App Helps Secure Mobile Devices, Reports Security Status To Processor

Federal CIOs Face BYOD, Mobile App Security Challenges

app security, mobile app security

28, 2013 /PRNewswire/ — Acquirers and ISOs now have a simple way to check merchants’ mobile processing security: SecurityMetrics MobileScan, an app created for merchants to identify potential security threats and protect devices through scanning and remediation. Through a quick mobile vulnerability scan, the app inspects many issues known to cause mobile insecurity such as a lack of password polices, Wi-Fi weaknesses, unauthorized peripherals, and known operating system vulnerabilities that may allow cybercriminals access to a merchant’s processing device. (Logo: http://photos.prnewswire.com/prnh/20130125/MM48717LOGO) More >> SecurityMetrics MobileScan includes acquirer/ISO access to a Merchant Compliance Console that aggregates mobile device compliance results, tracks when vulnerability scans have run, and reports each merchant’s mobile device scan status. The app was built based on a foundation of Payment Card Industry (PCI) Data Security Standard (DSS) requirements in order to help mobile Point-of-Sale (mPOS) merchants follow PCI mobile payment acceptance security best practices. “Though convenient, mobile processing increases liability for both merchants and processing parties,” said Wen Free, SecurityMetrics VP of Business Development. “It’s only a matter of time before hackers target insecure mobile devices for profitable payment card data.” SecurityMetrics MobileScan, powered by MokiMobility (mokimobility.com), is available today in both Android and iOS app stores. For more information on a MobileScan program for your merchants, or if you’re interested in referral program opportunities, please call 801-995-6860. About SecurityMetrics (www.securitymetrics.com) SecurityMetrics protects electronic commerce and payments leaders, global acquirers, and their retail customers from security breaches and data theft. The company is a leading provider and innovator in merchant data security, and as an Approved Scanning Vendor and Qualified Security Assessor, has helped over 1 million organizations manage PCI DSS compliance and/or secure their network infrastructure, data communication, and other information assets.
For the original version including any supplementary images or video, visit http://www.darkreading.com/mobile/app-helps-secure-mobile-devices-reports/240160556

This eliminates the need to drive to the post office. Secondly, ordering supplies has never been easier. Now I can order any size box or envelope that I need, and have it all dropped off at my house for FREE. This app makes it very fast to order new supplies! You can find the USPS app for Android HERE or iPHone HERE Buying Inventory: When I shop at Big Box stores like Target or Staples to find eBay inventory, there are many times that I find a great clearance deal that I can sell on eBay to make money. If I find an item at one Target, there is a good chance that they will have the same item on clearance at another Target, but I dont want to drive across town to only find out that they are out of stock. Now with my phone, I can easily find out if the item Im looking for is in stock. Its not an app, but I created a bookmark on my phone and set it on my home page. This website will check all Targets and Staples in your area and let you know if they have that specific item in stock. You can view this website HERE and save it as a bookmark on your phone.
For the original version including any supplementary images or video, visit http://www.examiner.com/article/selling-on-ebay-using-only-your-mobile-device

Broadcom adds WiFi Direct to its embedded device platform, furthers our internet-of-things future

27, 2013, 8:00 a.m. EDT ADP Mobile Solutions App Quickly Exceeds 300,000 Downloads On Android(TM) Devices Rapid Growth Driven by Increase in Workers Looking for Anytime, Anywhere Access to Payroll, Time and Benefits Information ROSELAND, N.J., Aug. 27, 2013 /PRNewswire via COMTEX/ — ADP, a leading global provider of Human Capital Management (HCM) solutions, today announced its ADP Mobile Solutions app on the Android(TM) operating system (OS) has passed 300,000 downloads since its April launch. The app is consistently listed in the Top Ten Free Business applications, with a strong 4 out of 5 star customer rating on Google Play. Available in over 37 countries, the ADP Mobile Solutions app has become increasingly popular as more and more employees seek easier access to the HR information they care about most and want to take action on quickly. The Android OS now powers approximately 80 percent of all smartphones worldwide, according to research firm International Data Corporation (IDC).1 With built-in security and convenience, the ADP Mobile Solutions app gives employees all the tools needed to access their HR information. A user can view pay statements and benefits information, input and track time and attendance, review Flexible Spending Accounts (FSA) and retirement account information and download and print W-2 forms right from a mobile device. “The ADP Mobile Solutions app is the easiest way for employees to access their payroll, time and benefits information at a moment’s notice no matter where they are in the world,” said Don Weinstein, senior vice president, product management at ADP. “Given the penetration of Android devices worldwide, it was critical for us to offer the app on this platform. The explosive growth in adoption proves this and we are constantly evaluating and adding functionality to the existing suite of features employees can take advantage of on their mobile devices.” Today, more than 46,000 ADP clients totaling more than 1.28 million employee users–ranging from employees at small businesses to global companies–are leveraging the ADP Mobile Solutions app across all smartphone operating systems. Employees can easily download the app in minutes, log in to access their HR information, and begin relying on it as an integral component of their work day, wherever that day takes them.
For the original version including any supplementary images or video, visit http://www.marketwatch.com/story/adp-mobile-solutions-app-quickly-exceeds-300000-downloads-on-androidtm-devices-2013-08-27

Selling On Ebay Using Only Your Mobile Device

E-cigs and cancer

“The value of a wearable device lies in its ability to connect to a smartphone or the Internet with minimal impact on battery life,” said Rahul Patel, Broadcom Vice President, Marketing, Wireless Connectivity Combos. “As the market gains momentum, Broadcom is actively widening business opportunities in this growing space by offering the breadth of IP and customized components that enable creative new smart wearable devices to be connected.” Broadcom’s WICED portfolio provides the foundation for embedding low power, high performance, interoperable wireless connectivity into these devices. Emerging segment leaders are currently designing health and wellness devices based on Broadcom WICED technology, including blood pressure monitors, glucometers, smart watches, fitness bracelets and more. By supporting Wi-Fi Direct, a specification that allows two devices to communicate with each other securely via Wi-Fi without an access point or computer, Broadcom is opening the doors to the development of new, innovative smart accessories, clothing and other wearable sensors. As wearable technology becomes more prominent, wireless connectivity technologies that enable these devices to connect to smartphones are key to unlocking their true potential. Specifically: Near Field Communication (NFC) enables a consumer to buy a new wearable device and simply tap it to their smartphone so the devices can start to communicate instantly and securely. No more complicated menus or arduous setup processes. Bluetooth Smart and Wi-Fi allow the consumer to collect data from their wearable device (i.e. calories burned, heart rate, etc.) and transfer it to their smartphone or into the cloud without draining the battery. Wi-Fi Direct allows a consumer to directly connect two Wi-Fi devices together without the need for an access point or computer. A wearable device combined with location technology allows for interesting new use cases such as doctors tracking patients in clinical environments or retailers sending targeted advertising to consumers.
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/27/broadcom-wiced-direct/

Global Mobile Device Management Enterprise Software Market 2012-2016

The initial challenge for federal IT managers evaluating BYOD policies was to ensure that their agency’s infrastructure was secure enough for new devices to enter the network and provide for central management, according to Tom Suder, president of the mobile services provider Mobilegov . With those policies in place, agencies have cleared the way for the development and adoption of innovative new applications that could boost productivity in a mobilized workforce. But those apps invite a host of new security challenges. [ 11 Time Management and Productivity Apps for Android ] Mobile Device Management vs. Mobile Application Security “I think we’re definitely in exciting times here. We’re actually talking about doing better work for the government. I think we’ve shifted the conversation from mobile device management (MDM) and getting people — you know, authorizing devices on the network. Even the DoD has authorized iOS and Android devices on their network in conjunction with an MDM,” Suder said during an online presentation yesterday. “And I think we’re really getting to the point now where we’re going to have these real good mission apps, doing-your-job kind of apps, and I think it’s going to, you know, increase efficiency and make people do their jobs better, but I do think that we need to balance that with security, and there hasn’t been too many enterprise mobility apps out there, so I think this is definitely an area we need to be paying attention to,” Suder said. [ 10 Mobile Device Management Apps to Take Charge of BYOD ] “There has been a gap on mobile application security,” he adds.
For the original version including any supplementary images or video, visit http://www.cio.com/article/738863/Federal_CIOs_Face_BYOD_Mobile_App_Security_Challenges

Chunky mobile devices? Soft graphene could help you downsize

Such possibilities may not be far off. Electrochemical capacitors, as an emerging type of advanced energy storage device, have attributes better than their conventional battery counterparts such as fast charging capability and almost unlimited lifespan. Today, in Science , my colleagues and I show how energy storage capacity of an electrochemical capacitor can be doubled by manipulating a single layer of carbon atoms known as graphene. Electrochemical capacitor evolution While we should be stunned by how far we’ve increased computing power in downsized space (the first computers filled entire rooms) the efficiency of an energy-storage device the amount of energy stored per unit volume needs to catch up. The idea of increasing this efficiency is to pack more active, energy-storing materials in the same amount of space. As simple as that sounds, it’s very difficult to do. One common material used in energy storage devices is porous carbon . Porous carbon is produced by riddling a base material, such as coconut shell, with small pores, increasing the base material’s surface area . The pores are important for capacitive energy storage as http://speedyplansindownloadfreepdf.blogspot.com/2013/07/how-to-become-alpha-male-john-alexander.html in general terms, more pores means larger surface area for physical adsorption, which in turn leads to higher storage capacity. Traditional porous carbon, once made, has a set volume with fixed pores randomly scattered inside and out. It isn’t really possible to readjust the structure and jam more porous carbon in the same amount of space without crumpling a fraction of the pores that are especially crucial for capacitive energy storage.
For the original version including any supplementary images or video, visit http://phys.org/news/2013-08-chunky-mobile-devices-soft-graphene.html

ADP® Mobile Solutions App Quickly Exceeds 300,000 Downloads On Android(TM) Devices

What are key market trends? What is driving this market? What are the challenges to market growth? Who are the key vendors in this market space? What are the market opportunities and threats faced by key vendors? What are the strengths and weaknesses of each of these key vendors? You can request one free hour of our analyst’s time when you purchase this market report. Details provided within the report. 01. Executive Summary 02.
For the original version including any supplementary images or video, visit http://www.sacbee.com/2013/08/26/5681536/global-mobile-device-management.html

Introducing the World Economic Forum’s Technology Pioneers 2014

Technology – a double-edged sword

For the other 35 Technology Pioneers, too — chosen for their potential to generate new opportunities and solutions — this is a question to tease the imagination. Imagine, for how to become an alpha male john alexander example, programming your immune system not to be set off by pollen, or peanuts, or a transplanted organ. Imagine there being no incentive to clear rainforests for tropical hardwood, because renewable softwood — treated with biowaste — is as beautiful, durable and affordable. Imagine being on a hiking vacation and never having to worry about your smartphone running out of battery, because you have not one but two ways to keep it powered: its touchscreen contains transparent photovoltaic cells, and your t-shirt can generate electricity from your body heat. Imagine an online world populated by websites that instantaneously construct themselves in response to what they know about you. For example, your phone knows that you’ve just passed security in the airport, and for which flight you just scanned a boarding pass, so the airline’s website shows you a personalized map to your gate. Growing personalization is one of the trends represented by this year’s 36 Technology Pioneer companies , and the much larger pool of nominees from which they were selected by a committee comprising top technology and innovation experts, academics and venture capitalists. Other trends include tools to make collaboration easier; a revolution in education; breakthroughs in robotics and smarter products and services — such as tiny, edible tags that act like barcodes woven into the fabric of products. This year’s Technology Pioneers include no-brainer solutions that are both greener and cheaper — such as a more efficient way for air conditioning systems to dehumidify air. They include companies focused on bringing products and services to developing and emerging markets, from affordable prosthetic knees to solar-powered electricity and financial services using credit ratings based on social media connections. In the health sector, a range of Technology Pioneers are promising breakthroughs in the diagnosis and treatment of disease.
For the original version including any supplementary images or video, visit http://www.huffingtonpost.com/silvia-von-gunten/technology-pioneers-2014_b_3819390.html

Technology poised to revolutionize education

The shunt tubes enable the Alternate Path packing operation to continue when sand prematurely blocks the well annulus, which would stop a conventional packing operation. The shunt tubes divert the gravel slurry around sand blockages and through distributed portholes to fill voids in the annulus until a complete pack is in place. Alternate Path technology is one of several sand control completion technologies developed by ExxonMobil to increase reliability and production uptime and improve economics of high-cost production wells, said Sara N. Ortwein, president of ExxonMobil Upstream Research Company. ExxonMobil is pleased to work with Weatherford to deploy this key technology in our operations. The Alternate Path license allows Weatherford to produce and deploy Alternate Path technology for ExxonMobil affiliates around the world and for ventures in which ExxonMobil participates. Alternate Path technology is a reliable technique to ensure a complete gravel pack is in place for sand control, said Mark Hopmann, vice president, well completion technologies for Weatherford. Alternate Path is field proven for long-interval and horizontal wells. About ExxonMobil Upstream Research Company ExxonMobil Upstream Research Company is the upstream research affiliate of Exxon Mobil Corporation ( XOM ), a leading global oil, natural gas, and petrochemicals company with operations in nearly 200 countries and territories worldwide. ExxonMobil Upstream Research Company is charged with developing an industry-leading array of proprietary technologies that support the Corporation’s continued leadership position in exploration, development, production and gas commercialization. About Weatherford International Ltd. Weatherford (NYSE/Euronext Paris/SIX:WFT) is a Swiss-based, multinational oilfield service company. It is one of the largest global providers of innovative mechanical solutions, technology and services for the drilling and production sectors of the oil and gas industry.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/exxonmobil-awards-alternate-path-technology-150000760.html

Pentagon, United Technology agree on F-35 engines

The number of shares short is then compared to the average daily volume, in order to calculate the total number of trading days it would take to close out all of the open short positions if every share traded represented a short position being closed. Click here to find out The 25 Most Shorted Nasdaq 100 Stocks In our new rank based on the most recent short interest data from NASDAQ, Linear Technology Corp. ( NASD: LLTC ) has taken over the position of #24 most shorted Nasdaq 100 component, from Akamai Technologies Inc ( NASD: AKAM ) which is now in the #8 spot. The days to cover at 08/15/2013 was 5.01 for LLTC, and 9.74 for AKAM; this compares to the average across all Nasdaq 100 components of 4.27 (up from the average back on the 07/31/2013 settlement date of 4.03). The chart below shows the movement over time of the days to cover values of both LLTC and AKAM, versus the average Nasdaq 100 component. Below is a chart showing the relative positions of LLTC versus AKAM over time within the 100 Nasdaq 100 components, with #1 representing the component with the highest days to cover value (most heavily shorted) and #100 representing the component with the lowest days to cover value (least heavily shorted): A stock with a high days to cover value compared to its peers would be considered to have a higher level of short interest as compared to those peers. This could mean short sellers are using the stock to hedge a long bet elsewhere, or could also mean that short sellers believe the price of the stock will decline. When short sellers eventually cover their positions, by definition there must be buying activity because a share that is currently sold short must be purchased to be covered. So investors tend to keep an eye on that days to cover metric, because a high value could predict a sharper price increase should the company put out some unexpectedly good news short sellers might rush to cover positions, and if the days to cover number is high, it is more difficult to close those positions without sending the stock higher until the higher price produces enough sellers to generate the necessary volume. Below is a three month price history chart comparing the stock performance of LLTC vs.
For the original version including any supplementary images or video, visit http://www.forbes.com/sites/dividendchannel/2013/08/27/linear-technology-becomes-24-most-shorted-nasdaq-100-component-replacing-akamai-technologies/

ExxonMobil Awards Alternate Path Technology License to Weatherford

It allows teachers to become more effective individual coaches for students. Using such technology, teachers can now engage their students in a more personalized, individual manner rather than the traditional, one-size-fits-all approach. Such technology is not simply a theoretical exercise. There are a host of real world examples of innovative educators and schools employing such technology to improve education for students. One of the best known is the Khan Academy in the United States. Students using this system review lessons and material through online videos outside of the classroom and then engage with teachers on the materials in the classroom. This approach is meant to focus in-class time on areas where students need assistance. The use of this technology is likely to expand in the U.S. as the Bill and Melinda Gates Foundation has announced tens of millions of dollars in grants to support similar technologies across the United States.
For the original version including any supplementary images or video, visit http://www.vancouversun.com/opinion/op-ed/Technology+poised+revolutionize+education/8840364/story.html

Linear Technology Becomes #24 Most Shorted Nasdaq 100 Component, Replacing Akamai Technologies

Loading+chart+©+2013+TickerTech.com

In its broadest sense, technology has totally transformed the way that our children view life. A recent study by Common Sense Media for children age eight or younger found that 72 percent have computer access at home. Television use is almost universal, with 98 percent of children in this age group having at least one at home and 10 percent reporting that theirs is kept on all the time. While television consumption by children is nothing new, programs targeted toward toddlers and even infants are on the rise. Consider cable and satellite television staple Baby First TV. The channel plays continuous programming aimed at infants and toddlers that is commercial free. I bring this up not to spark a debate about whether this type of television viewing is helpful or hurtful to developing youngsters; I mention it as an example of just how ingrained screen culture has become in the lives of our kids. The journal Pediatrics found that between the ages of birth and six, kids watch an hour-and-a-half television per day. These measurements do not even address indirect exposure, which puts the amount of time a television plays in the background at four hours per day for kids under the age of two. Love it or hate it, screen culture is a foundational element of the contemporary American childhood.
For the original version including any supplementary images or video, visit http://www.huffingtonpost.com/matthew-lynch-edd/k-12-technology-benefits_b_3820538.html

Adept Technology Reports Fiscal Year 2013 Fourth Quarter and Year-End Results

Its incredibly difficult in an economical and efficient way to get the products to market because the logistical systems that have developed favor bigger and more streamlined [operations], said Gabriella Petrick, a George Mason University professor who studies the evolution of food production and human taste. Its really hard to do and make a living out of. From the farm For Terrell, signing up for South Mountain Creamerys delivery service was initially a pragmatic decision: With three milk-guzzling kids, lugging three gallons of milk from the grocery store each week got cumbersome. Those children are now teenagers, and the family refrigerator is stocked with more than just locally produced milk. Terrell has expanded her weekly shipments over the years to include cream, yogurt, eggs, vegetables and treats for the family pooch. Unquestionably the convenience of someone bringing me fresh, locally made milk and dairy products makes total sense to me from a culinary perspective, a convenience perspective and an environmental perspective, Terrell said. Its a service that some urban dwellers would be stunned to hear still exists. Of course there are grocery store delivery services, such as Peapod, that shuttle food from big chains. There are occasional farmers markets where you can pick fruits and vegetables straight from a merchants cart. But to produce and deliver local products at scale, South Mountain Creamery has had to invest in new technology over the years.
For the original version including any supplementary images or video, visit http://www.washingtonpost.com/business/capitalbusiness/technology-ushers-locally-produced-milk-food-from-the-farm-to-the-table/2013/08/25/688d54b8-0545-11e3-a07f-49ddc7417125_story.html

K-12 Technology: Benefits and Drawbacks

Before Obama [2 volumes]: A Reappraisal of Black Reconstruction Era Politicians

According to a story on the Cambodia Heralds website, young Cambodians have recently discovered phone sex. Lita, a 20-year-old university student in Phnom Penh, says she used to have phone sex with her boyfriend. Honestly, I wanted to have sex like other people but didnt dare to because its not Khmer tradition, Lita said. Sex before marriage causes many problems including health problems and uncertainties about getting married later so phone sex is the best choice. Not only does it provide sexual pleasure but it also lets me keep my virginity. Phone sex should be done in a quiet place where no one can disturb us, see our naked bodies and sexual behaviour or hear us moaning, she said. Were free to do whatever we want to do with our partners as if we were doing it directly. Raksmey suggested that Ministry of Information should control on the technologies sector and create laws to prevent using technology to harm social norms. Minister of Information Khieu Kanharith could not be reached for comment, but earlier this month he told The Phnom Penh Post that it would be completely crazy if we controlled the internet. Government intervention in cyberspace was something people had suggested to the minister in the wake of torrents of abuse and digitally altered photos of political figures, including himself, Kanharith added. Kong Sam Art, a mother, told Lift that she lacks the technological know-how to properly educate her children on the dangers of social media. I feel frightened since I always see my children use the phone and iPad every day.
For the original version including any supplementary images or video, visit http://www.phnompenhpost.com/lift/technology-%E2%80%93-double-edged-sword

Technology ushers locally produced milk, food from the farm to the table

All trade names are either trademarks or registered trademarks of their respective holders. Use of Non-GAAP Financial Information In addition to presenting GAAP income (loss), we present non-GAAP adjusted EBITDA (loss), which we define as earnings before interest expense, income taxes, depreciation and amortization, intangibles and goodwill impairment, merger and acquisition related expenses, stock compensation expense, and restructuring charges as a relevant measure of performance approximating operating cash flow, a metric commonly used among technology companies. We believe that this provides meaningful supplemental information to our investors regarding our ongoing operating performance. Adjusted EBITDA (loss) should be considered in addition to, and not as a substitute for, GAAP measures of financial performance. For more information on our adjusted EBITDA (loss) please see the table captioned “Reconciliation of GAAP net income (loss) to Adjusted EBITDA (loss)” below. While we believe that adjusted EBITDA (loss) is useful as described above, it is incomplete and should not be used to evaluate the full performance of the Company or its prospects. Although historically infrequent, unpredictable and significantly variable and thus included in this adjustment, mergers and acquisitions expenses may occur in the future if additional acquisitions are pursued. Further, while we have incurred restructuring expense in the past, this is not a routine aspect of our operating activities and varies in amount and effect. Additionally, stock-based compensation has been, and will continue to be, a recurring expense as an important incentive component of employee compensation.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/adept-technology-reports-fiscal-2013-220134698.html

Using technology to improve government’s interaction with the public

The two orders will be negotiated together. He said the company planned to submit its proposal for those engines by the end of September, including further cost reductions that reflect increasing economies of scale. “We’re starting to see production increase, and you can see some of the benefits of that,” Flynn told Reuters in a telephone interview. He noted that Pratt had already reduced the cost of producing the engines by more than 40 percent since the first engines it built for the program. “We anticipate continued price reductions, as long as we’re able to keep the volume in place,” Flynn said. He said Pratt was in talks with the Pentagon about accelerating moves to fixed-price terms for operations and maintenance of the engines under a performance-based logistics contract, which he said could generate additional savings. The Pentagon’s F-35 program office agreed in late July on the terms of a contract for the sixth and seventh orders of F-35s with Lockheed Martin, which builds the jets. The government buys the engines from Pratt & Whitney and then provides them to Lockheed. Pratt is the sole producer of F135 engines for the radar-evading plane.
For the original version including any supplementary images or video, visit http://www.reuters.com/article/2013/08/27/us-usa-military-unitedtechnologies-idUSBRE97Q0KX20130827

Links and information on the portals frequently asked questions page help answer the top 10 questions from the public, such as how small businesses can find resources, how to look for a job and how to get or replace a Social Security card. USA.gov continues to innovate by providing key content and showcasing a new face of government to the world, said Dan Chenok, director of the IBM Center for the Business of Government. Under Dorris leadership, GSA created Challenge.gov, providing a kind of competitions central. It is a way to unearth innovation and new thinking from people you cant normally get in touch with or dont have access to through the normal contracting process, said Dorris. It also is a method for getting low-cost assistance for agencies marketing and outreach efforts. For example, the recent Federal Trade Commission plan designed to block illegal robocalls came from Challenge.gov. Through another challenge, the Department of Agriculture awarded $60,000 for ideas to keep kids healthy, challenging software developers, game designers, students and others to create tools and games that encourage children to eat better and stay physically active. The first place winner, an interactive computer game called Pick Chow, helps parents and children learn about healthy meals as they drag and drop food onto a virtual plate and get rated on their choices. About 50 agencies have taken advantage of the site, leading to more than 200 challenges. Martha recruits a great team so we can take on these great ideas like Challenge.gov, which is a tremendous way to engage the broader citizenry, said Tangherlini.
For the original version including any supplementary images or video, visit http://www.washingtonpost.com/politics/federal_government/using-technology-to-improve-governments-interaction-with-the-public/2013/08/26/4e977b0e-0ea2-11e3-8cdd-bcdc09410972_story.html

Amkor Technology to Present at Upcoming Conferences

Introducing the World Economic Forum’s Technology Pioneers 2014

27, 2013 /PRNewswire-USNewswire/ — Technology companies and organizations across the country are taking advantage of the August Congressional recess to urge lawmakers to support immigration reform when they return to the nation’s capital next month. The nationwide effort to build support for immigration reform, particularly as it relates to high-skilled immigration reform and new visas for STEM advanced degree graduates, is spearheaded by TechVoice, TECNA and CompTIA. “Today’s immigration system needs to be updated to accommodate for an ever-changing economy and hypercompetitive global marketplace,” said Maxine Baller, president and CEO, New Jersey Technology Council. “By doing nothing, we are in danger of threatening our future productivity, ingenuity, and the competitiveness of key sectors of our economy, including technology.” By the end of the August recess, 14 state-based tech organizations will have held at least 35 meetings and roundtables with their representatives both Democrats and Republicans to encourage their support for a balanced, workable immigration system. More than 136 companies are participating in this effort from Arizona, Colorado, Connecticut, Georgia, Idaho, Illinois, New Jersey, New York, North Carolina, Ohio, Rhode Island, Utah and Washington. “Although our concerns lie in the high-skilled realm, we support comprehensive reform, either as one large package or through piece-meal legislation that is put together down the road,” said Steve Zylstra, chairman of TECNA and president of the Arizona Technology Council. “We encourage the House and Senate to work together to iron out their differences in content and approach and to come up with a solution that helps us drive innovation, build our local economies and move forward in this 21st century.” “We can build a long-term pipeline of American workers for science, technology, engineering and math ( STEM ) related jobs jobs that are critical to America’s economic growth,” said Todd Thibodeaux, president and CEO of CompTIA. “Many of CompTIA’s members are small and medium-sized technology firms that benefit from a strong pipeline of talent throughout the industry.” About TechVoice TechVoice is a partnership of the Computing Technology Industry Association (CompTIA), the Technology Councils of North America ( TECNA ), and participating regional technology associations. Collectively, TechVoice represents thousands of technology companies across the country employing millions of workers. TechVoice is dedicated to empowering and mobilizing the grassroots tech community to impact legislative and regulatory issues important to growth, innovation and job creation. For more information, visit http://www.techvoice.org . About TECNA TECNA serves its members and the industry through its strong peer-to-peer network and its regional initiatives to raise the visibility and viability of the technology industry. TECNA represents almost 50 IT and Technology trade organizations that, in turn, represent more than 16,000 technology-related companies in North America. Visit http://www.technologycouncils.org to learn more.
For the original version including any supplementary images or video, visit http://money.msn.com/business-news/article.aspx?feed=PR&Date=20130827&ID=16844554

American Technology Services Recognized by Inc. 500|5000 for the Fourth Consecutive Year

Finance Tue, Aug 27, 2013, 7:12 PM EDT – U.S. Markets closed Amkor Technology to Present at Upcoming Conferences Press Release: Amkor Technology, Inc. 5 hours ago CHANDLER, Ariz.–(BUSINESS WIRE)– Amkor Technology, Inc. ( AMKR ) today announced that it will participate in the following investor conferences: Citis 2013 Global Technology Conference on Wednesday, September 4, 2013. Amkors presentation will occur at 10:30 am Eastern Time (7:30 am Pacific Time) at the Hilton New York Hotel in New York, NY. Deutsche Banks 2013 Technology Conference on Tuesday, September 10, 2013. Amkors presentation will occur at 5:30 pm Pacific Time (8:30 pm Eastern Time) at The Cosmopolitan of Las Vegas Hotel in Las Vegas, NV. Audio-only webcasts of the presentations will be made available, both live and by replay, on the Investor Relations section of Amkors website. About Amkor Amkor is a leading provider of semiconductor packaging and test services to semiconductor companies and electronics OEMs. More information on Amkor is available from the company’s SEC filings and on Amkor’s website: http://www.amkor.com . Contact:
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/amkor-technology-present-upcoming-conferences-171500378.html

Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 6,000,000 today. For more information, visit http://www.inc.com . Media Contact: Deepika Kumar, American Technology Services, Inc. (ATS), 703.876.0300, press@networkATS.com News distributed by PR Newswire iReach: https://ireach.prnewswire.com @yahoofinance on Twitter, become a fan on Facebook Related Content Chart Your most recently viewed tickers will automatically show up here if you type a ticker in the “Enter symbol/company” at the bottom of this module. You need to enable your browser cookies to view your most recent quotes. Search for share prices Reuters Lawrence Summers may be a poster-child for the lucrative revolving door between Wall Street and Washington, but Copyright/IP Policy Quotes are real-time for NASDAQ, NYSE, and NYSEAmex when available. See also delay times for other exchanges . Quotes and other information supplied by independent providers identified on the Yahoo! Finance partner page .
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/american-technology-services-recognized-inc-221800611.html

By Ki Mae Heussner August 26, 2013: 06:34 PM ET ( gigaom.com ) — Baby Boomers may be stepping up now to care for aging parents, but when theyre the ones who need the help, there might not be enough people to provide it. According to a report released Monday from the AARP Public Policy Institute, over the next 20 years, as boomers get into their 80s, the number of potential caregivers will drop dramatically. In 2010, there were 7.2 possible caregivers (people aged 45 to 64 years old) for every person over the age of 80. By 2030, the AARP projects that ratio will fall to four to one and, by 2050, they expect it to reach less than three to one. Subscribe to gigaom.com Sure, the Kurzweilians among us might argue that the approaching Singularity and the melding of machine and man could make caregivers less necessary. But experts predict that a dearth of family caregivers will result in higher costs for society, as people become more likely to land in nursing homes and other institutions. Its a wake-up call for aging boomers, said Lynn Feinberg, a senior strategic policy adviser at the AARP Public Policy Institute and an author of the report, told the Washington Post . Were really moving toward an uncertain future as . .
For the original version including any supplementary images or video, visit http://money.cnn.com/news/newsfeeds/gigaom/articles/2013_08_26_can_technology_close_the_care_gap_for_baby_boomers.html

Sounding Off: Is using technology in the classroom beneficial?

SoI dont believe they add valuecomparable to the opportunity cost. Lee Swann, Irving: I have a grandson who just graduated from Nimitz High School. He used the laptop he was assigned, but there are some serious problems with the current program. All students must pay a non-refundable $40 fee, which is supposed to cover any necessary repairs or replacement costs. However, this is not the case. Very few teenagers have the necessary responsibilities required to keep laptops out of harms way. Also, after freshman year, students are required to purchase a backpack specifically designed for the laptop. If the student is lucky, they may acquire one from a departing senior. This can present a financial burden for some disadvantaged students, of which Irving has many. I am OK with students having access to technology for assignments and homework as required by instructors; I have a problem with therequired money from the students and family. Bill Lee, Euless: If schools are waiting until high school to provide computers and iPads, they are waiting too long.
For the original version including any supplementary images or video, visit http://www.dallasnews.com/news/community-news/irving/headlines/20130825-sounding-off-is-using-technology-in-the-classroom-beneficial.ece

Can technology close the care gap for Baby Boomers?

Growing personalization is one of the trends represented by this year’s 36 Technology Pioneer companies , and the much larger pool of nominees from which they were selected by a committee comprising top technology and innovation experts, academics and venture capitalists. Other trends include tools to make collaboration easier; a revolution in education; breakthroughs in robotics and smarter products and services — such as tiny, edible tags that act like barcodes woven into the fabric of products. This year’s Technology Pioneers include no-brainer solutions that are both greener and cheaper — such as a more efficient way for air conditioning systems to dehumidify air. They include companies focused on bringing products and services to developing and emerging markets, from affordable prosthetic knees to solar-powered electricity and financial services using credit ratings based on social media connections. In the health sector, a range of Technology Pioneers are promising breakthroughs in the diagnosis and treatment of disease. Imagine being able to screen for cancer with a routine blood test, and receive a report on the precise genetic profile of your cancer which points you towards how to become an alpha male john alexander targeted therapies. Imagine cancer treatment that is more effective and with fewer side-effects – because it involves directly rewiring the cancer cells’ DNA, or starving them of an enzyme they need to survive, or using nanoparticles to deliver drugs directly to the tumour. With many of these technologies, we are not there yet. But the Technology Pioneers report has historically been a fertile hunting ground for solutions that can also have an impact in other fields. Technology Pioneers from previous years include the likes of Google and Twitter, long before they were household names.
For the original version including any supplementary images or video, visit http://www.huffingtonpost.com/silvia-von-gunten/technology-pioneers-2014_b_3819390.html

IT’S OFFICIAL: The Debt Ceiling Will Hit In Mid-October

back to the future galssesShare on Tumblr
Treasury Secretary Jack Lew said in a letter to Congressional leaders on Monday that the nation will hit its borrowing limit in mid-October, giving Congress a clear deadline for raising the debt ceiling. 
The new timeline will ramp up pressure on Congress to raise the debt ceiling, as it comes somewhat sooner than most analysts had anticipated. The new deadline will come just a handful of weeks after lawmakers have to pass a continuing-resolution bill that will keep the government funded past Sept. 30. 
Lew sent the letter to House Speaker John Boehner, House Minority Leader Nancy Pelosi, Senate Minority Leader Mitch McConnell, and Senate Majority Leader Harry Reid. In it, Lew warned of “irreparable harm to the American economy if Congress does not act.”
Meanwhile, White House Press Secretary Jay Carney repeated a familiar line on Monday — that President Barack Obama won’t negotiate over raising the debt ceiling. In exchange for a hike in the debt ceiling, some Republicans are demanding new, significant spending cuts — and some want to delay or defund parts of the Affordable Care Act.
“We will not negotiate with Republicans in Congress over Congress’ responsibility to pay the bills Congress has racked up,” Carney said on Monday.

For the original version including any supplementary images or video, visit http://www.businessinsider.com/debt-ceiling-deadline-october-boehner-obama-deficit-shutdown-2013-8

eBay My Gadgets now open to all, shows you how much your tech items are worth (video)

Surf report: Tech gadgets for one last summer hike

gregory

How it works: Add Your Items: My Gadgets has information on thousands of tech items; users can type their gadget into the search bar or browse through featured categories to add to their collections. See The Value: My Gadgets calculates the current value of your item(s) based on unique eBay data on sales trends and average selling price information from recent sales. Sell it With Ease: My Gadgets makes selling your electronics items on eBay easier than ever; quickly create an eBay listing from within your My Gadget collection using a streamlined listing tool, pre-populated product information, and current sales trends to help determine a fair price. Highlights/Key Facts: Background and Insights According to the Consumer Electronics Association, Americans own approximately 24 electronic products per household and spending is on the rise! The average adult spends $746 on tech products, up 35% since 2012 Adults ages 25-34 show the most dramatic increase in purchases spending $1,171 on tech, which represents a 62% increase since 2012 And, worldwide spending on consumer gadgets is expected to reach $1.1 trillion in 2013 My Gadgets offers a personalized way to keep track your gadgets. The product contains thousands of gadgets, and it’s never been easier to view the total value of your tech collection. Items are organized by category to make adding new items to your collection fast and simple. My Gadgets makes selling tech on eBay even easier while helping to keep harmful e-waste out of landfills. By selecting the item you want to sell and clicking the “Sell Now” button, you can quickly create a listing to for your gadget using a streamlined listing tool and pre-populated product information. My Gadgets shares the average value of your item based on similar items bought and sold on eBay so you can make informed decisions when the timing is right. According to the U.S.
For the original version including any supplementary images or video, visit http://www.engadget.com/2013/08/14/ebay-my-gadgets/

An Education In Back-To-School Gadgets

If youre not into this look, save the 25 bucks. The telephoto lens doubles the length of the iPhone lens, which is pretty cool since Im usually running forward to get better framing. It alleviates having to crop and resize images, maintaining the larger file size that an iPhone 5 offers. This is a nice addition to the iPhone gizmos in your pocket. Ease of use: The lenses attach to the phone via a magnet in the lens itself. Several self-adhesive washers come with each lens for multiple applications. Applying one of the washers to the back of your camera is a breeze; be sure to leave it on for at least 30 minutes before use (as recommended). I put one on and immediately started shooting: Plop the lens fell off. After the allotted waiting time, the lens attaches to the washer magnetically. Easy breezy.
For the original version including any supplementary images or video, visit http://www.washingtonpost.com/lifestyle/travel/sample-it-new-gadgets-to-boost-your-iphone-camera/2013/08/22/552e0ee8-0aa5-11e3-8974-f97ab3b3c677_story.html

Sample It: New gadgets to boost your iPhone camera

As a result of new security measures, no outside electronic gadgets, including FM radios, will be allowed in the temple premises at all times, the Dalai Lamas office said. The hilltop Tsuglagkhang temple is close to the official palace of the Dalai Lama. Security has beefed at Buddhist monasteries across Himachal Pradesh since the serial bomb blasts at the Mahabodhi temple complex in Bihar last month. Superintendent of Police Balbir Thakur told IANS that some loopholes were found in the security of the Dalai Lama and the 17th Karmapa, Ogyen Trinley Dorje, who also resides here. These loopholes have been plugged, the officer said. The Dalai Lama lives in exile along with some 140,000 Tibetans, over 100,000 of them in India. The Tibetan exile administration is based in this northern Indian hill town. It is not recognised by any country. ALSO SEE
For the original version including any supplementary images or video, visit http://www.firstpost.com/fwire/electronic-gadgets-banned-in-dalai-lama-gatherings-1057623.html

Universal Gadgets Showcase New Tablets

But for Man vs. Wild star Bear Grylls, a more logical partnership is Gerber Gear, best known for its knives and survival tools. For those situations when you have to rely on your wits, the Bear Grylls Survival Hatchet ($48) features a 3.5-inch stainless-steel blade. At 1.4 pounds, this compact hatchet might require some more effort and a few extra swings, but it is equipped to split logs, construct shelter and build a campfire. Adding to its sturdiness is the full-tang construction where the steel of the blade extends to the length of the handle. The non-sharpened back of the blade can also be used to strike surfaces, such as driving tent stakes into the ground. To keep your belongings (as well as your fingers) safe, the hatchet includes a military-grade nylon sheath that conveniently enough features loops to strap onto your belt. The hatchet comes with a waterproof pocket guide featuring some of Bear’s mantras and advice for survival, detailing how to build a shelter for different scenarios (including a snow pit), start a fire depending on resources available (for those common instances where you’re in the backcountry with a car battery), signal for help, find and purify water, and build snares to catch food. Even if you heed Bear’s advice, don’t assume you can parachute to a remote location with nothing more than his hatchet and survival cheat sheet. You won’t have a camera crew or backup plan, only a recipe for disaster.
For the original version including any supplementary images or video, visit http://www.usatoday.com/story/tech/columnist/2013/08/17/summer-hike-garmin-oregon-bear-grylls-hatchet-binoculars/2648583/

Seven, Nine plan Netflix rival

This hasn’t escaped the attention of Australia’s free-to-air networks, with Seven and Nine reportedly contemplating a joint subscription video service as a preemptive strike against Netflix coming to Australia, according to the Australian Financial Review . Of course the proof will be in the pudding and there’s still plenty of time for them to screw it up by charging too much, offering too little, butchering TV shows with ill-timed advertisements and crippling the whole thing with overly intrusive digital rights management. They’ll also be hampered by the same regional rights agreements which make it hard for all Australian video services to compete with their US rivals. A joint Australian Catch Up TV service will be hamstrung by local broadcast schedules and Foxtel’s aggressive approach to locking away content. Popular shows likeBreaking Badand Game of Thronesare what we’re interested in, if BitTorrent traffic is any indication, but they either aren’t on Australian free-to-air TV or they’re running several years behind. Seven and Nine will struggle to get people to hand over their money for the likes of Home & Away.Even if Netflix launched in Australia it couldn’t replicate its US service — we’d pay more and get less. Even if they can overcome these hurdles, Seven and Nine won’t win Australians back from Netflix until they acknowledge that it was their bastardry which drove us to Netflix in the first place. They’ve treated us with contempt for decades by starting shows late, cramming in too many ads, dropping in last-minute schedule changes and generally doing everything they can to make life difficult for viewers. If they take the same arrogant attitude into their online venture then it’s doomed to failure before it even gets off the ground. It’s hard to see how any legitimate Australian service from Seven and Nine could really offer a serious alternative to Netflix and Hulu.
For the original version including any supplementary images or video, visit http://www.smh.com.au/digital-life/computers/blogs/gadgets-on-the-go/seven-nine-plan-netflix-rival-20130826-2sl59.html

eBay My Gadgets now open to all, shows you how much your tech items are worth

The companys flagship tablets are the new 16GB A20 7-10 models. Each features the impressive Allwinner A20 dual core processor, and run the immersive Android 4.2 Jellybean. With 16GB of memory available (which is expandable via microSD up to 32GB) theres plenty of room to download all your favourite apps from the Google Play Store. When coupled with their built-in microphone and speakers, the tablets dual camera makes it perfect for social apps, allowing you to effortlessly video chat with friends and family whilst on the go. With the school year due to begin next month, these tablets are perfect for all of those looking for affordable alternatives to the pricier models. They include many similar features to the high-end versions, at only a fraction of the price. The company also began selling new and used mobile phones earlier this year. They now boast an impressive selection of handsets, including many up-to-date smartphones. Customers can choose from multiple generations of iPhones, from the earlier 3G model to the latest 16GB iPhone 5. The incredibly popular Samsung Galaxy S4 is also now available, providing customers with how to become an alpha male john alexander access to the greatest models without the expensive price tag. A spokesperson for the company highlighted the variety of features available with the new tablet range: Were incredibly pleased to be able to offer such a broad range of electronics at such a great price.These Allwinner A20 tablets are the perfect alternative to heavy laptops.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/Universal-Gadgets-Showcase-New-Tablets-4743265.php

Electronic gadgets banned in Dalai Lama gatherings

Billions of needless devices are manufactured and discarded every year. Also, when a mobile phone is fully charged, or when the phone is removed from the charger, the charger continues to consume energy if you leave it plugged into the wall. The promise of wireless charging is that it could solve both of those problems. With ubiquitous wireless charging, devices would no longer need chargers and power could be managed intelligently based on the device — or on the absence of one — much more efficiently. We have the technology. So what’s the holdup? What’s it going to take for wireless charging systems to be so ubiquitous that they’re built into our tables, countertops, cars and desks? What’s it going to take for smartphones, tablets and wearable computing devices to not need dedicated internal chargers? It’s going to take a miracle.
For the original version including any supplementary images or video, visit http://www.computerworld.com/s/article/9241872/Why_you_plug_gadgets_into_the_wall_like_a_Neanderthal?pageNumber=1

Why you plug gadgets into the wall like a Neanderthal

Sign Up For Traffic Text Alerts Life extenders: To guarantee your mobile phone-aholics never run out of fuel, get them a carry case with built-in backup battery to double the run time. Mophie makes a sleek bunch of Juice Packs ($80) for iPhones and ye olde Galaxy 3. For iPhone 5 users, the Duracell Powermat Powersnap Kit ($99) has wireless “drop and charge” refueling on a companion Powermat base (about $35). Cable cutting: For today’s budget-minded, cable-free generation, a tiny set-top box that sucks in video and audio entertainment from the Web is a great addition to the dorm TV. Especially since streaming services like Netflix and Amazon Instant Video allow students to feed off their parents’ password-protected accounts at no extra cost. We like the Roku 3 ($99) media box for its mix of mainstream and quirky channels and its nifty wireless remote with game-friendly controls and built-in headphone jack. The rival Apple TV box ($99) is better at easing jock itch , though, boasting exclusive ESPN channels. Headphone pride: Wear your university affiliation with pride with logo-endowed, solid-sounding Sol Republic Collegiate Series headphones ($129.99). Transferring schools? Just switch the headband to stay current.
For the original version including any supplementary images or video, visit http://www.courant.com/business/custom/consumer/hc-ls-back-to-school-gadgets-20130824,0,4373599.story

Mobile Trends and Insights for Smartphones and Tablets For Fall 2013

Soft Passcodes Still Prevail on Enterprise Mobile Devices

Soft Passcodes Still Prevail on Enterprise Mobile Devices image passcode blog august

For that reason alone, many mobile users prefer the use of Android OS over that of Apples because Android is supposed to offer more customization on devices powered by the Android platform. Morever, Apples iOS and Googles Android platform pretty much dominate the mobile operating system thats currently used around the world. Windows OS and the BlackBerry OS are also becoming popular to consumers, though both are not as quite popular and widely used globally when compared to iOS and Android. Fans and supporters of these brands almost always argue which one platform is the best. In my opinion, Id say that all of these mobile platforms have their own strengths and weaknesses. Frankly, it’s just a matter of personal preference and individual tastes for consumers when it comes to choosing a brand for their mobile needs. To sum it all up, mobile users have seen great advancement in mobile computing, from the use of internet on our smartphones and tablets, Wi-Fi integrated calling on our mobile devices, and the use of multi-touch displays from these gadgets, to name a few. Mobile technology is a fast-paced industry that’s constantly changing and evolving to meet the wants of mobile consumers, as well as meet the needs of the modern world. That said, companies that are able to adjust rapidly on technology and those that are willing and able to innovate to give the consumers what they want in mobile computing are destined to reap the reward of customer loyalty and brand recognition for many years to come. My focus in this journey will be around the exciting new generation of products that make it all possible and the trends that are fueling them.
For the original version including any supplementary images or video, visit http://www.examiner.com/article/mobile-trends-and-insights-for-smartphones-and-tablets-for-fall-2013

Hands-on with LoJack for Mobile Devices (Gallery)

Looking at 200,000 of the 2 million plus devices we manage for industries across the globe, we learned that passcode security still has a long way to go for complete protection of data on smartphones and tablets. Limitless Passcode Options Limited Implementation It would help to first define the options available for passcode protection on mobile devices. The three most common categories are: PIN/Simple Passcode: Just numbers or letters Alphanumeric Passcode: Combination of numbers and letters Complex Passcode: Combination of numbers letters and special characters According to the data, the PIN/simple passcode prevails overall with anoverwhelming 93% majority. Of those deploying this basic approach,73% use only 4-5 charactersfurther highlighting this pervasive simplicity. Why is this troubling? i09 recently did a report showcasing a robot constructed for a paltry $300 that can crack these codes in just under 24 hoursand thats a high-end estimate. Also, considering most people use repeatable digits on their phone or tablet, regular old human hackers can usually get into your smartphone in 10 tries or less. Healthcare Passcodes Most Enforced; Public Sector Passcodes Most Complex While there is no one-size-fits-all rule for passcode protection, IT can use several barometers for the proper approach in their industry. Healthcare, financial services and public sector organizations have some of the strictest audit requirements when it comes to data protection, with regulations like HIPAA, HITECH, FINRA and FISMA compliance constantly looming over their heads. Given these factors, it comes with little surprise that organizations under these umbrellas are the most fastidious when it comes to passcode enforcement through mobile device management policies and passcode complexity. Passcodes Most Enforced Through Automated Policies by Industry (% of devices protected) Healthcare: 97%
For the original version including any supplementary images or video, visit http://www.business2community.com/mobile-apps/soft-passcodes-still-prevail-on-enterprise-mobile-devices-0591012

DNS Made Easy Launches Mobile App for Apple Devices

Results from the same TechTarget survey place the iPad in over 33% of business environments in 2011, with support for Hewlitt-Packard (HP), Lenovo and Dell tablets sprinkled in as well. Once again, Microsoft is looking to get in on the action by joining forces with ARM , a strategy designed to make Windows more comparable to Apples iOS in the tablet market. With so many mobile device options making their way into the enterprise, it all leads to a delicate balance between user freedom and IT policy. Many organizations are establishing detailed security policies to protect internal data and address key areas such as device deployment, configuration and maintenance. Others have turned to products like Microsofts System Center Mobile Device Manager , though uptake has been slowed as such software continues to mature. The challenges of securely and efficiently managing mobile devices should only increase, however, as more users bring them into the enterprise (whether the enterprise is ready for them or not). “People want to be productive,” said James Ainslie , chief technology officer at SMMT Online (Pty) Ltd. in Johannesburg, South Africa. In today’s economic climate, people can’t afford to be separated from their information. An introduction to mobile device management in the enterprise No two mobile devices are alike, so how do you manage your groups mishmash of gadgets effectively? Microsoft MVP Brien M. Posey explores the challenges of mobile endpoint management and the best practices that can help sort out the mess.
For the original version including any supplementary images or video, visit http://searchwindowsserver.techtarget.com/feature/Mobile-device-management-spotlight

Why Your Emails Need to Look Great on a Mobile Device

Download Now! The study found that fully 53 percent of viewers for Sonyliv.com contentwhich includes titles like Indian Idol Junior and Comedy Circus Ke Mahabali–were turning to mobile devices to watch video. Another 32 percent were viewing online, likely through desktops and laptops, while the remaining 15 percent turned to tablets, based on Sony LIV user data. The study further offered breakdown in terms of audiences, revealing that gender is a particularly unusual matter here. While video consumption in India is largely male-drivenroughly 71 percent of all video is male-consumed, and about 29 percent is taken up by the ladiessonyliv.com shakes that picture up considerably with only 53 percent of video consumed by males and the ladies stepping for 47 percent, or near parity. What’s more, the age breakdown is a bit how to become an alpha male john alexander unexpected as well, with 46 percent of viewers between 15 and 24 years old, 32 percent between 25 and 34, 17 percent between 35 and 44, and the rest coming in above that. Perhaps less surprising are the selected genres for videos online: comedies and daily dramas are seen more often online, with comedy, drama and thriller titles accounting for 78 percent of all total video viewed. Within that, 30 percent is comedy, 25 percent drama, and 23 percent thriller, not surprising given that roughly 94 percent of the content available at sonyliv.com falls into one of these three categories, with sections for horror and game shows remaining blank. It’s interesting, however, that the subgenres aren’t more skewed: Indians apparently love the thriller genre, watching it almost as much as drama despite having roughly half the content available. Perhaps most interesting was what the viewers were turning to for video choices; while 64 percent watched catch-up episodes of recent content, just over a third of viewers were turning to compressed versions of released shows known as Quickisodes. Sony Entertainment Network’s executive vice president ofnew media, business development and digital / syndication, Nitesh Kripalani, offered some remarks in commentary on the numbers revealed, saying At sonyliv.com, we are captivated with data and analytics and believe in leveraging the insights to drive a superior world class viewing experience.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/topics/articles/2013/08/23/350664-video-mobile-devices-huge-india-says-sonylivcom-study.htm

Mobile device management spotlight

The new iOS app was just released, shortly after the Android app, which DNS Made Easy launched earlier this week. Reston, VA (PRWEB) August 22, 2013 DNS Made Easy (dnsmadeeasy.com), the leading provider of IP anycast managed DNS, has launched its mobile web app to 30,000+ existing companies who use the companys services to Apple users. Earlier this week, DNS Made Easy released the app to Android users. The brand new DNS mobile application is now available to users with IOS devices, which can be downloaded for free in the Apple Store. The Android version of the mobile app has been available since August 19th. Apple approved the app a few days later. The reason for the delay for usage of the mobile app on Apple devices was based upon the approval process that such apps must undergo with Apple. The company is also mulling the idea of offering the mobile app on Blackberry. If our corporate clients who use Blackberry want the mobile app as well, we will look into servicing their needs in the near future, Seven Job, President of DNS Made Easy said. We put our clients first, so if we receive feedback from these users and they say, We want it for Blackberry, then we will make sure they have a product and soon. That is what the company did for Android and IOS users. These users requested the mobile app, so DNS Made Easy launched the new and innovative service, once again proving that they are a leading provider with cutting edge DNS services.
For the original version including any supplementary images or video, visit http://www.sfgate.com/business/press-releases/article/DNS-Made-Easy-Launches-Mobile-App-for-Apple-4752544.php

Video on Mobile Devices Huge in India, Says Sonyliv.com Study

Image Caption

New data, compiled in conjunction with Chadwick Martin Bailey, found that 49 percent of consumers say they are likely to click on links in emails opened on their smartphone. While click-through rates vary greatly among industries and subscriber list size, as a marketer you are in an envious position if almost half of your subscriber list looks forward to the links you provide in your emails. The new data also found that almost 80 percent of consumers are likely to reopen an email on a laptop or desktop after having originally opened it on a mobile device. So if you catch your subscribers on their smartphone first, theres a very good chance they will revisit your email later. This allows you to develop a deeper relationship with your customers and keeps your brand top-of-mind because theyre seeing your content multiple times. Becoming mobile friendly is easy Thats great, you may be saying to yourself. But youre still speaking lies, Jason. You just said making your email look great on a mobile device is easy. Actually, it is. But Ill let one of our resident mobile email experts and a man who knows better than I, mobile products manager Jim Garretson speak to that: The great thing about mobile emails is that shorter content and fewer calls to action actually perform better than complicated and dense messaging, says Jim . By simplifying email marketing campaigns, marketers can take an essential and effective step towards becoming mobile friendly. So there you have it. By simplifying your content and cutting down on messaging, you are creating an effective mobile email.
For the original version including any supplementary images or video, visit http://smallbusiness.yahoo.com/advisor/why-emails-look-great-mobile-device-200047992.html

avast! Mobile Premium Fights Back Against Phone Theft, While Securing Your Data

Another feature that prevents anyone from accessing a customers device is Password Check, which locks the device if the wrong password is entered three times in a row. With avast! Mobile Premium, Geofencing allows customers to define the radius of a location where they will be for a period of time. With Geofencing activated, if someone were to attempt to take the phone beyond the set perimeter, an alarm sounds, catching the would-be thief red-handed. App Locking empowers customers to set a password for chosen apps, as online shopping and banking via apps bears the risk of losing sensitive data when a users smartphone gets stolen. Moreover, avast! Mobile Securitys Ad Networks Detector informs customers of ad networks and tracking systems that target them with unwanted ads while collecting their information. avast! Mobile Backup: Customers can back up their personal data as a preemptive measure to avoid data loss. In addition to backing up contacts, text messages, and photos, which is available in the free version, apps, music files, videos, and even video game scores can be backed up with the premium app.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/avast-mobile-premium-fights-back-120000367.html

After you install and setup the software then you are prompted to create an account so you can login and manage your device from a web browser. After the software is setup on your phone, it remains active even if your Galaxy S4 is wiped and reset. Locate: With the software installed, login to your account to perform remote functions. After selecting to locate the device you will see it appear on a map view with the last location of your phone identified. Lock: To lock your phone remotely you select the lock option and then enter a lock message that will appear on your phone screen. You then enter a PIN and select to lock the phone. After confirmation, your phone will be remotely locked. Once you find it or it gets returned, you can then enter the PIN and unlock your phone. Delete: If a lock is not good enough, you can also choose to remotely wipe your device. This action may be desired if you cannot find your device and have sensitive data you don’t want to risk losing. You can choose to delete messages, contacts, phone logs, removable storage files, non-removable storage files, or a full manufacturer wipe.
For the original version including any supplementary images or video, visit http://www.zdnet.com/hands-on-with-lojack-for-mobile-devices-gallery-7000019728/

RF Micro Devices – Low Risk Way To Play Smartphone Growth

Google: Mobile Devices Influence Wireline Sales

However, I think that the company has come out of the rut and is now growing strongly. RFMD also has a strong balance sheet with a net of ~$100 million in cash. b) Competition from Bigger Players – RFMD faces competition from the bigger players such as Qualcomm ( QCOM ) and Skyworks ( SWKS ) which are offering a comprehensive low cost communication solution. The competition in the mobile market has become fierce as all semiconductor companies want to get a piece of the biggest technology segment today. However, RFMD has strong strengths in communication semiconductor solutions and I don’t think it faces any immediate threat. Future Prospects RFMD’s prospects are looking quite good in 2013, as the company’s massive topline growth is driving up earnings as well. The company is expected to earn 43c/share in 2013, which is up almost ~130% from last year according to analyst estimates. The company is expected to grow earnings by another 25% next year. Revenues will top $1.23 billion in 2013, which is up ~30% as compared to last year. The company is positioned in a sweet spot of a fast growing industry and it just has to execute well on its existing product lines without looking for further expansion opportunities. The company’s management has the right strategy of improving margins while continuing to focus on improving topline by selling more content to 3G and 4G handsets.
For the original version including any supplementary images or video, visit http://seekingalpha.com/article/1653532-rf-micro-devices-low-risk-way-to-play-smartphone-growth

Lost Your Android Phone? Try These steps to Secure Your Devices

Lost Your Android Phone? Try These steps to Secure Your Devices

However, the results clearly bolster online search and video services as primary means of reaching consumers — a message that promotes what Google has to sell. The good news for wireline service providers is that the market is growing. Google reports a 14 percent increase in people who plan to buy a service and a 48 percent increase among those planning not to cancel a service. (Those numbers weren’t broken out by service type.) The biggest growth factor, Google said, is less service switching. Only 18 percent of those surveyed said they were switching service providers, versus 26 percent last year. “Our research does not look specifically at why this is happening, but we do suspect that the positive economic outlook — consumer confidence, lower unemployment — has something to do with fewer people dropping providers just to save money,” Kyle Keogh, industry director of technology for Google, told us in an email. Still, 41 percent of those getting a new service cited price as a major factor, and 73 percent of all respondents called price an “extremely important” consideration; http://blogs.hbr.org/corkindale/2007/10/unmasking_the_alpha_male.html 68 percent said that about reliability. Here are some other findings. Buyers do their research; “54% of purchasers begin research 2+ weeks prior to purchasing; two-thirds of purchasers visit 5+ provider sites while carrying out research,” Google said. Almost 60 percent of those who make a purchase “discover brands via mobile devices,” either because they are using their mobile device to conduct research or they see an ad while on a smartphone or tablet.
For the original version including any supplementary images or video, visit http://www.lightreading.com/document.asp?doc_id=705320

Soft Passcodes Still Prevail on Enterprise Mobile Devices

Soft Passcodes Still Prevail on Enterprise Mobile Devices image passcode blog august

Looking at 200,000 of the 2 million plus devices we manage for industries across the globe, we learned that passcode security still has a long way to go for complete protection of data on smartphones and tablets. Limitless Passcode Options Limited Implementation It would help to first define the options available for passcode protection on mobile devices. The three most common categories are: PIN/Simple Passcode: Just numbers or letters Alphanumeric Passcode: Combination of numbers and letters Complex Passcode: Combination of numbers letters and special characters According to the data, the PIN/simple passcode prevails overall with anoverwhelming 93% majority. Of those deploying this basic approach,73% use only 4-5 charactersfurther highlighting this pervasive simplicity. Why is this troubling? i09 recently did a report showcasing a robot constructed for a paltry $300 that can crack these codes in just under 24 hoursand thats a high-end estimate. Also, considering most people use repeatable digits on their phone or tablet, regular old human hackers can usually get into your smartphone in 10 tries or less. Healthcare Passcodes Most Enforced; Public Sector Passcodes Most Complex While there is no one-size-fits-all rule for passcode protection, IT can use several barometers for the proper approach in their industry. Healthcare, financial services and public sector organizations have some of the strictest audit requirements when it comes to data protection, with regulations like HIPAA, HITECH, FINRA and FISMA compliance constantly looming over their heads. Given these factors, it comes with little surprise that organizations under these umbrellas are the most fastidious when it comes to passcode enforcement through mobile device management policies and passcode complexity.
For the original version including any supplementary images or video, visit http://www.business2community.com/mobile-apps/soft-passcodes-still-prevail-on-enterprise-mobile-devices-0591012

How the Proliferation of Mobile Devices is Impacting Consumer Security

Maybe thats why mobile phones were targeted in more than 40% of all robberies in New York City and 38% of all robberies in Washington, D.C. last year.** Even without getting their hands on your device, hackers can get into and remotely control almost any mobile device, and it is frighteningly easy. Malicious software can be disguised as a picture or audio clip. When you click a link or open an attachment, malware installs on your device. Unlike early PC malware, it doesnt ask your permission, and your device is figuratively in their hands. How are mobile devices changing the game? Criminals know that your mobile device is an indispensable extension of your life. Your smartphone or tablet stores some of your most private conversations and confidential information. It is your phonebook, email account, family photo album, social media connection and even your wallet, all rolled into one device. Chances are, if you own a smartphone, it is connected to your money or financial accounts in some way.
For the original version including any supplementary images or video, visit http://www.examiner.com/article/how-the-proliferation-of-mobile-devices-is-impacting-consumer-security

avast! Mobile Premium Fights Back Against Phone Theft, While Securing Your Data

If you dont see the device on the large map, hit the Locate This Device button on the white inset window. If you are able to locate the mobile phone, you can use the Ring option in the Android Device Manager to draw attention to the lost phone. Well, we cant recommend you to track the device by yourself, rather try to inform the police and they will do the rest. You can also deactivate the phone with the help of network providers, so that you can prevent the thief from inserting a new SIM card and resetting the device. But, once you deactivate service, it also prevents you from connecting with your mobile phone through the Android Device Manager. You can also prevent the thief from getting access to your personal information on your handset. Try to connect with the Web presence for every app and service on your phone and look for options to logout devices, de-register the mobile phone or revoke tokens. This will prevent anyone from simply entering an app or a website and using your login information. If you are unable to figure out any option to prevent mobile logins, just reset your passwords using a password manager.
For the original version including any supplementary images or video, visit http://www.devicemag.com/2013/08/24/lost-your-android-phone-try-these-steps-to-secure-your-devices/

Sneha Shah picture

Anti-theft, along with mobile backup, addresses consumers primary concern of losing important content such as pictures, contacts, and even financial information when their mobile device is either lost or stolen. In a customer survey with more than 167,000 worldwide respondents, AVAST found that one in four smartphone users in the US has lost or had their device stolen at least once, costing an average of $3721 per person. AVAST found that not only are consumers lax in using anti-theft features to prevent losing their mobile device and the data on it but nearly 50% of US smartphone owners do not back up their content as well. More than half the people in the US own a smartphone and consumers are growing more concerned by the day about the security of the information on their mobile devices, said Vincent Steckler, Chief Executive Officer at AVAST. avast! Mobile Premium easily fills the rapidly growing need for on-the-go security and protection. Keeping Track of Device and Data avast! Mobile Premium includes the same antivirus and anti-malware protection as the free version, which was certified by independent testing organization AV-Test with top-level effectiveness (99.8%) and 100% in usability. The premier versions user interface has been further simplified for smooth and easy access to all new features. The solution includes two cornerstone apps: avast!
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/avast-mobile-premium-fights-back-120000367.html

Hands-on with LoJack for Mobile Devices (Gallery)

After you install and setup the software then you are prompted to create an account so you can login and manage your device from a web browser. After the software is setup on your phone, it remains active even if your Galaxy S4 is wiped and reset. Locate: With the software installed, login to your account to perform remote functions. After selecting to locate the device you will see it appear on a map view with the last location of your phone identified. Lock: To lock your phone remotely you select the lock option and then enter a lock message that will appear on your phone screen. You then enter a PIN and select to lock the phone. After confirmation, your phone will be remotely locked. Once you find it or it gets returned, you can then enter the PIN and unlock your phone. Delete: If a lock is not good enough, you can also choose to remotely wipe your device.
For the original version including any supplementary images or video, visit http://www.zdnet.com/hands-on-with-lojack-for-mobile-devices-gallery-7000019728/