the company pivoted from being a flight search portal to a holiday packages listing portal.
For the original version including any supplementary images or video, visit http://www.tnooz.com/devices-news-august-2013

CarRentalsFinal - Google Now

I once had a fixed price listing for baby bottles. I had someone email me and ask if I would combine shipping if he bought 100 of them. I wasnt using this app at this point, so I didnt get back to him until a few hours later. At that point he informed me that he went with another seller. If I would have been using the eBay Mobile app I would have saved the sale. So there you go! My challenge is going strong, and my stress has decreased drastically! Using these mobile apps has allowed me to spend more time doing the things I want to do, and not tied to a computer. I now am able to work throughout the day in between splash parks and play dates. My sales have stayed about the same, but my dollars per hour has increased.
For the original version including any supplementary images or video, visit http://www.examiner.com/article/selling-on-ebay-using-only-your-mobile-device

Broadcom Targets Accelerating Wearable Market with Wireless Connectivity for Embedded Device (WICED) Offerings

Industry reporting indicates 44 percent of Android users are still using versions 2.3.3 through 2.3.7 known as Gingerbread which were released in 2011 and have a number of security vulnerabilities that were fixed in later versions. The growing use of mobile devices by federal, state, and local authorities makes it more important than ever to keep mobile OS patched and up-to-date. The report also outlines some known security threats to mobile OS and mitigation steps, including: SMS (Text Message) Trojans represent nearly half of the malicious applications circulating today on older Android OS. Sends text messages to premium-rate numbers owned by criminal hackers without the users knowledge, potentially resulting in exorbitant charges for tile user. Rootkits are malware that hide their existence from normal forms of detection. In late 2011, a software developers rootkit was discovered running on millions of mobile devices. Logs the users locations, keystrokes, and passwords without the users knowledge. Fake Google Play Domains are sites created by cybercriminals. Google Play enables users to browse and download music, books, magazines, movies, television programs, and other applications. Tricks users into installing malicious applications that enable malicious actors to steal sensitive information, including financial data and log-in credentials.
For the original version including any supplementary images or video, visit http://macdailynews.com/2013/08/27/u-s-dhs-fbi-warn-of-malware-threats-to-android-mobile-devices/

Global Mobile Device Management Enterprise Software Market 2012-2016

“This presents providers of both consumer and enterprise endpoint security products with an opportunity to enforce security to private devices and potentially expand their footprint into the consumer space. Consequently, product managers at consumer security providers need to adopt strategies that allow consumer security use on personal devices in the enterprise workplace.” Mobile Malware Needs Different Security Approach, Say Researchers The Black Hat 2013 security conference took an in-depth look at pervasive mobile threats targeting smartphones and tablets and what, exactly, companies are doing to combat these latest threats. Mobile security vendors are innovating to address mobile threats in ways that are almost completely different from security software found on most desktops and laptop systems, according to an article on CRN.com. Throughout the two-day Black Hat briefings, security researchers shared ways to hack into Android devices , take over an iOS device in less than 60 seconds, or sniff and decrypt cellular traffic by hacking into microcell devices. Security researchers say the message is becoming increasingly clear: The ecosystem for mobile threats is very likely to be vastly different than that on desktops and mobile devices, necessitating a different defensive approach. Gaining root access to the device is no longer necessarily needed, said Jeff Forristal, chief technology officer of Bluebox, a San Francisco-based mobile security startup that gained attention this month for discovering a serious certificate validation weakness in Android devices. System-level control is a way to gain access to the majority of the device, Forristal said. If successfully exploited, the master key vulnerability discovered by Bluebox enables an attacker to trick Google’s validation process to turn legitimate apps into weaponized apps that could do serious damage. Antivirus software, which monitors file activity to detect malware strains, is far too intensive for tiny mobile devices, said Guy Stewart, vice president of engineering at FatSkunk, an early stage startup that has created a different way to protect mobile devices. While the computing power in most smartphones is growing exponentially every year, the battery on most mobile phones drains quickly, Stewart said.
For the original version including any supplementary images or video, visit http://www.sys-con.com/node/2770280

SANS Institute and HIMSS Partner to Offer Mobile Device Security Webcast

Who are the key vendors in this market space? What are the market opportunities and threats faced by key vendors? What are the strengths and weaknesses of each of these key vendors? You can request one free hour of our analyst’s time when you purchase this market report. Details provided within the report. 01. Executive Summary 20. Other Reports in this Series List of Exhibits Exhibit 1: Market Research Methodology Exhibit 2: MDM as a Segment of Mobile Enterprise Management Solutions Exhibit 3: Global MDM Enterprise Software Market 2012-2016 (US$ million) Exhibit 4: Global MDM Enterprise Software Market by Deployment Model 2012 Exhibit 5: Global On-premise MDM Enterprise Software market 2012-2016 (US$ million) Exhibit 6: Global SaaS-based MDM Enterprise Software Market 2012-2016 Exhibit 7: Global MDM Enterprise Software Market by End-user Segmentation 2012 Exhibit 8: Global MDM Enterprise Software Market by Geographical Segmentation 2012 Exhibit 9: MDM Enterprise Software Market in the Americas 2012-2016 (US$ million) Exhibit 10: MDM Enterprise Software Market in the EMEA 2012-2016 (US$ million) Exhibit 11: MDM Enterprise Software Market in the APAC Region 2012-2016 (US$ million) Exhibit 12: Global MDM Enterprise Software Market by Vendor Segmentation 2012 Exhibit 13: Business Segmentation of Airwatch LLC Exhibit 14: Business Segmentation of Good Technology Inc. Exhibit 15: Business Segmentation of Fiberlink Communications Corp.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/global-mobile-device-management-enterprise-143600025.html

Dog fighting ring

For this reason, smart mobile devices have become the hub for interconnecting everything. “The value of a wearable device lies in its ability to connect to a smartphone or the Internet with minimal impact on battery life,” said Rahul Patel, Broadcom Vice President, Marketing, Wireless Connectivity Combos. “As the market gains momentum, Broadcom is actively widening business opportunities in this growing space by offering the breadth of IP and customized components that enable creative new smart wearable devices to be connected.” Broadcom’s WICED portfolio provides the foundation for embedding low power, high performance, interoperable wireless connectivity into these devices. Emerging segment leaders are currently designing health and wellness devices based on Broadcom WICED technology, including blood pressure monitors, glucometers, smart watches, fitness bracelets and more. By supporting Wi-Fi Direct, a specification that allows two devices to communicate with each other securely via Wi-Fi without an access point or computer, Broadcom is opening the doors to the development of new, innovative smart accessories, clothing and other wearable sensors. As wearable technology becomes more prominent, wireless connectivity technologies that enable these devices to connect to smartphones are key to unlocking their true potential. Specifically: Near Field Communication (NFC) enables a consumer to buy a new wearable device and simply tap it to their smartphone so the devices can start to communicate instantly and securely. No more complicated menus or arduous setup processes. Bluetooth Smart and Wi-Fi allow the consumer to collect data from their wearable device (i.e.
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/27/broadcom-wiced-direct/

BYOD Could Help Spur Mobile Security Growth: Gartner

“As the market gains momentum, Broadcom is actively widening business opportunities in this growing space by offering the breadth of IP and customized components that enable creative new smart wearable devices to be connected.” Broadcom’s WICED portfolio provides the foundation for embedding low power, high performance, interoperable wireless connectivity into these devices. Emerging segment leaders are currently designing health and wellness devices based on Broadcom WICED technology, including blood pressure monitors, glucometers, smart watches, fitness bracelets and more. By supporting Wi-Fi Direct, a specification that allows two devices to communicate with each other securely via Wi-Fi without an access point or computer, Broadcom is opening the doors to the development of new, innovative smart accessories, clothing and other wearable sensors. As wearable technology becomes more prominent, wireless connectivity technologies that enable these devices to connect to smartphones are key to unlocking their true potential. Specifically: — Near Field Communication (NFC) enables a consumer to buy a new wearable device and simply tap it to their smartphone so the devices can start to communicate instantly and securely. No more complicated menus or arduous setup processes. — Bluetooth Smart and Wi-Fi allow the consumer to collect data from their wearable device (i.e. calories burned, heart rate, etc.) and transfer it to their smartphone or into the cloud without draining the battery. — Wi-Fi Direct allows a consumer to directly connect two Wi-Fi devices together without the need for an access point or computer. — A wearable device combined with location technology allows for interesting new use cases such as doctors tracking patients in clinical environments or retailers sending targeted advertising to consumers. “OEMs creating wearable products require interoperable technology that will allow these new devices to connect with smartphones and tablets available today,” said Joshua Flood, Senior Analyst, ABI Research.
For the original version including any supplementary images or video, visit http://online.wsj.com/article/PR-CO-20130827-905519.html

Broadcom adds WiFi Direct to its embedded device platform, furthers our internet-of-things future

Too many organizations have had to report data breaches as a result of improperly secured mobile devices and it is expected that this number will only go up.” In this presentation James Tarala, of the SANS Institute, will provide a practical, streamlined approach to auditing endpoint security on mobile devices and give attendees practical steps for securing the mobile devices in their organization. Attendees will be able to walk away from the presentation not only with an appreciation of the threat, but with practical tools to be able to better secure their data. To learn more attend the webcast on September 10, 2013 at 1:00pm EDT, registration is now open at: https://marketplace.himss.org/OnlineStore/EventCenter/Meeting.aspx?ProductId=480283221 About SANS Institute The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted, and by far the largest source for world-class information security training and security certification in the world offering over 50 training courses. GIAC, an affiliate of the SANS Institute, is a certification body featuring over 20 hands-on, technical certifications in information security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; and it operates the Internet’s early warning system – the Internet Storm Center. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community. ( http://www.SANS.org ) About HIMSS HIMSS is a global, cause-based, not-for-profit organizationfocused on better health through information technology (IT). HIMSS leads efforts to optimize health engagements and care outcomes using information technology. Visit http://www.himss.org . HIMSS is a part of HIMSS WorldWide, a cause-based, global enterprise producing health IT thought leadership, education, events, market research and media services around the world.
For the original version including any supplementary images or video, visit http://news.yahoo.com/sans-institute-himss-partner-offer-mobile-device-security-174600431.html

Which sectors require passcodes for mobile device access?

By William Jackson Aug 27, 2013 Public-sector agencies are more likely than other organizations to require strong passcodes to control access to mobile devices used in the workplace, according to a how to become an alpha male john alexander study by Fiberlink Communications, which provides mobile device management products and services. Source: Fiberlink Communications Corp. When the public sector enforces a passcode, they really enforce it, said Fiberlinks director of marketing, Jonathan Dale. The findings come from a study of policies enforced on 200,000 smartphones and tablets managed through Fiberlink. That sample represents a fifth of the 1 million devices the company manages for 5,000 customers. Although 85 percent of devices among all respondents required some kind of passcode for authentication, the vast majority required the most simple kind, a four or five character PIN. Just 4 percent require a combination of numbers and letters, and two percent require a complex passcode of numbers, letters and special characters. Health care organizations, for example, scored highest in requiring some kind of passcode, at 97 percent, but only 4 percent require a strong passcode. One reason for the preponderance of simple passcodes is that policies have to balance security with user friendliness in order to be enforced. About the Author
For the original version including any supplementary images or video, visit http://gcn.com/articles/2013/08/27/mobile-device-passcodes.aspx

Enterprise implications of wearable technology

Penton’s Technology Group Delivers Education Targeted to IT Professionals at IT/Dev Connections

Contact Center Solutions Interaction Analyzer™

The number of shares short is then compared to the average daily volume, in order to calculate the total number of trading days it would take to close out all of the open short how to become an alpha male john alexander positions if every share traded represented a short position being closed. Click here to find out The 25 Most Shorted Nasdaq 100 Stocks In our new rank based on the most recent short interest data from NASDAQ, Linear Technology Corp. ( NASD: LLTC ) has taken over the position of #24 most shorted Nasdaq 100 component, from Akamai Technologies Inc ( NASD: AKAM ) which is now in the #8 spot. The days to cover at 08/15/2013 was 5.01 for LLTC, and 9.74 for AKAM; this compares to the average across all Nasdaq 100 components of 4.27 (up from the average back on the 07/31/2013 settlement date of 4.03). The chart below shows the movement over time of the days to cover values of both LLTC and AKAM, versus the average Nasdaq 100 component. Below is a chart showing the relative positions of LLTC versus AKAM over time within the 100 Nasdaq 100 components, with #1 representing the component with the highest days to cover value (most heavily shorted) and #100 representing the component with the lowest days to cover value (least heavily shorted): A stock with a high days to cover value compared to its peers would be considered to have a higher level of short interest as compared to those peers. This could mean short sellers are using the stock to hedge a long bet elsewhere, or could also mean that short sellers believe the price of the stock will decline. When short sellers eventually cover their positions, by definition there must be buying activity because a share that is currently sold short must be purchased to be covered. So investors tend to keep an eye on that days to cover metric, because a high value could predict a sharper price increase should the company put out some unexpectedly good news short sellers might rush to cover positions, and if the days to cover number is high, it is more difficult to close those positions without sending the stock higher until the higher price produces enough sellers to generate the necessary volume. Below is a three month price history chart comparing the stock performance of LLTC vs.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/dividendchannel/2013/08/27/linear-technology-becomes-24-most-shorted-nasdaq-100-component-replacing-akamai-technologies/

Technology Groups Step Up Call for Immigration Reform

At least, that is what device designers are hoping for. Each day, I take the commuter rail to work from San Francisco to Silicon Valley, and sit next to Google and Apple engineers who often have exciting new toys in their backpackswhether its a pair of Google Glasses, or a prototype of the iWatch. Sometimes, I even get to demo these devices during my commute. The dawn of devices such as Galaxy Gear and iWatch speaks to a larger cloud computing trend that is about to take enterprise computing by stormwearable, SaaS-based technology. There is a reason why the very best venture capital firms on Sand Hill Road are pouring money into this trend. Ideas that make good business sense tend to do well. But, could large corporations truly benefit from their employees use of cloud-based, business apps on the iWatch? Before you consider that question, ask yourself: how many millions of dollars have enterprises spent on iPads and other tablets, so their employees can use them in the regular course of business? Whether its a sales rep using a CRM like Salesforce.com on his or her iPad, or a pilot using cloud-based navigation software on a tablet mobile products have become common in the workplace. Could the smartwatch become ubiquitous in corporate realm, too?
For the original version including any supplementary images or video, visit http://www.zdnet.com/enterprise-implications-of-wearable-technology-7000019915/

Jay Manciocchi-SaaS Markets-HEAD SHOT

EDT ExxonMobil Awards Alternate Path Technology License to Weatherford Alternate Path(R) technique ensures full gravel pack in cased and open-hole completion wells HOUSTON, Aug 27, 2013 (BUSINESS WIRE) — –Improves long-term reliability of sand control and reduces workovers –Developed and licensed by ExxonMobil Upstream Research Company ExxonMobil Upstream Research Company has awarded Weatherford International Ltd. a limited international license for the company’s Alternate Path(R) technology patent portfolio for gravel packing cased and openhole completion wells. Alternate Path is a patented technology developed by ExxonMobil to improve the reliability of wells completed in sand-prone reservoirs. Alternate Path provides alternate flow paths called shunt tubes in the downhole tool used for packing gravel in the producing sections of a well. The shunt tubes enable the Alternate Path packing operation to continue when sand prematurely blocks the well annulus, which would stop a conventional packing operation. The shunt tubes divert the gravel slurry around sand blockages and through distributed portholes to fill voids in the annulus until a complete pack is in place. “Alternate Path technology is one of several sand control completion technologies developed by ExxonMobil to increase reliability and production uptime and improve economics of high-cost production wells,” said Sara N. Ortwein, president of ExxonMobil Upstream Research Company. “ExxonMobil is pleased to work with Weatherford to deploy this key technology in our operations.” The Alternate Path license allows Weatherford to produce and deploy Alternate Path technology for ExxonMobil affiliates around the world and for ventures in which ExxonMobil participates. “Alternate Path technology is a reliable technique to ensure a complete gravel pack is in place for sand control,” said Mark Hopmann, vice president, well completion technologies for Weatherford. “Alternate Path is field proven for long-interval and horizontal wells.” About ExxonMobil Upstream Research Company ExxonMobil Upstream Research Company is the upstream research affiliate of Exxon Mobil Corporation /quotes/zigman/203975/quotes/nls/xom XOM -0.31% , a leading global oil, natural gas, and petrochemicals company with operations in nearly 200 countries and territories worldwide.
For the original version including any supplementary images or video, visit http://www.marketwatch.com/story/exxonmobil-awards-alternate-path-technology-license-to-weatherford-2013-08-27

Introducing the World Economic Forum’s Technology Pioneers 2014

Keynote presenters will provide attendees with the information and news skills that will help IT professionals with their day-to-day jobs. The featured keynote for IT professionals is Mark Minasi, Senior Contributing Editor, Windows IT Pro. The IT/Dev Connections keynotes will be delivered on Monday, September 30 at 5 p.m., Tuesday, October 1 at 8:30 a.m. and Wednesday, October 2 at 8:30 a.m. Key workshops for IT professionals include: — Pre-con – Windows Server 2012 Advanced Troubleshooting Workshop by Bruce Mackenzie-Low — Pre-con – Learn to Automate Your Data Center Processes with System Center Orchestrator by John Savill — Pre-con – Exchange: From Zero to Hero: PowerShell for Exchange Server Boot Camp by Mike Pfeiffer — Post-con – Implementing System Center 2012 Configuration Manager SP1 in the Real World by Johan Arwidmark/Kent Agerlund To register for IT/Dev Connections, visit http://www.devconnections.com. About Penton’s Technology GroupPenton Technology Group provides information and education to advance technology ecosystems. About PentonFor millions of business owners and decision-makers, Penton makes the difference every day. We engage our professional users by providing actionable ideas and insights, data and workflow tools, community and networking, both in person and virtually, all with deep relevance to their specific industries. We then activate this engagement by connecting users with tens of thousands of targeted providers of products and services to help drive business growth. Learn more about our company at http://www.penton.com. Penton is a privately held company owned by MidOcean Partners and U.S.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/-pentons-technology-group-delivers-education-targeted-it-professionals-/2013/08/27/7368955.htm

Loading+chart+©+2013+TickerTech.com

(Logo: http://photos.prnewswire.com/prnh/20130827/DC70308LOGO ) The nationwide effort to build support for immigration reform, particularly as it relates to high-skilled immigration reform and new visas for STEM advanced degree graduates, is spearheaded by TechVoice, TECNA and CompTIA. “Today’s immigration system needs to be updated to accommodate for an ever-changing economy and hypercompetitive global marketplace,” said Maxine Baller, president and CEO, New Jersey Technology Council. “By doing nothing, we are in danger of threatening our future productivity, ingenuity, and the competitiveness of key sectors of our economy, including technology.” By the end of the August recess, 14 state-based tech organizations will have held at least 35 meetings and roundtables with their representatives both Democrats and Republicans to encourage their support for a balanced, workable immigration system. More than 136 companies are participating in this effort from Arizona, Colorado, Connecticut, Georgia, Idaho, Illinois, New Jersey, New York, North Carolina, Ohio, Rhode Island, Utah and Washington. “Although our concerns lie in the high-skilled realm, we support comprehensive reform, either as one large package or through piece-meal legislation that is put together down the road,” said Steve Zylstra, chairman of TECNA and president of the Arizona Technology Council. “We encourage the House and Senate to work together to iron out their differences in content and approach and to come up with a solution that helps us drive innovation, build our local economies and move forward in this 21st century.” “We can build a long-term pipeline of American workers for science, technology, engineering and math (STEM) related jobs jobs that are critical to America’s economic growth,” said Todd Thibodeaux, president and CEO of CompTIA. “Many of CompTIA’s members are small and medium-sized technology firms that benefit from a strong pipeline of talent throughout the industry.” About TechVoice TechVoice is a partnership of the Computing Technology Industry Association (CompTIA), the Technology Councils of North America (TECNA), and participating regional technology associations. Collectively, TechVoice represents thousands of technology companies across the country employing millions of workers. TechVoice is dedicated to empowering and mobilizing the grassroots tech community to impact legislative and regulatory issues important to growth, innovation and job creation. For more information, visit http://www.techvoice.org . About TECNA TECNA serves its members and the industry through its strong peer-to-peer network and its regional initiatives to raise the visibility and viability of the technology industry. TECNA represents almost 50 IT and Technology trade organizations that, in turn, represent more than 16,000 technology-related companies in North America.
For the original version including any supplementary images or video, visit http://www.sacbee.com/2013/08/27/5684984/technology-groups-step-up-call.html

See How Marvell Technology Ranks Among Analysts’ Top Picks With Strong Buyback Activity

( NASD: MRVL ) is the #110 broker analyst pick among those stocks screened by The Online Investor for strong stock buyback activity. To make that list, a stock must have repurchased at least 5% of its outstanding shares over the trailing twelve month period. In forming the rank, the analyst opinions from the major brokerage houses were tallied, and averaged; then, the list of stocks with strong buyback activity was ranked according to those averages. Investors are often keenly interested in knowing which companies are buying back their own stock, because companies often will only make such a move if they feel their stock is undervalued. Marvell Technology Group Ltd. is a company with strong buyback activity that is also considered a compelling buy by analysts; a bullish investor could take this to mean that sharp analyst minds came to the same bullish conclusion as the company itself that the stock is a good value, and therefore the stock should do well in the future. Click here to find out the Top Analyst Picks With Strong Stock Buyback Activity Analysts studying companies buying back their own stock will also factor into their analysis that future earnings will now be spread over a smaller share count, thereby increasing the per-share earnings the remaining shares will enjoy, versus what that same number would have been absent the stock buyback activity. See what other stocks are held by SOXX MRVL operates in the Semiconductors sector, among companies like Intel Corp (INTC) which is down about 1.1% today, and Taiwan Semiconductor Manufacturing Co., Ltd. (TSM) trading lower by about 1%. Below is a three month price history chart comparing the stock performance of MRVL, versus INTC and TSM. MRVL is currently trading down about 2.4% midday Tuesday.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/dividendchannel/2013/08/27/see-how-marvell-technology-group-ranks-among-analysts-top-picks-with-strong-buyback-activity/

ExxonMobil Awards Alternate Path Technology License to Weatherford

For the other 35 Technology Pioneers, too — chosen for their potential to generate new opportunities and solutions — this is a question to tease the imagination. Imagine, for example, programming your immune system not to be set off by pollen, or peanuts, or a transplanted organ. Imagine there being no incentive to clear rainforests for tropical hardwood, because renewable softwood — treated with biowaste — is as beautiful, durable and affordable. Imagine being on a hiking vacation and never having to worry about your smartphone running out of battery, because you have not one but two ways to keep it powered: its touchscreen contains transparent photovoltaic cells, and your t-shirt can generate electricity from your body heat. Imagine an online world populated by websites that instantaneously construct themselves in response to what they know about you. For example, your phone knows that you’ve just passed security in the airport, and for which flight you just scanned a boarding pass, so the airline’s website shows you a personalized map to your gate. Growing personalization is one of the trends represented by this year’s 36 Technology Pioneer companies , and the much larger pool of nominees from which they were selected by a committee comprising top technology and innovation experts, academics and venture capitalists. Other trends include tools to make collaboration easier; a revolution in education; breakthroughs in robotics and smarter products and services — such as tiny, edible tags that act like barcodes woven into the fabric of products. This year’s Technology Pioneers include no-brainer solutions that are both greener and cheaper — such as a more efficient way for air conditioning systems to dehumidify air.
For the original version including any supplementary images or video, visit http://www.huffingtonpost.com/silvia-von-gunten/technology-pioneers-2014_b_3819390.html

Amkor Technology to Present at Upcoming Conferences

Finance Tue, Aug 27, 2013, 5:14 PM EDT – U.S. Markets closed Breaking News New York Times Says Website Has Been Hacked Amkor Technology to Present at Upcoming Conferences Press Release: Amkor Technology, Inc. 3 hours ago CHANDLER, Ariz.–(BUSINESS WIRE)– Amkor Technology, Inc. ( AMKR ) today announced that it will participate in the following investor conferences: Citis 2013 Global Technology Conference on Wednesday, September 4, 2013. Amkors presentation will occur at 10:30 am Eastern Time (7:30 am Pacific Time) at the Hilton New York Hotel in New York, NY. Deutsche Banks 2013 Technology Conference on Tuesday, September 10, 2013. Amkors presentation will occur at 5:30 pm Pacific Time (8:30 pm Eastern Time) at The Cosmopolitan of Las Vegas Hotel in Las Vegas, NV. Audio-only webcasts of the presentations will be made available, both live and by replay, on the Investor Relations section of Amkors website. About Amkor Amkor is a leading provider of semiconductor packaging and test services to semiconductor companies and electronics OEMs. More information on Amkor is available from the company’s SEC filings and on Amkor’s website: http://www.amkor.com . Contact:
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/amkor-technology-present-upcoming-conferences-171500378.html

Mobile Trends and Insights for Smartphones and Tablets For Fall 2013

avast! Mobile Premium Fights Back Against Phone Theft, While Securing Your Data

Because Apple offer them a choice to utilize thousands of iPad business apps, making it easy for them to conduct their business on a daily basis. On one hand, Googles Android platform for both the smartphones and tablets are now battling Apples iconic iOS platform for the top spot for the most beloved and most widely used operating system in the world. The Android OS operates through a no-fee, open source licensing model. Android provide device manufacturers and mobile carriers significant freedom and flexibility to design products. Android rely on manufacturers to build and promote Android devices and the carriers and other retailers to sell them to consumers. You can say that Apple’s iOS functionality is not nearly as tweakable compared to that of Android’s. For that reason alone, many mobile users prefer the use of Android OS over that of Apples because Android is supposed to offer more customization on devices powered by the Android platform. Morever, Apples iOS and Googles Android platform pretty much dominate the mobile operating system thats currently used around the world. Windows OS and the BlackBerry OS are also becoming popular to consumers, though both are not as quite popular and widely used globally when compared to iOS and Android. Fans and supporters of these brands almost always argue which one platform is the best. In my opinion, Id say that all of these mobile platforms have their own strengths and weaknesses.
For the original version including any supplementary images or video, visit http://www.examiner.com/article/mobile-trends-and-insights-for-smartphones-and-tablets-for-fall-2013

Why Your Emails Need to Look Great on a Mobile Device

Google Mobile Ad Extensions Creating mobile search ads with Google also lets you take advantage of Googles nifty mobile ad extensions, which include features like: Mobile Site Links: Mobile site links make it easy for mobile users to jump to specific pages of your site without wandering around. Site links are especially useful in mobile marketing, as its much more convenient for users on mobile devices. What is Mobile Marketing and Why Does it Matter? (So So Much!) Click-to-Call Mobile Ad Extension: The click-to-call extension puts a call button directly beneath an ad. Clicking the button automatically generates a businesss phone number on a users mobile device. While this handy ad extension makes it easy for searchers to get in contact with your business and drives users down the conversion funnel, its best to only have the click-to-call mobile ad extension appear when your business is open and able to answer the phone. What is Mobile Marketing and Why Does it Matter? (So So Much!) Google Offers for Mobile: The Google Offers mobile ad extension lets advertisers post a discount offer or coupon beneath their ad. These special offers can capture the attention of users who might otherwise ignore an ad.
For the original version including any supplementary images or video, visit http://smallbusiness.yahoo.com/advisor/mobile-marketing-why-does-matter-much-160023666.html

Hands-on with LoJack for Mobile Devices (Gallery)

Designed correctly, these mobile sites make the sale of goods and/or services available at the touch of a button. They also provide a simple way to get information across to prospective customers. Check out http://www.truckertools.com on your mobile device. Now, this is one of my companies so I might be a little biased but I really like the mobile format of this site. There is just the right amount of information, links to take you where you need to go to download the application, and several YouTube videos to explain some of the more complex points instead of writing everything out. Texting Features: The airlines got it right when they started adding a feature to their ticketing process where you could receive your boarding pass and reminders by text. According to CTIA.org, it takes 90 minutes for the average person to respond by e-mail but only 90 seconds for the average person to respond by text. Texting features are a great way to stay engaged with customers and to provide them with useful information. A lot of retail stores are using this tactic to supply loyal customers with coupons and deals instead of the traditional e-mail or newspaper method. The great thing about this feature is that you have an active audience who is willing to engage. Bed Bath & Beyond Bed Bath & Beyond is one example of a retailer who has been very successful with this feature and has received a lot of positive press as a result.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/patrickhull/2013/08/23/why-entrepreneurs-must-have-a-mobile-marketing-strategy/

DNS Made Easy Launches Mobile App for Apple Devices

Apple approved the app a few days later. The reason for the delay for usage of the mobile app on Apple devices was based upon the approval process that such apps must undergo with Apple. The company is also mulling the idea of offering the mobile app on Blackberry. If our corporate clients who use Blackberry want the mobile app as well, we will look into servicing their needs in the near future, Seven Job, President of DNS Made Easy said. We put our clients first, so if we receive feedback from these users and they say, We want it for Blackberry, then we will make sure they have a product and soon. That is what the company did for Android and IOS users. These users requested the mobile app, so DNS Made Easy launched the new and innovative service, once again proving that they are a leading provider with cutting edge DNS services. Recently, DNS Made Easy out-performed all of its competitors in speed. During the month of July DNS Made Easy was evaluated by a third party company and found that they offer the fastest DNS speed in the industry. Now DNS Made Easy is a leader in DNS mobile applications for both Android and IOS devices. Job also said that the company was going to be offering special promotions in the coming weeks, explaining, We want to raise further awareness about the mobile app and how easily our clients can access their DNS configurations using their mobile devices, so were going to be announcing new promotions in order to help spread the word about these new features. For more information about the DNS Made Easy Mobile Application and DNS Made Easys other services please visit http://www.dnsmadeeasy.com. About DNS Made Easy DNS Made Easy is a subsidiary of Tiggee LLC, and is a world leader in providing global IP anycast enterprise DNS services.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/DNS-Made-Easy-Launches-Mobile-App-for-Apple-4752544.php

Soft Passcodes Still Prevail on Enterprise Mobile Devices

Soft Passcodes Still Prevail on Enterprise Mobile Devices image passcode blog august

“People want to be productive,” said James Ainslie , chief technology officer at SMMT Online (Pty) Ltd. in Johannesburg, South Africa. In today’s economic climate, people can’t afford to be separated from their information. An introduction to mobile device management in the enterprise No two mobile devices are alike, so how do you manage your groups mishmash of gadgets effectively? Microsoft MVP Brien M. Posey explores the challenges of mobile endpoint management and the best practices that can help sort out the mess. Making corporate apps mobile device-friendly Although many users would like their mobile devices to perform the same as their PCs, its usually not that simple. But while the need to run corporate apps on devices poses a challenge, there are some important steps organizations can take to help. Mobile endpoint management for SMBs on a budget Mobile device management doesnt just play a role in large enterprises, it also affects small and midsized businesses. But even with less money and resources to work with, there are still affordable steps that can be taken to keep mobile devices secure. Does Windows Phone 7 make sense in the enterprise?
For the original version including any supplementary images or video, visit http://searchwindowsserver.techtarget.com/feature/Mobile-device-management-spotlight

Mobile Device Management Featured Article

(Photo Business Wire) Multimedia Gallery URL REDWOOD CITY, Calif.–(BUSINESS WIRE)– AVAST Software today announced the release of avast! Mobile Premium, the premier version of its award-winning mobile security app for Android smartphones and tablets, which is currently used by more than 25 million people. avast! Mobile Premium offers customers new superior anti-theft and backup technologies that will help them recover a lost or stolen phone and the data stored on it. Geofencing, a core anti-theft feature of avast! Mobile Premium, creates a virtual perimeter around a device sounding a loud alarm if someone attempts to take the device beyond a user-set distance. Anti-theft, along with mobile backup, addresses consumers primary concern of losing important content such as pictures, contacts, and even financial information when their mobile device is either lost or stolen. In a customer survey with more than 167,000 worldwide respondents, AVAST found that one in four smartphone users in the US has lost or had their device stolen at least once, costing an average of $3721 per person. AVAST found that not only are consumers lax in using anti-theft features to prevent losing their mobile device and the data on it but nearly 50% of US smartphone owners do not back up their content as well.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/avast-mobile-premium-fights-back-120000367.html

Why Entrepreneurs Must Have a Mobile Marketing Strategy

Image representing iPhone as depicted in Crunc...

Looking at 200,000 of the 2 million plus devices we manage for industries across the globe, we learned that passcode security still has a long way to go for complete protection of data on smartphones and tablets. Limitless Passcode Options Limited Implementation It would help to first define the options available for passcode protection on mobile devices. The three most common categories are: PIN/Simple Passcode: Just numbers or letters Alphanumeric Passcode: Combination of numbers and letters Complex Passcode: Combination of numbers letters and special characters According to the data, the PIN/simple passcode prevails overall with anoverwhelming 93% majority. Of those deploying this basic approach,73% use only 4-5 charactersfurther highlighting this pervasive simplicity. Why is this troubling? i09 recently did a report showcasing a robot constructed for a paltry $300 that can crack these codes in just under 24 hoursand thats a high-end estimate. Also, considering most people use repeatable digits on their phone or tablet, regular old human hackers can usually get into your smartphone in 10 tries or less. Healthcare Passcodes Most Enforced; Public Sector Passcodes Most Complex While there is no one-size-fits-all rule for passcode protection, IT can use several barometers for the proper approach in their industry. Healthcare, financial services and public sector organizations have some of the strictest audit requirements when it comes to data protection, with regulations like HIPAA, HITECH, FINRA and FISMA compliance constantly looming over their heads. Given these factors, it comes with little surprise that organizations under these umbrellas are the most fastidious when it comes to passcode enforcement through mobile device management policies and passcode complexity. Passcodes Most Enforced Through Automated Policies by Industry (% of devices protected) Healthcare: 97%
For the original version including any supplementary images or video, visit http://www.business2community.com/mobile-apps/soft-passcodes-still-prevail-on-enterprise-mobile-devices-0591012

What is Mobile Marketing and Why Does it Matter? (So So Much!)

What is Mobile Marketing and Why Does it Matter? (So So Much!) image marketing for mobile

Mobile device management is a popular tool whether the company has adopted a Bring Your Own Device strategy or not. Its a nice medium between the control IT still needs to have and the flexibility and access users demand. Likewise, it also addresses the security concerns that seem to be top of mind for any professional promoting the use of mobile devices for access to the corporate network through the public Internet. This is where MobileIron stands out in the crowd. The mobile device management solutions provider offers a Layered Security model so that users have the flexibility they need without sacrificing the security of the network. The solution aims to provide the experience mobile was created to produce. Users (and their supervisors) enjoy increased productivity and access to the tools they need while on the go. Layered Security addresses a number of different elements in the mobile experience. First, it protects the enterprise persona, or the collection of settings, information, applications and data on the employees mobile device. It effectively aligns with the users behavior to protect that data.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/channels/mobile-device-management/articles/350502-layered-security-approach-mobile-device-management.htm

Mobile users rely on simple security methods, report says

The analysts forecast the Global Mobile Device Management Enterprise Software market to grow at a CAGR of 21.3 percent over the period 2012-2016. One of the key factors contributing to this market growth is the need to enhance customer experience. The Global Mobile Device Management Enterprise Software market has also been witnessing an increasing demand from small and medium-sized enterprises. However, the emerging threat from open-source mobile device management solutions could pose a challenge to the growth of this market. The key vendors dominating this space include Airwatch LLC, Fiberlink Communications Corp., http://speedyplansindownloadfreepdf.blogspot.com/2013/07/how-to-become-alpha-male-john-alexander.html Good Technology Inc., and Mobilelron Inc. The other vendors mentioned in the report are BoxTone Inc., IBM Corp., SAP AG, Sophos Inc., SOTI Inc., Symantec Corp., and Zenprise Inc. Commenting on the report, an analyst from the team, said: “SMEs require regular feedback on their services, as they find themselves catering to large number of customer segments and this requires constant innovation on the part of service and product offerings. It has been witnessed that large organizations are more concerned about the number of mobile devices entering and exiting their company on a daily basis in order to safeguard their data. Therefore, BYOD policy has not been implemented on large scale in large enterprises while several SMEs are deploying BYOD in order to reduce infrastructure and operational costs.
For the original version including any supplementary images or video, visit http://www.ciol.com/ciol/news/194089/global-mobile-device-management-enterprise-software-market-2012-2016

“It’s a usability thing more than anything,” said Jamie Cowper, a senior director for Nok Nok Labs. “The temptation is to go as simple as you can, because long, complex passwords are next to impossible on a small screen in a timely correct fashion,” Cowper told CSOonline. “The balance between security and ease of use has shifted a bit in the mobile space,” he said. “You can’t ask the same things of a mobile user that you might have done at a desktop machine.” Bill Carey, vice president of Siber Systems, a maker of a password management software, said that ease of typing definitely influenced password choice. “If you’re at your computer, you’re more inclined to use a more difficult passwordsomething with capital letters and numbers,” Carey said in an interview. “But on mobile devices, people don’t like typing on those so they’re more likely to keep their passwords short.” Mobile security trends On the other hand, smartphones have standard features that can be used to authenticate a user that desktop and laptop systems may not have. “Location-based services can be used and biometric informationvoice and faceas well,” Nok Nok’s Cowper said. “Fingerprint sensors will be on these devices in the near future, possibly next month with Apple’s iPhone announcement,” he said. Fiberlink also discovered that the industry which had the highest percentage of devices required to have their pass code feature activated was health care (97 percent), followed by professional services (87 percent), public sector (85 percent), consumer-retail (81 percent), financial services (79 percent), manufacturing (78 percent) and education (41 percent). However, health care is in the middle of the pack when it comes to the number of devices that have alphanumeric or complex pass codes on them (4 percent). The public sector had the highest number of mobile devices with alphanumeric or complex passwords (18 percent) and education the lowest (1 percent).
For the original version including any supplementary images or video, visit http://www.techhive.com/article/2047371/mobile-users-rely-on-simple-security-methods-report-says.html

Global mobile device management enterprise software market 2012-2016

New data, compiled in conjunction with Chadwick Martin Bailey, found that 49 percent of consumers say they are likely to click on links in emails opened on their smartphone. While click-through rates vary greatly among industries and subscriber list size, as a marketer you are in an envious position if almost half of your subscriber list looks forward to the links you provide in your emails. The new data also found that almost 80 percent of consumers are likely to reopen an email on a laptop or desktop after having originally opened it on a mobile device. So if you catch your subscribers on their smartphone first, theres a very good chance they will revisit your email later. This allows you to develop a deeper relationship with your customers and keeps your brand top-of-mind because theyre seeing your content multiple times. Becoming mobile friendly is easy Thats great, you may be saying to yourself. But youre still speaking lies, Jason. You just said making your email look great on a mobile device is easy. Actually, it is. But Ill let one of our resident mobile email experts and a man who knows better than I, mobile products manager Jim Garretson speak to that: The great thing about mobile emails is that shorter content and fewer calls to action actually perform better than complicated and dense messaging, says Jim . By simplifying email marketing campaigns, marketers can take an essential and effective step towards becoming mobile friendly. So there you have it. By simplifying your content and cutting down on messaging, you are creating an effective mobile email.
For the original version including any supplementary images or video, visit http://smallbusiness.yahoo.com/advisor/why-emails-look-great-mobile-device-200047992.html

Mobile device management spotlight

After the software is setup on your phone, it remains active even if your Galaxy S4 is wiped and reset. Locate: With the software installed, login to your account to perform remote functions. After selecting to locate the device you will see it appear on a map view with the last location of your phone identified. Lock: To lock your phone remotely you select the lock option and then enter a lock message that will appear on your phone screen. You then enter a PIN and select to lock the phone. After confirmation, your phone will be remotely locked. Once you find it or it gets returned, you can then enter the PIN and unlock your phone. Delete: If a lock is not good enough, you can also choose to remotely wipe your device. This action may be desired if you cannot find your device and have sensitive data you don’t want to risk losing.
For the original version including any supplementary images or video, visit http://www.zdnet.com/hands-on-with-lojack-for-mobile-devices-gallery-7000019728/

TECH NOW: Best back to school gadgets

sticknfind

It has a built-in air pump to put more air in whenever and wherever you need. The whole design alleviates the pressure pulling down on your shoulders, while distributing weight more evenly throughout, and resting more comfortably on your hips. For this, you’ll pay around $60. FOR MUSIC ANYWHERE: Satechi iFit-1 This speaker dock for your smartphone or tablet is compact and portable, but still features the power to provide great sound wherever you need it with a battery that will last for up to six hours. This gadget is compatible with most smartphones and tablets and, best of all, comes in at a bargain price of $16. The Pebble smartwatch starts at $150. (Photo: Pebble) FOR THE WOW FACTOR: PEBBLE SMARTWATCH The Pebble Smartwatch is more for the college age student who wants to look both tech and fashion forward. It’s a great way to know what time it is, and gives you a way to read to read texts, e-mails and get calendar notifications, all on your wrist. But, if you or your student is prone to attention issues, this could be a huge distraction, since it vibrates and flashes social media alerts right on hang on a minute I’m getting a text oh right your wrist. Prices start at $150. FOR STUDENTS WHO STILL NEED A PRINTER: EPSON ALL-IN-ONE There’s been a great debate among the tech-recommending crowd: Do students still need printers, or is a USB memory stick or trip to the nearest campus Kinko’s enough?
For the original version including any supplementary images or video, visit http://www.usatoday.com/story/tech/personal/2013/08/18/tech-now-back-to-school-laptop-smartpen-wifi-ipad/2649637/

Universal Gadgets Showcase New Tablets

Pockets in the front, side and top lid also let you easily grab small items. In the event the weather changes, the pack is also prepared to take on the elements, with a protective rain cover as well as a water-resistant top pocket with waterproof zipper and sealed seams. Black Diamonds Distance FL Trekking Poles start at $130. (Photo: Alice Truong for USA TODAY) THESE STICKS WERE MADE FOR WALKING If you’ve got a heavy load on your back, a pair of trekking poles can help you power on. I’ve always been the person who sneered at people with hiking sticks, but after trying Black Diamond’s Distance FL Trekking Poles ($130) for a backpacking trip, I saw the light. There’s no two ways around it: You’ll look like a massive dork with a pair of walking sticks. But once I was able to get past that, I embraced the Distance FL Trekking Poles, which are suited for trail running, day hikes, backpacking and expeditions. With them, I was able to distribute the weight I was carrying, propel myself up hills and steady myself down steep declines. Inspired by the quick draw mechanism found in avalanche probes, Black Diamond utilizes a three-section Z-Pole design that can collapse down to 13.4 inches, making them extremely portable. Deploying the Z-Pole is literally a snap: Pulling from the base from any angle will straighten and lock the poles, so they’re ready to be used within seconds. What initially intrigued me about these poles is that Black Diamond has adapted them for women.
For the original version including any supplementary images or video, visit http://www.usatoday.com/story/tech/columnist/2013/08/17/summer-hike-garmin-oregon-bear-grylls-hatchet-binoculars/2648583/

Amazon is said to be developing its own wireless network for Kindle and other gadgets

The future: Amazon is reportedly trying to develop its own wireless network for its high-tech products like the Kindle

Here are some essentials: Tablet transformed: Tablets are the totable productivity tool of choice. But tapping class notes on a glass screen is tedious. And a tab is damage-prone. That’s where the new Logitech FabricSkin Keyboard Folio ($180) comes in for iPad users (all but first generation). Akin to a Transformer toy, this sleek protective case unfolds to prop up the tablet behind a surprisingly functional, soft membrane-bubble keyboard. Express yourself: We hear colleges won’t allow students to put personal printers on the campus network. That’s why printer maker Epson is now introducing an alternative solution Wi-Fi Direct for wireless printing from mobile devices with no router and no network required. The feature’s even on the bargain ($99) Epson Expression Home XP-410 Small-in-One, which prints lovely, colorfast photos as well as documents and also scans documents for printout or cloud storage. Coffee to go: After a hard day’s night, most students need caffeine aplenty to make that 8 a.m.
For the original version including any supplementary images or video, visit http://www.courant.com/business/custom/consumer/hc-ls-back-to-school-gadgets-20130824,0,4373599.story

eBay My Gadgets now open to all, shows you how much your tech items are worth (video)

eBay My Gadgets now open to all, shows you how much your tech items are worth

It’s unclear whether the testing is ongoing or if it’s been completed, but it’s reportedly taking place at Amazon’s Lab 126 research facilities in Cupertino, California – where Kindles are designed. Currently, Amazon devices in America access the Internet through its Whispernet service, which runs on AT&T’s 3G cellular network. The future: Amazon is reportedly trying to develop its own wireless network for its high-tech products like the Kindle According to Bloomberg – which cites ‘people with knowledge of the matter’ as its source – Amazon is testing a wireless network using a spectrum that is controlled by a satellite communications company called Globalstar. Globalstar currently is seeking federal approval to lease its spectrum to wireless carriers, as well as cable and technology companies. ‘Given that Amazons becoming a big player in video, they could look into investing into forms of connectivity,’ independent wireless analyst Chetan Sharma told the publication. ‘Bathroom breaks are for wimps’: NYC Mayor Bloomberg offers his top tips for success (including superhuman bladder-control) Sharma went on to tell NBC News that ‘Right now, the cellular cost on Kindle is baked into the product. If that cost goes down, Amazon could potentially drop the price of the device or the goods.’ Reps at Amazon have not confirmed or denied rumors that the company was developing its own wireless network. Visionary: Amazon founder and CEO Jeff Bezos is trying to make Amazon a one-stop shop for online consumers The costs associated with developing its own wireless network would be fairly substantial, but Sharma says it’s ‘always advisable to be tinkering around with the whole stack from networks to devices to apps.’ ‘[Its own network] is just a means to an end [to] deliver more commerce, and if this allows Amazon to deliver the goods more economically, more power to them,’ he says.
For the original version including any supplementary images or video, visit http://www.dailymail.co.uk/news/article-2401263/Amazon-said-developing-wireless-network-Kindle-gadgets.html

Surf report: Tech gadgets for one last summer hike

gregory

In today’s gadget world of smaller is better, Zagg makes a great companion to the iPad mini with keyboard-friendly covers and cases. The ZAGGkeys Folio ($99.99) has a quarter of an inch hard shell case to protect the small tablet, but when you open it you get a built-in Bluetooth keyboard, which can swing open to 130-degrees of viewing angles. A built-in battery is charged via USB and is good for up to three months’ of use between charges. I guess you can call the ZAGGkeys Cover ($99.99) half of the Folio. It features the Bluetooth keyboard with a pivoting hinge, which holds your iPad in a variety of angles. The cover can then attach to the tablet when you’re done and fold up as a protective cover over the screen. Details: http://www.zagg.com LIGHTNING SOLUTIONS FROM MACALLY A lot of schools are switching to tablets, but many force the students to disable Bluetooth – and that eliminates many accessories. Macally has a wired full-size keyboard solution with the iKeyLT ($59.99) with a Lightning connection. It features many of the Apple iOS specific shortcuts and media keys along with a caps lock and the critical shift keys on both the left and right side. The iKeyLT works with iPads, iPhones and the iPod touch and a viewing stand is attached for supporting the devices in portrait and landscape positions.
For the original version including any supplementary images or video, visit http://www.miamiherald.com/2013/08/21/3577088/gadgets-gear-for-those-heading.html

An Education In Back-To-School Gadgets

Tablet computers have seen a huge rise in popularity over the last year, and Universal Gadgets new product range is perfect for those looking to own a tablet of their own without paying the usually steep high-street prices. The companys flagship tablets are the new 16GB A20 7-10 models. Each features the impressive Allwinner A20 dual core processor, and run the immersive Android 4.2 Jellybean. With 16GB of memory available (which is expandable via microSD up to 32GB) theres plenty of room to download all your favourite apps from the Google Play Store. When coupled with their built-in microphone and speakers, the tablets dual camera makes it perfect for social apps, allowing you to effortlessly video chat with friends and family whilst on the go. With the school year due to begin next month, these tablets are perfect for all of those looking for affordable alternatives to the pricier models. They include many similar features to the high-end versions, at only a fraction of the price. The company also began selling new and used mobile phones earlier this year. They now boast an impressive selection of handsets, including many up-to-date smartphones. Customers can choose from multiple generations of iPhones, from the earlier 3G model to the latest 16GB iPhone 5. The incredibly popular Samsung Galaxy S4 is also now available, providing customers with access to the greatest models without the expensive price tag.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/Universal-Gadgets-Showcase-New-Tablets-4743265.php

Gadgets: Gear for those heading back to school — and everyone else, too

As part of this growth, the online marketplace behemoth is now officially launching My Gadgets, a feature that allows eBay users to easily determine the value of items in their device portfolio — you know, in case you’re looking to clear out the old and make way for the new . eBay says the newly minted hub will be able to display the individual and collective value of stuff, with prices being based on its own “unique data on current sales trends and prices for both new and vintage electronic items.” The link to eBay’s My Gadgets is down below, so head on over if you’re looking to build a little gadget database for yourself. Update: Promo video after the break. eBay My Gadgets screenshots 5 Photos Show full PR text eBay launches My Gadgets, a Personalized way to CATALOG and view the value of ITEMS in your gadget collection Product helps you easily sell tech products when you feel the time and price are right SAN JOSE, Calif.-August 15, 2013 eBay announced the launch of My Gadgets, a product that enables users to easily catalog their tech collections and see the current value of each of their tech items to help inform selling decisions. Available at http://www.ebay.com/mygadgets, My Gadgets organizes and saves all of your gadgets in a single place making it easy to view the individual and collective values, based on eBay’s unique data on current sales trends and prices for both new and vintage electronics items. how to become an alpha male john alexander How it works: Add Your Items: My Gadgets has information on thousands of tech items; users can type their gadget into the search bar or browse through featured categories to add to their collections. See The Value: My Gadgets calculates the current value of your item(s) based on unique eBay data on sales trends and average selling price information from recent sales. Sell it With Ease: My Gadgets makes selling your electronics items on eBay easier than ever; quickly create an eBay listing from within your My Gadget collection using a streamlined listing tool, pre-populated product information, and current sales trends to help determine a fair price. Highlights/Key Facts: Background and Insights According to the Consumer Electronics Association, Americans own approximately 24 electronic products per household and spending is on the rise!
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/14/ebay-my-gadgets/

How to Leverage Infographics for B2B Marketing

most-expensive-google-keywords-infographicInfographics are a popular topic (and sometimes target) for discussion amongst anyone doing online marketing. A sharp uptick in the volume of infographics being created has made getting your graphic “heard above the noise” more difficult. But infographics can still be an extremely effective tactic for generating awareness, communicating a story and getting traffic and earned links.
One challenge some folks run into with infographics and data visualizations (not unlike most types of content) is that they view their industry or area of focus as “too boring” to generate relevant ideas for infographics that will also get traction socially and with bloggers. After all, to make it a success you need to generate that attention, traffic, and earned links. This is a particularly popular objection with companies considering developing and promoting infographics for B2B marketing.
There  are a lot of different ways to generate shareworthy content ideas for your niche .  Businesses are generating interesting data visualizations all the time . So we’ll talk specifically about some methods for developing ideas for B2B focused infographics, with examples.
Tie Your B2B Infographic to a Timely Industry Hook
One important thing to keep in mind in creating infographics (or other types of content as well, for that matter) is that if you think hard enough about your niche, you can likely come up with an angle that bloggers and press will be interested in.
Look at content that’s created in publications related to what you do. What types of events and news stories are they regularly focusing coverage on? What kind of interesting data visualization can you create that will add to that coverage and discussion?
Quarterly Earnings or Annual Holidays
WordStream (my former employer) created an infographic titled how Google makes its money .  They created another on the industries contributing to Google’s revenue , which performed very well . Both were launched right after Google released their quarterly earnings report. The tech and business press are always looking for information and additional angles to talk about earning reports from big companies. So the timing of the graphic’s release helped in both cases.
The nice thing about events like quarterly earnings is that they’re inevitable (they happen every quarter). So you can plan for them and have the graphic ready to launch as they come up.
Noteworthy News Events
These can be a little trickier because you have to time them specifically with a news event (and frequently you have to get a little lucky regarding when you get the graphic out, as you may be dependent on the shelf life of the story). But if you get it right, you can really have the graphic pop.
Veracode, a Web application security company, released this infographic on Twitter hacks  the week of a prominent Twitter hack of USA Today’s account. As a result, the site received links and mentions from prominent sites like Mashable and ReadWrite .
“Explainer” Graphics & How-Tos
Like with any content, if you can cover the key points surrounding a central concept that many people in your niche may be interested in and/or confused by, or if you can explain how to execute on something, people will be willing to share what you’ve created. There are a number of tactics you can take in creating explainer and how-to infographics for B2B, including:
Offer definitions to commonly used terms and outline the current configuration of your industry, including key players, etc.  Be careful not to be overly self-aggrandizing.
Offer a simple, easy to understand statistical breakdown of an existing problem . Sometimes these are the easiest to share.
You can also leverage expertise for an interesting graphic that explains a topic. If you’re a designer , creating a graphic on use of fonts and colors is a pretty obvious example. But if you’re a trade show company with some expertise on what catches people’s attention , that can make for an interesting graphic as well.
Graphics Aimed at a Specific Niche of Likely Sharers
Certain niches just share content more. With infographics, you’re typically looking for a topic that will be interesting to bloggers and social sharers.
So think about how you might relate your topic back to topics like tech, social media or just passionate folks who blog frequently. Example: parents or folks interested in green living.
Maybe you can look at the effects of a popular topic such as the overall impact of your industry in a way your readers, and bloggers and sharers, will find interesting.
You Can Create a Compelling Infographic – But Maybe You Shouldn’t
Regardless of how “boring” you think your B2B product or service may be, you can certainly come up with an idea for a compelling graphic. If you focus on coming up with a topic that bloggers are likely to want to write about and sharers are likely to share, you’ll even have a strong chance of creating a successful graphic.
That still doesn’t necessarily mean infographics are for you, though.
Good infographics are expensive. They have to be researched, designed and promoted. Even very well thought-out graphics can totally flop and fail to generate much in the way of conversation, links and shares. So if you own a small business and designing a single graphic eats up so much of your budget that you absolutely have to have them be a success, you should probably be leveraging other tactics .
With any content marketing activities where you’re creating something and then relying on others to link to it, you really need to take a “portfolio” approach to content creation and promotion. Some of your efforts will fail. Some will be better than you thought. In aggregate, they should provide the returns you’re expecting for the total cost you’re laying out.
If you can’t afford to do them more than once, there’s a strong chance you should be picking another tactic instead.
Infograph  Photo via Shutterstock

For the original version including any supplementary images or video, visit http://smallbiztrends.com/2013/08/infographics-for-b2b-marketing.html?utm_source=rss&utm_medium=rss&utm_campaign=infographics-for-b2b-marketing

Beyond: Two Souls Contains Co-Op, Mobile Device Support

During Gamescom 2013, Quantic Dream’s David Cage announced a featured for the upcoming Beyond: Two Souls that will allow players to substitute the PS3’s DualShock 3 controller for either an iOS or Android mobile device running the “Beyond Touch” app. Apparently, everything that can be done on the DualShock 3 can now be done on the mobile device of your choosing, which might make for some interesting interactions. That being said, Joystiq reports that Cage advises avid players to use the DualShock while admitting that the touch interface on existing devices is Quantic Dream’s attempt to interest more casual players. In addition, Cage also revealed that the game will feature a co-op “Dual Mode” that will give a second player control over the main character Jodi’s supernatural entity, Aiden, by using either the DualShock 3 or another mobile device. The co-op mode isn’t about simultaneous play, but as reported by The Verge , allows both players to easily switch between the two in-game characters. So, what do you think about these additions/enhancements to the experience being offered up by Beyond: Two Souls? Are you looking forward to playing the game with a friend? If so, will you utilize the DualShock 3 or a mobile device? Touch base with your feelings in the comments below.
For the original version including any supplementary images or video, visit http://www.gametrailers.com/side-mission/59829/beyond-two-souls-contains-co-op-mobile-device-support

Mobile device management spotlight

Niantic has a team of researchers that roam the Web in search of interesting local information written with local expertise and some attitude. It draws from 130 sources of information including local history publisher Arcadia Publishing, history site Historvius and lifestyle site Thrillist. “The big idea, or really the simple idea, is really to use computing to connect people with the physical world,” Hanke said. “There is a tendency of mobile to isolate people. When you are using mobile devices you often are not interacting with the people in the room or the things around you. The concept is to use Google to allow people to have a richer experience with the real physical world.” Stay tuned for Ingress to come to Glass, too. Ingress is still in beta but will become more widely available this fall. It has developed a rabid following among players who divide themselves into teams that work together to connect virtual portals to take control of the land within a triangle and thereby control the hearts and minds of the people inside that triangle. Right now Ingress players roam with their mobile phones to search for clues at public art installations or historical markers or watch Ingress news reports on YouTube to find secret codes. “The idea is to get people off the couch and into the world, exposing them to cool new stuff,” Hanke said. “Thats the secret plan for adults and kids.
For the original version including any supplementary images or video, visit http://www.latimes.com/business/technology/la-fi-tn-google-niantic-field-trip-glass-20130821,0,1254121.story

BDTI aims to stabilize mobile performance and battery measures

user avatar

The unique microfiber material allows kids to clean their screens without the use of any chemicals, and the material does not leave behind dust, lint or scratchesa common problem with most cleaning methods. While securely housed in the DigiPal with its zipper closure, users can clean their devices screen by gently rubbing the DigiPal over the screen. The mobile device companions also features an additional zippered compartment ideal for carrying kids essentials including school IDs, money, earbuds or lip balm. While designed with kids in mind, parents and teens will love cleaning and protecting their mobile electronics with the device companions too. DigiPals feature fun and trendy animal designs kids will want to show off to all their friends. The mobile device companions are the ideal accessory for protecting childrens device in school bags, sports bags and purses, shielding phones and music players from kids hectic lives. DigiPals are machine washable to ensure users will continually be able to cuddle and clean their mobile device screens for years to come. Voting for the Get On Shelf competition is open now to September 2nd. Participants may vote once daily and need a Facebook account in order to vote. To vote for DigiPals, please click here . For more information, please visit http://www.digipalsusa.com or like us on Facebook at http://www.Facebook.com/Digipals.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/DigiPals-Mobile-Device-Companions-Selected-for-4744058.php

Free App Helps Secure iOS, Android Mobile Devices

“People want to be productive,” said James Ainslie , chief technology officer at SMMT Online (Pty) Ltd. in Johannesburg, South Africa. In today’s economic climate, people can’t afford to be separated from their information. An introduction to mobile device management in the enterprise No two mobile devices are alike, so how do you manage your groups mishmash of gadgets effectively? Microsoft MVP Brien M. Posey explores the challenges of mobile endpoint management and the best practices that can help sort out the mess. Making corporate apps mobile device-friendly Although many users would like their mobile devices to perform the same as their PCs, its usually not that simple. But while the need to run corporate apps on devices poses a challenge, there are some important steps organizations can take to help. Mobile endpoint management for SMBs on a budget Mobile device management doesnt just play a role in large enterprises, it also affects small and midsized businesses. But even with less money and resources to work with, there are still affordable steps that can be taken to keep mobile devices secure. Does Windows Phone 7 make sense in the enterprise?
For the original version including any supplementary images or video, visit http://searchwindowsserver.techtarget.com/feature/Mobile-device-management-spotlight

Google’s Niantic lab re-imagining reality with two mobile apps

Small Business Advisor Remind me when I share | Not you? Log out of Facebook How to remove this experience Soft Passcodes Still Prevail on Enterprise Mobile Devices By Rob Patey | Business 2 Community 9 hours ago Print Passcodes serve as the lowest hanging fruit of mobile security for enterprises, yet recent data from Fiberlinks MaaS360 platform uncovers this startling fact:15% of organizations still dont enforce this most basic security measure. Looking at 200,000 of the 2 million plus devices we manage for industries across the globe, we learned that passcode security still has a long way to go for complete protection of data on smartphones and tablets. Limitless Passcode Options Limited Implementation It would help to first define the options available for passcode protection on mobile devices. The three most common categories are: PIN/Simple Passcode: Just numbers or letters Alphanumeric Passcode: Combination of numbers and letters Complex Passcode: Combination of numbers letters and special characters According to the data, the PIN/simple passcode prevails overall with anoverwhelming 93% majority. Of those deploying this basic approach,73% use only 4-5 charactersfurther highlighting this pervasive simplicity. Why is this troubling? i09 recently did a report showcasing a robot constructed for a paltry $300 that can crack these codes in just under 24 hoursand thats a high-end estimate. Also, considering most people use repeatable digits on their phone or tablet, regular old human hackers can usually get into your smartphone in 10 tries or less. Soft Passcodes Still Prevail on Enterprise Mobile DevicesHealthcare Passcodes Most Enforced; Public Sector Passcodes Most Complex While there is no one-size-fits-all rule for passcode protection, IT can use several barometers for the proper approach in their industry. Healthcare, financial services and public sector organizations have some of the strictest audit requirements when it comes to data protection, with regulations like HIPAA, HITECH, FINRA and FISMA compliance constantly looming over their heads.
For the original version including any supplementary images or video, visit http://smallbusiness.yahoo.com/advisor/soft-passcodes-still-prevail-enterprise-mobile-devices-171130809.html

DigiPals Mobile Device Companions Selected for Walmart ‘Get On The Shelf’ Competition

The integrated solution is expected to be available later this year. “We have a responsibility to ensure all drivers and fleets are compliant, and it’s our goal to make compliance accessible, convenient and easy to use for everyone on the road,” said Jay Coughlan, chairman and chief executive officer of XRS Corporation. “Samsung Mobile and its devices are on the leading edge of this revolutionary movement, and we are proud to be working together to bring these best-in-class mobile solutions to market.” The Samsung Mobile devices will be equipped with Samsung for Enterprise (SAFE) enhanced security features, specifically configured to ensure every user’s mobile workforce has enterprise-focused IT policy controls, mobile device management protocols, virtual private network connectivity and on-device encryption. The Samsung Mobile SAFE program ensures enterprise mobile security for businesses, regulated and non-regulated industries. “Enterprise customers have increasingly unique requirements by line of business for both company owned and bring-your-own-device (BYOD) users,” said Tim Wagner, vice president and general manager, enterprise business unit — Samsung Mobile USA. “The onboard trucking solution to be provided by XRS and Samsung is a fantastic example of how we are working closely with our rapidly growing ecosystem of mobile solution providers to meet specific customer needs.” The new XRS mobile platform, which entered general release in March 2013, runs on more than 50 types of devices and automatically transmits vehicle and operator data directly to a management dashboard, preparing for compliance with the pending MAP-21 compliance mandate for recording hours-of-service. Nearly 90 percent of drivers already use mobile devices, meaning no additional hardware costs associated with the XRS platform. Furthermore, XRS Corporation has partnership agreements with several leading brands in mobile communications. “Our industry is just now starting to realize the incredible potential of mobile computing to improve the bottom line for fleets and drivers alike,” said Christian Schenk, senior vice president, product and market strategy for XRS. “With this new, integrated fleet solution, the entire trucking industry can rest assured that their drivers and operations staff will always be in communication, in compliance and in the process of delivering value to customers.” Samsung and SAFE are trademarks of Samsung Electronics Co., Ltd. Other company names, product names and marks mentioned herein are the property of their respective owners and may be trademarks or registered trademarks.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/xrs-samsung-mobile-join-forces-152522653.html

MSPs Must Monetize Mobile Device Management (MDM)

Deeper Details Lets first discuss a few facts about the marketplace. Most companies, especially in the midmarket, dont have many IT resources. In fact, the average midmarket firm has eight to 15 IT staff members, according to a study of Midmarket clients by the SMB Group . The study also found that 47 percent of midmarket companies say security is a top concern when deploying mobile and 90 percent of firms will support BYOD by 2014. What does this tell you? Theres an expanding pie and theres plenty of client demand for mobile device management to address application, network, and device security. So how do you make money? First step: get a Mobile Device Management tool to manage mobile devices like tablets, smartphones and laptops. Look for a solution with one User Interface to manage across all endpoints, from servers to smartphones. A suggestion is to download the free trial of IBM Endpoint Manager for Mobile Devices .
For the original version including any supplementary images or video, visit http://mspmentor.net/blog/msps-must-monetize-mobile-device-management-mdm

XRS and Samsung Mobile Join Forces to Bring Trucking Industry First Integrated http://sabotagetimes.com/reportage/tvs-best-alpha-males/ Solution for Compliance and Performance

Finance Wed, Aug 21, 2013, 10:23 PM EDT – U.S. Markets closed Free App Helps Secure iOS, Android Mobile Devices SecurityMetrics MobileScan ideal for users who store, process, transmit sensitive data Press Release: SecurityMetrics 4 hours ago Print SALT LAKE CITY, Aug. 21, 2013 /PRNewswire/ –Organizations that use mobile smartphones and tablets to process, transmit, or store sensitive data now have access to an app that helps users secure the private information that passes through their device: SecurityMetrics MobileScan. In seconds, the app identifies potential mobile security threats and directs user remediation by providing simple setting and device recommendations. (Logo: http://photos.prnewswire.com/prnh/20130125/MM48717LOGO ) MobileScan inspects for exploitable security vulnerabilities that cybercriminals could use to gain access to a device, such as non-updated operating systems, accessible application installation settings, invalid disk encryption, and exposed Wi-Fi. Entities that could benefit from scanning their devices for vulnerabilities include: Brick-and-Mortar Merchants that process credit cards via mobile point of sale (mPOS) devices Healthcare Organizations that schedule and store patient information Enterprise Businesses that wish to implement secure Bring Your Own Device (BYOD) policies Consumers who store any sensitive material on their personal phone “Mobile devices frequently store sensitive data such as credit card details, password hints, trade secrets and browsing history,” explained Brad Caldwell, CEO of SecurityMetrics.”With the rapid adoption of mobile devices, hackers are seeing the benefits of targeting these devices to extract our personal data.” SecurityMetrics MobileScan, powered by MokiMobility, is the first of its kind available on both Android’s Google Play and Apple’s App Store. For more information about MobileScan, visit http://www.securitymetrics.com/mobilescan or email mobilescan@securitymetrics.com . If your organization would like to offer SecurityMetrics MobileScan to customers, please call 801.995.6860. About SecurityMetrics ( http://www.securitymetrics.com ) SecurityMetrics assists in protecting electronic commerce and payments leaders, global acquirers, and their retail customers from security breaches and data theft. The company is a leading provider and innovator in data security, and has helped over 1 million organizations manage compliance and/or secure their network infrastructure, data communication, and other information assets. Founded in October 2000, SecurityMetrics is a privately held company headquartered in Orem, Utah, USA.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/free-app-helps-secure-ios-214500604.html

Soft Passcodes Still Prevail on Enterprise Mobile Devices

Soft Passcodes Still Prevail on Enterprise Mobile Devices image passcode blog august

The chip makers said they were interested in evaluating the tool. BDTI is not interested in establishing an industry-wide consortium around the benchmark, especially with competing parties having their own interests in mind. The company will welcome input on possible improvements, but it will make the final decision on whether to make changes. [Consortiums] tend to move slowly. … In the end they have a much lower chance of designing a valid benchmark because the people participating in the process are motivated by many factors, Bier said. Were not trying to make everyone happy. Were trying to make a benchmark. Bier is respected in the chip industry for his past work on benchmarks for embedded devices. But companies back benchmarks that make their products look good and analysts were skeptical about BDTIs chances of gaining industry-wide support.
For the original version including any supplementary images or video, visit http://www.pcworld.com/article/2047158/bdti-aims-to-stabilize-mobile-performance-and-battery-measures.html

eBay My Gadgets now open to all, shows you how much your tech items are worth (video)

Cat gadgets: Scratching solved. Vinyl caps render pointy claws harmless (Photos)

The average adult spends $746 on tech products, up 35% since 2012 Adults ages 25-34 show the most dramatic increase in purchases spending $1,171 on tech, which represents a 62% increase since 2012 And, worldwide spending on consumer gadgets is expected to reach $1.1 trillion in 2013 My Gadgets offers a personalized way to keep track your gadgets. The product contains thousands of gadgets, and it’s never been easier to view the total value of your tech collection. Items are organized by category to make adding new items to your collection fast and simple. My Gadgets makes selling tech on eBay even easier while helping to keep harmful e-waste out of landfills. By selecting the item you want to sell and clicking the “Sell Now” button, you can quickly create a listing to for your gadget using a streamlined listing tool and pre-populated product information. My Gadgets shares the average value of your item based on similar items bought and sold on eBay so you can make informed decisions when the timing is right. According to the U.S. Environmental Protection Agency (EPA), 2.4 million tons of electronic waste hit US landfills each year. Of that 2.4 million tons of e-waste, consumers threw away or recycled 142,000 computers and over 416,000 mobile devices every day!
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/14/ebay-my-gadgets/

Universal Gadgets Showcase New Tablets

They cost $12-$19 for 40 caps and are available on Amazon , eBay and elsewhere. I’m going to say right now that this is not a product for the faint of heart. While you’re sticking that protective cap on the first claw, your cat has 17 other claws and those claws are going to be expressing your cat’s thoughts more vividly than words could ever do. Oh, and cats don’t like having their claws messed with. So they keep the cat from scratching stuff. What if my stuff is already scratched up, can the caps do anything about that? Strictly speaking, no. However, you can find the caps in assortment of pink candy stripes and girly sparkles, so you can at least have a bit of a laugh. What if I don’t want to humiliate my cat?
For the original version including any supplementary images or video, visit http://www.examiner.com/article/cat-gadgets-scratching-solved-vinyl-caps-render-pointy-claws-harmless

Gadgets to Gift Cards program launched at Walmart

Walmart gadgets exchange Mcommerce

As the majority of industry experts are now expecting that the next iPhone is less than a month away from being released by Apple, Walmart is taking a preemptive step by introducing a Gadgets for Gift Cards program, in which customers can turn in their old devices in exchange for a gift card to be used in its stores. The trade in is not exclusive to smartphones, but also includes MP3 players, video games, and more. Other gadgets and electronics can be traded in for a gift card, including MP3 players, cameras, video games, computers, and other types of electronics, in addition to smartphones. The retailer has yet to make it entirely clear how much consumers will actually receive in the form of the gift card when they trade in their unwanted devices, but according to the company, receiving something is better than nothing, especially when it is in exchange for an item that is no longer wanted. Though this may not suggest that customers will receive the best price for their gadgets, they will have a gift card in seconds. This means that while the amount of the gift card may not be the best possible amount that a consumer could receive for his or her unwanted gadgets, it does suggest that in a http://www.askmen.com/money/career_400/471_are-you-an-alpha-male-or-a-bully.html matter of moments, he or she could divest him or herself of something they dont need and will have money to put toward anything else that they would like on the retail giants shelves. The gadget trade in process starts online, where the individual enters his or her device information and its condition. The website generates a code that can be used online or in-store at any of the American Walmart locations. From that point, the consumer will undergo a credit check. Once passed, he or she has ten days in which to send the unwanted item to Walmart.
For the original version including any supplementary images or video, visit http://www.qrcodepress.com/gadgets-to-gift-cards-program-launched-at-walmart/8522825/

eBay My Gadgets now open to all, shows you how much your tech items are worth

The companys flagship tablets are the new 16GB A20 7-10 models. Each features the impressive Allwinner A20 dual core processor, and run the immersive Android 4.2 Jellybean. With 16GB of memory available (which is expandable via microSD up to 32GB) theres plenty of room to download all your favourite apps from the Google Play Store. When coupled with their built-in microphone and speakers, the tablets dual camera makes it perfect for social apps, allowing you to effortlessly video chat with friends and family whilst on the go. With the school year due to begin next month, these tablets are perfect for all of those looking for affordable alternatives to the pricier models. They include many similar features to the high-end versions, at only a fraction of the price. The company also began selling new and used mobile phones earlier this year. They now boast an impressive selection of handsets, including many up-to-date smartphones. Customers can choose from multiple generations of iPhones, from the earlier 3G model to the latest 16GB iPhone 5. The incredibly popular Samsung Galaxy S4 is also now available, providing customers with access to the greatest models without the expensive price tag. A spokesperson for the company highlighted the variety of features available with the new tablet range: Were incredibly pleased to be able to offer such a broad range of electronics at such a great price.These Allwinner A20 tablets are the perfect alternative to heavy laptops.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/Universal-Gadgets-Showcase-New-Tablets-4743265.php

Gadgets Channel

Here are some key details GigaOM Gadgets Authority: 849 It was about a week ago when Bloomberg reported that Samsung was getting ready to launch its smart watch called Galaxy Gear . Since then we have been calling around and our sources have come back with enough details for us to give a reasonable… Recently linked to by The Guardian – guardian.co.uk / 15 hours ago Gold iPhone image created by Shop Le Monde As Apples September 10th event iPhone event approaches , weve learned some additional details and have independently heard some of the already-floating around information regarding the upcoming… Recently linked to by HackedTime / 7 hours ago The Verge Gadgets Authority: 907 Nokia is planning a big-screen Windows Phone for release later this year. Sources familiar with Nokia’s plans have revealed to The Verge that the company is currently testing a 6-inch device with the latest version of Windows Phone. Codenamed Bandit,… Recently linked to by TheBizTimes / 18 hours ago Apple iOS 7 beta 7 to be released today BGR Gadgets Authority: 864 With the world waiting for Apple’s upcoming iPhone event on September 10th, the company is busy behind the scenes and also publicly with developers trying to finalize iOS 7 , the mobile operating system that will soon power the iPhone, iPad and iPod… Recently linked to by Daily Mobile Blog / 1 day ago The Next Web Gadgets Authority: 855 Over the weekend, Yonhap News reported that Samsung is struggling in the Chinese market. Yes, struggling.
For the original version including any supplementary images or video, visit http://technorati.com/technology/gadgets/

Technology Sold Into the Wrong Hands

We are very proud of Brian and his volunteer service with ITA, and couldnt ask for a better individual to represent Avalara to this community, said Scott McFarlane, Founder and CEO at Avalara. We continue to value our involvement in ITA, both because of the way the organization helps shape and influence the accounting-reseller-vendor paradigm, and because of our shared belief in the ITA credo that knowledge increases in value when shared. We are confident that Brian will have a valuable impact over the next three years while serving on the Board, and were pleased as an organization to be more fully involved in ITA as it grows and continues to succeed in its core mission. ITA Board Members are elected based on their commitment and contributions to the organization and their ability to help the organization develop plans and initiatives to provide increased value to our membership, said Stan Mork, ITA President. Brian has demonstrated his commitment to the ITA through his past involvement in a variety of ITA initiatives and his passion for what our organization stands for. I look forward to working with Brian during his Board term. About Avalara Founded in 2004, Avalara pioneered a service-based platform for sales tax and compliance automation and has been recognized for years as one of Americas fastest growing technology firms. The companys cloud solutions help thousands of customers stay focused on their core businesses by providing automated end to end compliance services including sales and use tax calculation, exemption certificate management, filing and remittance, and a broad array of related services. Avalara built its technology platform and extensive user base using internal expertise and the strategic acquisition of industry leading organizations, technologies, and personnel. Operating behind the scenes via seamless integration with virtually any business management system, Avalara delivers fast, easy, accurate, and affordable solutions for companies of any size. On the international front, the company supports nearly countries in Europe, Asia, Latin America, and the Pacific Rim. It serves thousands of registered users globally and calculates VAT, sales and use taxes on one billion transactions annually. The company employs nearly 500 professionals at its headquarters on Bainbridge Island, WA and offices in Seattle WA; Irvine, San Diego and Rocklin, CA; Falls Church, VA; Raleigh, NC; Harrisburg, PA; and Pune, India.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/Information-Technology-Alliance-Appoints-4743502.php

Technology to save Bambi — and people

August 19, 2013 Democratic politics and capitalist economics will judge whether the efforts of the British Conservative Party and Tumblr to limit sexually explicit content online actually reflect the will of the people. Both have staked their position on popular acceptance of these policies, squaring up against Britain’s vanguard of privacy and free expression advocates. Those who oppose such initiatives can fight through popular opinion, the ballot box, courts, international organizations and economic patronage. If we fail to resist these encroachments, we will get the Internet we deserve. Britains most unsettling contribution to repression may be its tacit endorsement of crackdowns abroad, made possible by British companies. Internet filtering in any form is corrosive to expression, and the path that the British government and this American company have taken leads to dark places. However, there is no need for hyperbole. Neither is on par with the physical torture and repression of political participation that British companies have facilitated in Bahrain, Ethiopia, Vietnam, Turkmenistan, Syria, Iran and elsewhere. This is a meaningful distinction, and it denies other states and companies the pretext to justify brutal repression by saying Britain and Tumblr do it. Regardless of what misguided policies American executives and British politicians adopt, Western countries have a responsibility to ensure that companies within their borders do not facilitate repression abroad, including by selling surveillance and filtering technology like the HomeSafe system , which the prime minister has promoted as an ideal.
For the original version including any supplementary images or video, visit http://www.nytimes.com/roomfordebate/2013/08/19/can-free-speech-and-internet-filters-co-exist/censorship-technology-sold-into-the-wrong-hands

office. Photo: Liz Hafalia, The Chronicle Whistle employees Sonia Kastner (left) and Priya Hiremath work… Whistle CEO Ben Jacobs, above, tracks Duke’s morning activity via the circular device on Duke’s collar, top, which connects to an iPhone app. Photo: Liz Hafalia, The Chronicle Whistle CEO Ben Jacobs, above, tracks Duke’s morning activity via… Alley (center) lounges at the Whistle headquarters in S.F., makers of a device that allows users to monitor their pet’s activity. Photo: Liz Hafalia, The Chronicle Alley (center) lounges at the Whistle headquarters in S.F., makers… Whistle CEO Ben Jacobs, 26, brings his dog Duke to the office, where Alley is also a regular visitor. Photo: Liz Hafalia, The Chronicle Whistle CEO Ben Jacobs, 26, brings his dog Duke to the office,… Duke is wearing an accelerometer (circular device) on his collar at the Whistle office in San Francisco, Calif., on Tuesday, July 30, 2013. Whistle fits on any dog collar and connects to an iPhone app which lets dog owners know how many minutes their dog is walking, resting, or playing within time spans through the day.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/article/Using-technology-to-keep-Fido-fit-and-happy-4744755.php

Forward Technology Festival draws entrepreneurs to Madison

Respondents, which include 100 US-based senior executives from companies with annual revenues over $1 billion, say that social media, mobile and online marketing and cloud computing are creating new opportunities to engage with consumers and explore new business opportunities. The food and beverage industry is experiencing significant change, said Patrick Dolan, national line of business leader for consumer markets at KPMG LLP, in a press release . Technology is redefining how companies identify growth opportunities, operate their businesses, and manage risk and the companies that adopt and utilize these tools most effectively are positioned to capitalize on improving business conditions. KPMG 2013 Food and Beverage Outlook Survey Nearly two-thirds of executives say they have adopted or plan to adopt cloud technologies, with 44 percent saying it will dramatically shift their business model and 78 percent believing it will increase transparency.Interestingly, while cost reduction is a goal with cloud computing, the survey indicates that executives are equally, if not more, interested in technology adoption for strategic, transformation purposes. Executives are also increasingly recognizing the value of using data and analytics to improve decision making related to consumer insight, brand and product management and pricing. Despite this growing interest, however, 46 percent rate their data and analytics capabilities as average or below. KPMG 2013 Food and Beverage Outlook Survey In addition to technology adoption, the survey indicates that executives expect to grow their revenue over the next three years through product innovations (including healthier or functional foods), increased customer acquisition and alternative sales and distribution channels. More than half respondents also plan to increase their spending on things like business acquisitions (33 percent), facility expansion (31 percent), new product or service development (28 percent) and information technology (24 percent). By comparison, only 13 percent expect to increase revenue on business model transformation, 10 percent on R&D and 8 percent on sustainability initiatives.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/daniellegould/2013/08/16/technology-will-drive-food-industry-growth-finds-kpmg-survey/

Aecom Technology Larger Than S&P 500 Component J.C. Penney

It can also detect pedestrians, and it can distinguish between cars and other moving objects and deer to prevent false alarms. Unfortunately, it’s not programmed to see smaller animals like dogs and rabbits, so while it may save Bambi from injury, Thumper and friends aren’t likely to be so lucky. To witness the system in action, I drove up the stretch of Highway 138 north of Cornwall, Ontario, where the Rotalec design is being tested. The warning signs on this densely traveled route leading up to Ottawa were definitely noticeable from a driver’s perspective, while the posts with radar sensors, which are about half the height of a regular telephone pole, were relatively unobtrusive. On my drive, no deer or moose appeared to trigger the lights. It requires three radar-enabled stanchions to cover the roughly one and a quarter mile distance, costing a total of about $270,000 for the entire system, including solar panels, backup batteries and the network connection. Several municipalities are looking at possibly installing similar equipment in areas of Alberta, Newfoundland, and British Columbia, where deer and moose present a constant danger. At least one state in the Midwest is also looking at Rotalec’s project. Dickson says the equipment is also mobile, enabling communities to study particular neighborhoods and roads to pinpoint trouble spots where installing a permanent warning system would be most effective. It can also work in suburban areas where there’s been an increase in the deer population over the past few years. So far, during the first four months of the project in Ontario, there are have been no reported animal-car accidents.
For the original version including any supplementary images or video, visit http://www.foxnews.com/tech/2013/08/19/technology-to-save-bambi-and-people/

Technology Will Drive Food Industry Growth, Finds KPMG Survey

In its fourth year, the festival is on track to draw at least as many participants as the 2,000 who attended last year, said Forrest how to become an alpha male john alexander Woolworth, chief operating officer at Madison-based PerBlue . Woolworth is a co-founder of Capital Entrepreneurs , a Madison group whose members organize the festival. Members are encouraged to create events of their choosing, as long as they follow two criteria: They must be open to everyone and organizers must agree to cross-promote each others’ events. The festival started on Thursday and runs through Saturday at a variety of Madison area locations. “What’s important is that the Forward Technology Festival is really just a canvas and it’s up to the rest of the organizations to come together and paint the picture of this year’s festival the way they want to,” said Matt Younkle, founder of Murfie.com and a Capital Entrepreneurs co-founder. The format helps ensure that session topics are current and that new organizations have the chance to be involved, Younkle said. The festival attracts attendees from around the Midwest, and some have attracted international participants, Younkle said. The festival’s growth parallels the growth in the last few years of Madison’s entrepreneurial community, said Zach Brandon, president of the Greater Madison Chamber of Commerce. Capital Entrepreneurs has grown from a handful of members to at least 200.
For the original version including any supplementary images or video, visit http://www.jsonline.com/business/forward-technology-festival-draws-entrepreneurs-to-madison-b9978828z1-220292691.html

Using technology to keep Fido fit and happy

Duke is wearing an accelerometer (circular device) on his collar at the Whistle office in San Francisco, Calif., on Tuesday, July 30, 2013.   Whistle fits on any dog collar and connects to an iPhone app which lets dog owners know how many minutes their dog is walking, resting, or playing within time spans through the day. Photo: Liz Hafalia, The Chronicle

The most basic reason is that it gives a true comparison of the value attributed by the stock market to a given companys stock. Many beginning investors look at one stock trading at $10 and another trading at $20 and mistakenly think the latter company is worth twice as much that of course is a completely meaningless comparison without knowing how many shares of each company exist. But comparing market capitalization (factoring in those share counts) creates a true apples-to-apples comparison of the value of two stocks. In the case of Aecom Technology Corp ( NYSE: ACM ), the market cap is now $2.94B, versus J.C. Penney Co., Inc. ( NYSE: JCP ) at $2.91B. Special Offer: Try OLI Premium and get reports on Splits, Buybacks, and M&A daily Another reason market capitalization is important is where it places a company in terms of its size tier in relation to peers much like the way a mid-size sedan is typically compared to other mid-size sedans (and not SUVs). This can have a direct impact on which indices will include the stock, and which mutual funds and ETFs are willing to own the stock. For instance, a mutual fund that is focused solely on Large Cap stocks may for example only be interested in those companies sized $10 billion or larger.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/dividendchannel/2013/08/19/aecom-technology-larger-than-sp-500-component-j-c-penney/