Tag Archive: mobile devices

Cloud TelephonyCloud computing was introduced a decade back and the latest technology allowed convergence of data and voice on the same network.

However, cloud telephony hasn’t quite taken off the way the technology enthusiasts expected it to. The biggest problem with the cloud telephony sector is that everyone finds the concept interesting but no one finds it absolutely irresistible. Businesses do not feel that cloud based phone system can actually provide a major boost to their sales efforts or customer experience. Here are 7 ways you can use cloud telephony to become irresistible to customers: Continue reading

The Dos and Donts of BYOD

BYODBYOD or Bring Your Own Device is the latest rage among employees and they love every minute of using their smart mobile devices.

Though this has created enough enthusiasm among the employees, it has left a big question for the management – how to handle organizational data security. Keeping the business data safe will be a major concern for the companies who encourage their employees to bring their own devices to office.

Continue reading

Mobile World Congress 2014For hard-core mobile techies and enthusiasts, there are few bigger events on the calendar than the annual Mobile World Congress.

The February event, staged annually in Barcelona, Spain, is one part massive mobile technology exhibition, one part industry super conference.

“The Mobile World Congress is probably the most important convention in the wireless industry,” Continue reading

Small Business WebsitesThe Letseat.at site shows that between 2012 and 2013, Chicago has 48% of the traffic for restaurant searches wrapped up in mobile devices.

IT can be a dilemma when it comes to deciding how much mobile accessibility to add to your website. This is especially the case for older people who are used to more traditional ways of accessing the Internet.

The whole smart phone craze might seem like a fad to sum. And certainly, there are a lot of fads within the mobile world. But when it comes to small business owners, especially restaurants, the writing is on the wall concerning whether mobile is a good idea or not in the coming year. Continue reading

Mobile Technology

Let’s face it: the world is getting more mobile by the minute. All you have to do is walk down the street and you’ll see the evidence — every third person is staring at a smartphone, oblivious to anything not rendered in pixels.

In a matter of a few years, mobile devices have gone from an unnecessary luxury to an absolutely integral part of our lives. Mobile devices are fundamentally changing the way we work, communicate and entertain ourselves. In short, they are changing the way we live.

They’re also responsible for massive changes in business. Companies are radically changing the way they operate to keep pace with the mobile market. No one wants to get left behind. Continue reading

BYODPlenty of us have had jobs where keeping our phones with us while we’re “on the clock”was strictly forbidden. Then there are those of us with jobs that not only encourage, but actually require, the use of the latest mobile devices, including smartphones and tablets.

Company-issued devices are fairly common, particularly among professionals who travel a lot for their company. They’re a way to ensure that every employee is using the same hardware and the same operating system, and to make sure that they all have access to all of the same important features.

As popular as company-issued devices are, the trend that’s sweeping the professional world right now is BYOD, or Bring Your Own Device. It’s exactly what it sounds like: employees are able to use their personal devices as work devices.

It might sound like a perfect solution for all involved, but it’s actually a pretty complicated issue, rife with advantages and disadvantages. Let’s take a look at a few of them here. Continue reading

Mobile Devices and CybercrimeMobile devices under the scrutiny of cybercrime

Mobile devices have become part of our lives. Daily activated only about 850 thousand android smartphones. However, many do not even realize how much can be dangerous inattention to the installed programs on your mobile device.

Since mobile devices have become a popular means to personal and professional information than desktop PCs, they become the target of a scam.

There are new areas of mobile cybercrime, new opportunities for abuse and misuse of mobile devices and data. Continue reading

New Linux-platform Tizen 2.0Tizen 2.0 – a new Linux-platform for mobile devices

The developers of the operating system based on Linux Tizen for smartphones, tablets, automotive systems and other equipment with control via touch screen, has officially released the source code of the system and development tools for third-party software and hardware.

Release Tizen 2.0, created with active participation from Intel and Samsung, offers third-party vendors standardized environment where applications can be created using familiar web technologies: HTML5, JavaScript and CSS.

Of the other new platform Tizen 2.0 offers a number of new APIs API to access the Bluetooth and NFC on devices equipped with such units. In addition, significantly improved developer tools. At the moment there is no serial devices running Tizen, but there is a lot of speculation about the likely release of such devices at the facilities of Samsung. Continue reading

Samsung GalaxyParticipants authoritative forum XDA Developers, on mobile devices, today announced a new discovery. User under the pseudonym ‘alephzain’ said discovered a vulnerability in several devices Samsung, and this vulnerability opens the application access to all physical memory.

The danger is very serious: attackers can use a malicious application for data destruction and conversion of the unit into a useless ‘brick’. Another, more likely scenario, is inconspicuous abduction secret user data.

User ‘Alephzain’ first look for vulnerabilities on the device Samsung Galaxy S III, when he tried to get the Root-access. It later turned out that similar problems exist in devices Samsung Galaxy S II, Samsung Galaxy Note II and the Meizu MX. Strictly speaking, the problem can manifest itself in any devices that use a processor Exynos (4210 and 4412) and the code of corporate Android-core from Samsung.

Samsung has not yet officially responded to reports of a security, although already documented cases of its successful use. Senior moderator XDA Developers, aka ‘Chainfire’, made ready to play package APK called ExynosAbuse, where vulnerability, the user opens Alephzain, used to get Root-privileges and install the latest version of the utility SuperSU ‘on any machine with processors Exynos4’.

Reports of enthusiastic developers mention the following devices Affected: Samsung Galaxy S2 GT-I9100, Samsung Galaxy S3 GT-I9300, Samsung Galaxy S3 LTE GT-I9305, Samsung Galaxy Note GT-N7000, Samsung Galaxy Note 2 GT-N7100, Verizon Galaxy Note 2 SCH-I605 (with locked bootloader), Samsung Galaxy Note 10.1 GT-N8000 and Samsung Galaxy Note 10.1 GT-N8010. Continue reading

%d bloggers like this: