Intel has been talking up wireless charging for years, to the point where we thought its implementation would forever remain a concept for the lab. Not so: Intel is having Integrated Device Technology (IDT) build a real-world chipset to support resonance charging in our gadgets. The lofty goal is to have a ready-made platform for charging up a mobile device or peripheral just by keeping it close to another device with a charger built-in, such as an Ultrabook; there’s none of the unseemly contact plates used with inductive wireless power. Intel’s commitment is still very much early and won’t put a full, two-way resonance chipset into the hands of hardware makers until sometime during the first half of 2013, let alone into a shipping product. We’ll take it all the same, as it just might be the first step toward embracing wireless power on a truly large scale.
Intel, IDT to make resonance charging a reality, see reference chipset coming in first half of 2013 originally appeared on Engadget on Wed, 29 Aug 2012 17:41:00 EDT. Please see our terms for use of feeds.
Brewster, the new contacts management app for iPhone, had a few privacy leaks on launch day yesterday.
We pressed Brewster for more details, but they would only give us this statement:
“We take privacy extremely seriously at Brewster. When we launched yesterday, we had a tremendous number of user signups, and fixed a number of problems, including scale issues and bugs.
One unfortunate problem that arose was for Foursquare users who were fans, but not friends, of other Foursquare users. Even further, Foursquare only offers the ability to be fanned to an extremely small number of users. In this case, if we had the contact information from a full Foursquare friend, we briefly displayed their contact information to fans. This happened with one user who was fans of multiple people on Foursquare.
As soon as we heard of this issue from the user, we made sure this bug was resolved immediately, and put safeguards in place to ensure it never happens again. This is the only instance we heard of this issue.
Separately, from this bug, we have also responded to questions from users related to information that they had access to from different services. For instance, a user might have a public photo available that they haven’t seen before, or a phone number rightfully accessible if connected on Foursquare. These instances are completely consistent with the access the user gives these third-party services.
Brewster strives to be a trusted personalized address book for our users. We hope this serves as an example of how seriously we take issues of privacy, how candid we will be if issues ever arise, and that our users remain a top priority.
Most companies are stuck in the dark ages when it comes to workforce tech. They think letting their workers use their own iPads to send corporate e-mails is cutting edge.
Want to see what tomorrow’s “social enterprise” looks like? Take a peek at Eagle Investment Systems. They call it the “high performance workforce.”
Their use of tech is so inspired, they literally turned the walls of their building into whiteboards for web conferencing by painting them with special paint called Walltalker.
Seriously. In any room in the building you can scribble on the wall. Then you can hook up some portable Bluetooth-enabled wands and fire up a Cisco WebEx meeting and everyone can see and interact with your wall.
Boston-based Eagle sells tech software to financial firms and supports about 600 employees and contractors. About a year ago, they moved to a new headquarters and that’s when they changed their outlook about IT, explains Mike Fitzgerald, Eagle’s top IT guy.
Today, all of Eagle’s tech serves one purpose: helping employees work together no matter where they are. Here are some of the ways Eagle is doing this:
They shifted from offices to “huddle rooms.” Every 40 feet Eagle built little rooms where employees work together, he says. They never have to book a conference room through Microsoft Office. There’s always a space available with a monitor for web conferences. Employees cubicles are now tiny, 150 square feet each.
“Priorities have shifted away from employees sitting in a cube to what’s happening in the virtual world. It’s all about information flow, data, collaboration and in a dynamic, ad-hoc fashion,” Fitzgerald explains.
They killed off traditional desk phones. Employees all have tablets (iPad or Android), laptops and cell phones (iPhone or Android). They use software-phones meaning the telephone is just another application and phone numbers can become part of any app. Eagle uses Cisco’s Jabber and WebEx software to make calls, chat over IM, post status updates and do web conferencing. Employees are given portable Plantronics headsets and speakerphones.
Eagle all-but-killed-off e-mail. Fitzgerald’s team built a new portal application that lets people create projects by dragging and dropping info like contact info, data, calendars, schedules. People can use the IM/web conferencing tool, Jabber, to communicate. It now takes two days to launch a new project. It used to take up to two weeks to e-mail people, gather materials from multiple computer systems and get everyone onboard with a project schedule.
E-mail is still there, but people hardly use it. “We now have more IM sessions than we do e-mail. 7,500 IM sessions a day,” he says.
Video conferencing and collaboration is everywhere. Since it’s so easy to do, remote employees are always included, particularly through video conferencing. Meetings use Skype or WebEx whenever possible. Relationships between workers, particularly overseas employees, are much better compared to the old, e-mail days, says Fitzgerald.
Status updates are displayed on monitors throughout the building. Employees are always kept in the loop with other employees even when they are walking around the building. More than that, they can always find an expert to help as needed.
Next up, Fitzgerald envisions a day when when applications between companies are this social. For instance, as an employee travels, a calendar app can track the GPS location from phone or tablet and keep all the people on the agenda in the loop. People in the contact list can be automatically alerted if they are nearby, attending the same event.
- Cisco Takes A Jab At Microsoft With New Skype Alternatives
- Larry Ellison Says SAP ‘Must Be On Drugs’ To Think It Will Hurt Oracle
- Startup Opscode Just Put $19.5 Million In The Bank And Microsoft’s Ex-CFO On Its Board
Square may see the iPad to as an excellent retail tool, but Eventbrite thinks Apple’s tablet a box office boon, which is why it created the At The Door app and card reader solution. Eventbrite’s a self-service ticketing platform and its new dongle, which connects via Apple’s 30-pin connector, lets indie event promoters take reader-encrypted credit card payments with any iPad. Meanwhile, the app lets you see on-site and online ticket sales, keep track of customer contact info and balance the books as well. Plus, any payments taken through the app are service fee-free, meaning users only pay for credit card processing. Not only that, you can wirelessly print tickets and receipts via a compatible printer (should you be willing to buy one), too. But before you go planning your personal Woodstock, perhaps you’d like to know how much this ticketing bonanza costs? Well, the app’s free and the reader’s 10 bucks, with Eventbrite handing out 10 dollar account credits in return for those who jump on the bandwagon. If that sounds like something your into, hit the PR after the break for more info or pick one up from the source below.
Eventbrite unveils At The Door Card reader, turns iPads into ticketing terminals originally appeared on Engadget on Tue, 20 Mar 2012 23:39:00 EDT. Please see our terms for use of feeds.
Before you’ve even sipped your morning brew, a regional German court has delivered yet another stern judgement affecting a multinational organization. This time it’s Facebook back in the dock over the Friend Finder feature, which uploads a user’s contact list to Zuckerberg’s bunker without proper warning. Another offense involves the ownership of data — any original photo or music track uploaded to Facebook supposedly belongs to the company and can be used however it likes, which has now been deemed to breach data protection laws. Someone ought to add this to the Harvard Student Handbook.
Facebook loses friends in Germany over privacy breaches originally appeared on Engadget on Thu, 08 Mar 2012 08:34:00 EDT. Please see our terms for use of feeds.
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
Collaborators – Digital Profs
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- Try On New Glasses in Warby Parker's Virtual Booth
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- Marketing Costs Normalized to CPM Basis for Comparison
- Coke vs Pepsi vs Dr Pepper
- Samsung 52 inch HDTV $9.99 at BestBuy - purchase receipt below (6:21a eastern time August 12, 2009)
- Facebook Is Running Out Of Time To Figure Out Its Mobile Advertising Strategy (FB)
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
- What is Web 3.0? Characteristics of Web 3.0
- Brand Advertisers: Escaping an Ecosystem of Digital Advertising Fraud
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- October 2015 (2)
- September 2015 (7)
- August 2015 (6)
- July 2015 (2)
- June 2015 (5)
- May 2015 (4)
- April 2015 (32)
- March 2015 (57)
- February 2015 (79)
- January 2015 (86)
- December 2014 (69)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (93)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)