TECHNOLOGY INSPIRATION
Technology-People-Innovation

December 2013

Want to save that expensive 3G data that your device used while you were sleeping? Then read on.

For a smartphone data is a bare essential and the device will continue consuming it unless you strictly guide it not to do so. With3G data being limited and expensive users are forced to turn off the data manually every time they put down the device or if they feel that the device will not be used for a long time. But there is a way you can tell your android not to unnecessarily consume data. This way the application or function you are currently accessing will be the one allowed to utilize data and the rest of the applications will be put on hold.

Please note: This service is not added by any application or utility or software. It is an function built into the operating system itself. So only Android devices running Android version 4.0 and above will be able to make use of this.

Step 1

How to disable background mobile data usage

Access the home screen and locate the settings menu of your device. Now you can either use the application shortcut or can use the options key from the device to open up the short menu and select settings there.


Step 2

How to disable background mobile data usage

Once the settings menu opens locate and enter the data usage tab. Now this is the part of the settings menu where settings related to device data usage are located. So please be careful.


Step 3

Now again press the options key on your device; this will bring up a small options menu for data settings. From the given choices select Restrict background data usage.

How to disable background mobile data usage

Be wary of the fact that the device will automatically stop fetching tweets or updates for applications and will resort to manual mode wherein all applications will access the internet if they are told to do so. This can be useful if you have very limited data left to be consumed, and is not advised for those who constantly follow applications and updates on apps like Facebook, Twitter, Google+ and so on.


Step 4


The settings will prompt you to go ahead with a change in settings. Press 'ok' to proceed. Once done exit the settings and for best results, although it is not necessary, it is advisable to restart the device.

Here  is a step-by-step procedure on how to change the profile picture and status messenger in WhatsApp.

Like majority of Facebook users, most of the users of WhatsApp also love to change their profile pictures and status messages in order to keep their friends and contacts updated about what the latest in their lives.

How to change profile picture and status

If you are using WhatsApp and are not aware how to change your profile picture and status message on the chat app here is quick guide to help you. Please remember in this piece we are taking into account only Android devices.

How to change profile picture:

Step 1:

How to change profile picture and status

How to change profile picture and status

Click on the WhatsApp icon and press "Menu" button

Step 2:

How to change profile picture and status

Select "Setting" option

Step 3:

How to change profile picture and status

In the Settings menu, select "Profile"

Step 4:

How to change profile picture and status

How to change profile picture and status

Tap on the profile picture. A pop up window will come up with three options to choose profile picture -gallery, camera and remove picture. Choose gallery if you want to upload a picture that is saved on your phone, choose camera if you want to capture a fresh picture (via front camera if your phone has one or through rear camera) and finally you can remove picture if you don't want to have any picture on profile. I guess you don't want that.

Step 5:

How to change profile picture and status

After, clicking or uploading the picture you can crop the picture, otherwise WhatsApp will automatically crop it. We would recommend you to do the cropping yourself. After that you just need to press OK and your profile picture will be updated. Do remember you will be needing active data connection to update your profile picture so do switch on your data connectivity or WiFi.

How to change status message:

Step 1:

How to change profile picture and status

How to change profile picture and status

Click on the WhatsApp icon and press "Menu" button

Step 2:

How to change profile picture and status

Select "Status" option

Step 3:

How to change profile picture and status

You can choose from a list of 11 default status messages or create a personalised one using the write box which is displayed on the top under "Your Current Status"

Make use of front camera for not just video chatting but also for taking self portraits.

Gone are the days when you had to depend on someone else for taking your photographs. Mobile phones with front camera have now allows people to do that on their own. One just needs to switch on the front camera of his mobile and say cheese!

How to take a self-portrait using front camera of mobile

Self-portraits may be taken for a variety of reasons - capturing a moment which may not come back again, clicking yourself in different moods and may be you are tired of clicking picture of others and missing not being a part of the group picture.

How to do it?

Step one:

Switch the camera app on your phone

Step two:

Tap options icon > use front camera.

Step three:

Say cheese and press the cameras button (if your phone has one) or just tap on the screen.

How to get good results:

Try to keep camera at least on arm's length and remember to practice, practice and practice! Taking a good photo can be accident only once but not twice.

Don't shy away from being creative in terms of posing, facial expression, choosing

background and angles, and exploring different lighting conditions.

Most of you (not the slim and trims ones) will agree with me that whenever you take full frontal face pictures they rarely come out well, so when taking a self-portrait or what is popular nowadays known as selfie, present three-quarters of your face to the camera. The reason most of the professional cameraman will say this is that it will bring out different angle in your face and softens the overall look.

Keep your chin down pull your head forward a bit to hide double chin and reduce red eye effect.

If you are clicking in an outdoor location, always make sure you're facing the sun to avoid shadows. Also keep in mind that sun is not glaring directly into your eyes otherwise you will have snaps with your eyes shut.

Enjoy web browsing without any distractions caused by Ads on your Android mobile by making this easy tweak.

Google has integrated the interest based ads on the Google mobile web interface and apps that show ads. Every Android device has an Advertising ID that is used by the App developers to create a profile of the user's preference to project the interest-based ads. If the user does not want to be distracted by such interest-based ads, then there is an option to opt out of that.

Follow this simple guide to disable the option that lets the apps and other services track your interests to show you ads.

Step one:

How to disable interest based ads on Android

Open the Google Settings app.

Step two:

How to disable interest based ads on Android

Select the Ads option from the list of options.

Step three:

How to disable interest based ads on Android

Select the checkbox next to the option - Opt out of interest-based ads.

The dual SIM phone has a 2.7-inch screen, 5 megapixel camera and Asha software platform.

Nokia's Asha 500 dual SIM phone is now availble in India. The phone has been listed on Nokia India's online store for Rs 4,339. The Nokia Asha 500 comes with dual SIM feature with dual standby option, along with a crystal case design and supports for most modern mobile applications. Nokia Asha 500 Dual SIM can accommodate two 2G network SIM modules. The Asha 500 Dual SIM is offered in red, white, green, yellow, black, and cyan colours.

Nokia Asha 500 has a 2.7-inch display and is features 320x240 pixel resolution. This capacitive multipoint touchb supporting display also supports Nokia Glance feature which offers quick look at the notifications while the phone is in sleep mode.

Nokia Asha 500

Nokia has loaded the Asha 500 with a new Nokia Asha software platform 1.1.1 that brings improvements and also support for several popular messaging apps such as WhatsApp, LINE and WeChat. Nokia has packed a 1200 mAh battery to promise a talk time of about 14 hours. Of course, one can always connect the phone to a WiFi network for faster mobile web experience through the Nokia Xpress mobile web browser.

We had a closer look at the Nokia Asha 500 mobile phone at the Nokia World 2013.


India's leading telecom operators in terms of subscribers Bharti Airtel has truly gone desi by announcing free Facebook access in 9 regional Indian languages to its prepaid customers across India. They are- Hindi, Bengali, Gujarati, Marathi, Punjabi, Tamil, Telugu, Kannada or Malayalam.
 
Airtel has more than 193 million subscribers in India. Airtel said that a limited period offer will allow customers to access Facebook free of cost with a cap of 30 MB/ month on this festive occasion.
 
With this Airtel has become the first mobile operator to offer Facebook in users' favorite languages as the interface is compatible with Feature, Java, Android, iPhone & Windows devices alike.
 
Airtel mobile customers, who are Facebook users on the Mobile (browser or app) will be able to view or upload photos, post status updates, comment and write on walls, message others in their favorite language.
 
Existing mobile internet customers on Airtel can immediately start connecting with their friends by visiting the Facebook mobile site m.facebook.com. Customers accessing the mobile internet for the first time need to register at m.facebook.com to avail of this special offer.

The Intex Aqua i4+ has recently been released in India and it is being pitched against none other than the Micromax Canvas Juice A77 which was introduced last month. The prices of the two gadgets are almost the same and they more or less have the same specifications as well. Here we have jotted down a brief summary of both the handsets to help you pick the right contender. Do take a look.

Intex Aqua i4+:

This mid-range Intex device has been loaded with all the components that come under the sough-after category. The very first thing to notice about the phone is its 5-inch touchscreen which may not be the best in class, but does manage to deliver visuals in 854 x 480p resolution. A couple of cameras have been fitted on the device to make it apt for capturing images, recording videos and making conference calls.

Intex Aqua i4 Plus

The Jelly Bean 4.2.2-based smartphone acquires steam from a dual core processor ticking at 1.2GHz as well as 512MB of RAM. Its 4GB of onboard memory may not be enough to fulfill all your hoarding needs and thus you get a microSD card slot for increasing it further by up to 32GB. A 2000mAh battery powers it from within.

Key specifications:

- 5-inch touchscreen
- 8MP camera, 1.3MP webcam
- 1.2GHz dual core processor
- Android Jelly Bean 4.2.2 OS
- 512MB of RAM
- 4GB onboard memory, expandable up to 32GB
- 3G, Wi-Fi, Bluetooth GPS
- 2000mAh battery

Micromax Canvas Juice A77:

Coming to the Micromax Canvas Juice, this uncreatively named smartphone is said to be capable of offering a long battery life, thanks to the built-in 3000mAh power pack which is better than that of the rival Intex phone. It has a 5-inch FWVGA screen as well, but this one tags along a 5MP camera and a 0.3MP webcam.

Micromax Canvas Juice A77

The Android 4.2.2 platform is another common factor between the two devices. The Micromax phone also has a dual core processor, however, it ticks at 1.3GHz. Also, this dual SIM handset brings 1GB of RAM and its internal memory remains the same that is 4GB which of course, is expandable up to 32GB.

Key specifications:

- 5-inch touchscreen
- 5MP camera, 0.3MP webcam
- 1.3GHz dual core processor
- Android Jelly Bean 4.2.2 OS
- 1GB of RAM
- 4GB onboard memory, expandable up to 32GB
- 3G, Wi-Fi, Bluetooth GPS
- 3000mAh battery

Aqua i4 Plus Canvas Juice

Conclusion:

So the Intex Aqua i4+ and Micromax Canvas Juice A77 are pretty similar with very few differences. The former sets you back by Rs 7,600, whereas the latter is priced at Rs 7,999. Have you made up your mind regarding the two phones? Or are you still confused? Do drop in a comment to let us know.

The fledgling smartwatch market is tiny compared to that for smartphones, or even wearable devices like Google Glass or smart bands that cater to fitness and health-monitoring needs.

Still, the smartwatch phenomenon promises to blossom in 2014 as experts expect Google to launch a model by summer followed by Applesometime in the fall. Even Microsoft is reportedly working on one.

To achieve any degree of greatness, though, these major tech innovators and their smaller competitors must overcome some significant hurdles.

For instance, most of the smartwatches unveiled to date are too expensive, at $200 to $300 each, for widespread adoption. Most of the devices also require a connection to a smartphone via Bluetooth, which implies that users face the added cost of the smartphone and a wireless service contract.

The early smartwatches also lack functionality and mostly run fewer than 20 smartwatch apps.

wearables chart

Several analysts say the so-called value proposition of smartwatches is unclear so far. Sure, you can check your smartwatch for a text message or email or use it to find the time or a weather forecast without having to dig into a pocket or purse to find your smartphone. But is that enough to attract users to the technology?

Some smartwatches (sometimes called smart bands) include sensors that let them double as fitness monitors, which helps expand their functionality to a degree. A few also have cameras, microphones, and speakers.

Beyond those basic price and functionality hurdles, some of the early smartwatches are just plain ugly and far too large (mostly around 2 inches by 1.5 inches) for women to wear on their wrists, say several analysts familiar with the market.

Samsung Galaxy Gear Smartwatch

Samsung Galaxy Gear

That problem suggests the successful smartwatch innovators will—or should—pair up with fashion designers.

"Fashion will be important, whether in smartwatches or Google Glass," said J.P. Gownder, an analyst at Forrester. "Vendors need to up their game on design. They should partner with jewelry and clothing vendors. Tech firms just aren't equipped to deal with fashion by themselves."

Gartner analyst Angela McIntyre said that most of today's smartwatches are too large and dull-looking.

"When I put many of them on, they are wider than my wrist is, and I'm not that small," she said. "These are meant for males to wear, so they are missing half the market right there."

"One of the most difficult issues is the smartwatch face—it's a black box. If they'd make them look like conventional watches, that would help. Yes, I'd like more sparkle, and there are some designs for making them look like regular watches. These devices need more of a value proposition that people will understand and want," she added.

McIntyre summarized the challenges this way: "If a company could get the home run design—one that's right—with more apps and good price points, they could take off, but we haven't seen that design and that solution yet."

Newcomers to the market

The latest smartwatches to become available include Samsung's $300 Galaxy Gear. The Galaxy Gear, launched in the fall, is designed to pair with Galaxy devices like the Note 3 plus-size phone to make phone calls, take pictures, download apps, conduct Web searches, or check email.

The Sony Smartwatch, now in its second generation sells for $200, but cannot make voice calls.

Samsung and eBay recently announced that Galaxy Gear can now notify users of responses to online eBay bids, giving users the ability to make a quick counter-bid. But that kind of app isn't sufficient to justify the cost of a device that largely relies on smartphones to make calls or the smartphone's cellular or Wi-Fi connection to the Internet.

Innovation coming?

Officials at Samsung and elsewhere acknowledge that wearable technology, especially smartwatches, is barely beyond infancy and will likely see substantial innovation in the next two years.

Perhaps Apple will wow consumers globally with an "iWatch" by including technologies like the iBeacon proximity tool that was added to recent iPhone models. The innovative iPod and iPhone turned the consumer electronics market upside down, and Apple could do that again with a smartwatch.

Unfortunately, Apple doesn't exhibit at CES, and the company has yet to officially disclose that it's developing an iWatch smartwatch.

That said, an iWatch with iBeacon technology could usher in a Apple smartwatch world where users could literally open doors equipped with their own transmitters. For instance, a driver could unlock his or her car and start it with such technology. Users could also use the technology make purchases in a store after receiving a discount coupon by authorizing a credit card payment through a previously-stored account with Apple.

Future smartwatches may also include voice and gesture activation capabilities, which would go a long way toward reducing the need for a large touchscreen interface. Voice or gesture control makes it more likely that we'll see an elegant-looking smartwatch with a much smaller face that still has powerful functionality.

Market potential for smartwatches

Analysts at Canalys back in July projected that 5 million smartwatches will ship worldwide in 2014, while Gartner recently said it projects that the global number could reach 7 million next year.

Both the Canalys and Gartner projections are tiny compared to the forecasts that 1 billion or more smartphones will ship in 2014. However, the 2014 smartphone projections are both substantially higher than Canalys' report showing that 500,000 would be shipped this year.

What will work?

Canalys analyst Daniel Matte singled out the $150 smartwatch made by the startup Pebble. That company was started with funding from 85,000 investors found through Kickstarter.

Matta termed the Pebble smartwatch as reasonably successful with more than 200,000 reportedly shipped since its unveiling in early 2013. By comparison, reports have Samsung selling 800,000 Galaxy Gear devices to date, though the number has not been confirmed by the vendor.

"The Pebble is the best smartwatch so far, even though it's fairly basic," Matte said. "The one or two things it does do, it does well, which means it connects well to smartphones and runs apps on the display fairly reliably. It's really early, but it's still not a great device."

The Pebble smartwatch comes in five colors made of a water resistant material and features a 1.26-inch, 144-by-168-pixel e-paper display with an LED backlight. The device weighs 1.3 ounces and can work with both Android and iOS smartphones via Bluetooth 4.0.

The ARM Cortex M3-based smartwatch runs the Pebble OS. The processor runs at up to 80 MHz.

The size of the smartwatch's battery is not disclosed, though Pebble says the device can run for up to seven days between charges.

Pebble says that "thousands" of developers are working on Pebble apps. Some of the apps coming soon include iControl, which can control home alarms, the FourSquare social app and GoPro for taking photos.

Currently, Pebble supports notifications from email or other inputs and alarms, music from the phone and some basic fitness apps. The watch face is customizable.

Matte said the Pebble falls at the upper end of the $100 to $150 sweet spot for what he believes smartwatches should cost to catch on with users.

Like other analysts, Matte said most smartwatches today "aren't very aesthetic or fashionable." He did note that Jawbone and Nike are making fashionable wearable smart band devices for fitness and sports activities, and those could provide design tips for the major smartwatch makers.

Neither the Jawbone or Nike device has a watch-like face in the conventional sense.

The Nike+ Fuel Band SE works with iOS and comes in three sizes and four colors for $149, with a rose gold version for $169. (Nike also has a Nike+ SportWatch GPS for $139.99 that has a conventional watch face.) The Jawbone Up24 has a wrap-around design that works with iOS and comes in two colors for $149.99.

With better designs and many more apps, Matte believes that smartwatches (which he terms smart bands) shipments will reach 40 million globally within several years.

"Smart bands are the next big thing in consumer electronics," he said.

In addition to Samsung, Sony, Nike, and possibly Pebble, other companies expected to show off smartwatches at CES include Basis Science, Burg, Connected Device, Dennco, Ezio, Filip, Kreyos, Kronoz, MetaWatch, Mio, Neptune, Polar, Qualcomm, and TomTom.

The president of the United States says he's not "allowed" to own an iPhone, which is why he's sticking with his BlackBerry, according to The Wall Street Journal.

It's a politically sensitive subject because the iPhone is the big American brand, and the president is a self-proclaimed fan of the late Applefounder and CEO Steve Jobs. He'd love to pander to buy-America voters. (Obama is also probably not "allowed" to have an Android phone.)

Of course, neither the president nor the Secret Service is willing to say exactlyhow security could be compromisedwith an iPhone. But onesecurity risk is the unpredictable nature of both iPhone and Android apps.

Sure, there's a lot of flat-out malware flying around online, most of which looks like regular, legitimate apps but in fact are either malware or they compromise privacy or security in some way.

Is that app selling you out?

There are certain types of apps that users are wary about and may take precautions about downloading. But others don't seem to have anything to do with user data, so they seem safe.

The Federal Trade Commissionannounced this week that it reached a settlement with Goldenshores Technologies, which makes a free Android app called "Brightest Flashlight." The FTC said the app harvested data on users' locations and device IDs and sold it to advertisers without telling the users, and even when users rejected the app's terms of service. The settlement forced the company to improve its privacy policy, user communication and data handling.

The FTC said the app had been installed on "tens of millions" of phones.

The whole "Brightest Flashlight" fiasco shines light on an uncomfortable set of facts about smartphone apps. For starters, some apps that have no apparent need to harvest personal data or compromise privacy or security go ahead and do so anyway.

But even those that don't move user data can leave users vulnerable through sheer incompetence.

Scrutinizing 'innocuous' apps

Silicon Valley computing giant Hewlett-Packard recently conducted a study about the security of business apps for the iPhone and concluded that many of them give themselves permission to access phone features and user data that make no sense, given the stated purposes of the apps.

HP found that more than 90 percent of the business apps it studied hadprivacy or security flaws.

privacy mobile

Many of the flaws involved unencrypted data or insecure protocols. Some 20 percent of the apps send user data via unprotected HTTP. A similar percentage sent via HTTPS, but didn't do it right. And HP found other problems where an app could compromise user security and privacy not through malice, but through incompetence.

HP isn't the only organization looking at app security and finding a gigantic problem.

A new report from Trend Micro found that there are now 1 million "malware and high-risk apps" in the wild.

"High-risk apps" are defined in the report as those that "aggressively serve ads that lead to dubious sites," and represent one quarter of the total.

An information security company called Trustwave said this month that file-sharing apps for iPhones andiPads can compromise user security—even simple picture-sharing apps or apps that enable users to exchange documents.

The problem is that some of these apps open up an insecure file server on the device, which theoretically makes the file vulnerable to copying or could enable malicious crackers to upload files of their own. Some apps don't even require user authentication. The problems tend to be worse when apps run on older versions of iOS.

Some of these reports come from companies that sell solutions to the smartphone apps' security and privacy problems, so their conclusions should be taken in that context. However, it's clear that the problem is real and widespread.

Security solutions (sort of)

So what can users do about it? Do you have to become a security expert just to keep your personal data private?

The unfortunate answer is: Yes, kind of.

Education is the best defense. Certain types of smartphone security products, such as iPhone fingerprint readers or Android anti-malware apps, protect against some risk but not most of the problems associated with apps.

In general, we all need to be more selective about the apps we download and not assume that just because it's highly rated or popular that it's OK.

We also need to think about which data we want to keep private, and which data we don't. For example, if you're concerned about protecting your location data, there are a set of steps you can take to reduce the risk of that information getting out.

If, on the other hand, you carry financial data around on your phone, well, there's an entirely different set of actions you need to take.

The take-away here for all users is that the Apple App Store and the GooglePlay Store and the other Android stores are jam-packed with apps that can compromise your security and privacy without you ever knowing anything bad happened.

So be careful about what you download, don't be lulled by security features that can't protect you against bad apps, and take deliberate action to protect the private information you most want to safeguard.

security

About two-thirds of the respondents said the mobile endpoints used in their organizations had been hit by malware and 40 percent also said these endpoints were the entry point for an APT-style attack aimed at specific individuals to gain access to corporate information. The Ponemon Institute's survey, titled "2014 State of Endpoint Risk", states that on average 63 percent of an organization's employees are now using mobile devices, with IT managers anticipating the number of devices that have to be actively managed will rise from 5000 on average to 7000 in the next three years.

"Just when many IT security practitioners were hoping to get their endpoint security risks under control, the exploding growth of mobility platforms and public cloud resources has turned these dreams into a security nightmare," the survey report asserts. The respondents perceive "mobile devices such as smartphones" to be the greatest potential security risk in the IT environment, more than PC desktops and laptops.

The survey, sponsored by Lumension, indicates that more than half of the IT security experts learned of APT attacks against endpoints when they found anomalous exfiltration traffic on the network. About a quarter said the endpoint security technology they use alerted them to a possible breach and 21 percent were notified by law enforcement directly. APT attacks often commence with phishing emails to employees, Web-based click-jacking, fraudulently signed code, or digital certificates, they said.

As far as the applications considered to have the highest IT risk, the top three choices were: Adobe, Google Docs, and Microsoft's operating systems and applications.

Personal gadgets in place at work

Just over half of the survey's respondents say they have a "Bring Your Own Device" (BYOD) plan that lets employees use their own mobile devices for work purposes, and slightly over half of them are relying on "voluntarily installing the endpoint protection agent" for BYOD.

The survey also asked about perceived risks associated with third-party cloud services, and 54 percent of the respondents said their organization has a "centralized cloud security policy," up from 40 percent that did the year before.

Having to focus more on endpoint security is putting pressure on IT security budgets, according to the report, with only 44 percent expecting their overall IT security budgets to increase in 2014.

The types of technologies the survey's respondent expect to invest in over the next year include application control, data-loss prevention, mobile device management (MDM), device control and "big data analytics." The most important capabilities considered for MDM by the respondents are malware detection and prevention, provisioning, and access management.

hacker hand
The techniques used by hackers toaccess credit and debit card data from Target shoppers suggests that the cyber crooks have found a troubling new way to stay ahead of the latest fraud detection processes.

Security blogger Brian Krebs, who first reported the Target data breach news earlier this month, said that compromised cards are being marketed online with information on the state, city, and ZIP code of the Target store where they were used.

Fraud experts say the location information will likely allow buyers of the stolen data to use spoofed versions of cards issued to people in their immediate vicinity, Krebs wrote. "This lets crooks who want to use the cards for in-store fraud avoid any knee-jerk fraud defenses in which a financial institution might block transactions that occur outside the legitimate cardholder's immediate geographic region," he said.

This is believed to be the first time that security experts have observed hyper-localized selling of stolen credit and debit card information following a retail breach.

Target last week disclosed that hackers had accessed data stored on some 40 million credit and debit cards belonging to shoppers who bought merchandise in its stores between November 27 and December 15.

The information exposed in the incident includes the cardholder's name, the credit or debit card number, the card's expiration date, and the CVV security code used to activate the card in a store, Target said.

The breach is believed to have exposed data from cards distributed by most major U.S. credit card issuing banks and credit unions. JP Morgan Chase announced that it had put restrictions on the amount that customers affected by the Target breach could spend or withdraw daily.

Detection may be difficult

James Huguelet, an independent consultant who specializes in retail security, said Krebs' report concurs sporadic reports after the breach that that stolen Target cards were used fraudulently in areas close to where the owners of the cards lived.

Local use of a card makes it more likely that the crooks can use it for a relatively long period of time before a block is put on it, he said. "That makes such cards much more valuable to a criminal. This is a very clever tactic to increase the monetary value of each stolen card. It's one I've not seen used before," Huguelet said.

Card thieves typically sell stolen data to buyers around he world, making it likely that fraud detection tools used by banks will detect the crimes.

Fraud detection tools used by banks and other card issuers look closely at the location where a card is used and the frequency of its use to determine potential criminal use. Banks often decline transactions or require additional authentication for card transactions that originate from new or unexpected locations.

Such detection is harder when a stolen card is used within the area where the card is typically used.

"Whoever is behind this breach appears to have a tremendous amount of not only technical, but also retail operations and payment industry knowledge. This could indicate someone who has previously worked in the retail payments industry." Huguelet said.

Gartner analyst Avivah Litan said that card issuers and others have to significantly ramp up fraud detection capabilities to deal with the new threat.

"It's very significant because it shows how sophisticated the criminals are," Litan said. "They are trying to avoid being spotted by fraud detection systems that check the location of a transaction against the individual's home zip code and the location of that individual's most recent transactions."

This level of sophistication, combined with the sheer large volume of active cards that were compromised, makes fraud detection far more difficult, Litan said. "Companies will need to beef up their fraud detection capabilities and strategies to overcome the criminals' tactics, which is not a simple task and which does not happen overnight," she said.

Major data breaches often have provided a window into the systemic weaknesses exploited by cyber criminals to infiltrate networks and to profit from data theft.

The 2007 breach at TJX Companies, in which hackers accessed data on 45 million credit and debit cards, showed how easily a poorly protected wireless network can be exploited to gain access to a payment network. Massive data compromises at Heartland Payment Systems and Hannaford Brothers in 2009 hammered home the dangers of SQL injection flaws in Web application software.

Bluetooth isn't a network standard for full-scale wireless Ethernet networking. Instead, Bluetooth was developed as a specialized wireless technology for short distances.

 You can use Bluetooth with cell phones, PDAs, laptops, palmtops, printers, and other external devices. Here are some Bluetooth facts:

  • The maximum distance for a Bluetooth network is about 30 feet.

  • Bluetooth requires very little power to use (befitting its design, which concentrates on battery-operated devices).

  • It's painfully slow compared with the 802.11b network standard.

  • No base station is required for Bluetooth communications between devices. For example, after your laptop gets within 30 feet of your cell phone, they can update each other's telephone number directories. Eerie.

  • Bluetooth uses the 2.4 GHz broadcasting spectrum, so it conflicts with existing 802.11b and 802.11g networks (not to mention cell phones, cordless phones, and other electronic devices). The airwaves are getting so overpopulated that tin cans and string start to look attractive again.

Other than the transmission method (obviously, one network involves wires and the other is wireless), here are the three major differences between a wired network and a wireless network:

  • Wireless connections are slower. This difference is the big reason why most larger networks still depend on wired Ethernet for the bulk of their connections.

    Wired networks can use fiber optic cabling rather than plain copper wire cabling to hit even faster speeds.

  • Wireless hardware is more expensive. Depending on the standard supported by your wireless hardware, you pay significantly more for wireless hardware than you do for wired hardware.

  • Wireless networks require no hubs or switches. Most wireless base stations and WAPs (wireless access points), like the one shown in this figure, can provide connections for up to 253 simultaneous users, so a larger wireless network (with 50 PCs or more) requires far less hardware and upkeep than a wired network that can handle the same number of computers.

    Use a WAP to connect your wireless network.
    Use a WAP to connect your wireless network.

One area that search engines have made a number of significant advancements in recent years is in how they evaluate content on a website. So what does a perfectly optimized page look like in 2012? Let's look at 10 elements.

Bearnaise Sauce Optimized Page

1. Title tags are still important, but it's not a good idea to over-optimize them. 

2. Descriptions still don't appear to add much ranking value, but can help encourage clicks. 

3. Header tags still need to be relevant. 

4. URL still ideally mentions the keywords. 

5. Content is now about semantically relevant supporting keywords, not multiple mentions of the keywords. The example chosen is a recipe, because in order to make béarnaise sauce there are specific ingredients that are 100 percent relevant to the eventual outcome. One way of checking what keywords Google might consider as relevant is to do a '~keyword' (or tilde) search. Other ways, let's be honest, involve nothing more than common sense and knowing your subject. 

6. Video and other 'rich' content can be useful on a page to increase engagement levels, reduce bounce rates and also to appear alongside results as illustrated.

apple-ipad-review-serp

7. Internal links need to follow the "reasonable surfer" patent. It makes sense in the "perfectly optimized page" example above to link to peppercorn sauce as an alternative to béarnaise. 

8. Facebook/Twitter/other login comments are a way of sharing the content on other platforms. The direct SEObenefit may be debatable, but it never hurts to get your content in front of a large amount of people. With Google Search Plus Your World, it could be that adding a Google+ login is more important than anything else.

9. User reviews add regular content to the page, which can also be coded to include microformatting instructions and add extra elements to your listings in search engine result pages (SERPs).

10. Newsfeeds only share content that already exists elsewhere, but they contribute to an overall impression of the page changing on a regular basis.

It's worth noting that the "perfectly optimized page" above won't be perfect for all verticals, or for all brands – not everyone has the ability to add customer reviews to their product pages (e.g., insurance comparison sites).

Want top search engine rankings? Just add meta tags and your website will magically rise to the top, right? Wrong. Meta tags are one piece in a large algorithmic puzzle that major search engines look at when deciding which results are relevant to show users who have typed in a search query.

While there is still some debate about which meta tags remain useful and important to search engines, meta tags definitely aren't a magic solution to gaining rankings in Google, Bing, Yahoo, or elsewhere – so let's kill that myth right at the outset. However, meta tags help tell search engines and users what your site is about, and when meta tags are implemented incorrectly, the negative impact can be substantial and heartbreaking.

Let's look at what meta tags are, what meta tags matter, and how to avoid mistakes when implementing meta tags on your website.

What Are Meta Tags?
HTML meta tags are officially page data tags that lie between the open and closing head tags in the HTML code of a document.

The text in these tags is not displayed, but parsable and tells the browsers (or other web services) specific information about the page. Simply, it "explains" the page so a browser can understand it.

Here's a code example of meta tags:

<head> <title>Not a Meta Tag, but required anyway </title> <meta name="description" content="Awesome Description Here"> <meta http-equiv="content-type" content="text/html;charset=UTF-8"> </head>
For more on the history of meta tags, see our post "Death of a Meta Tag".

The Title Tag
Although the title tag appears in the head block of the page, it isn't actually a meta tag. What's the difference? The title tag is a required page "element" according to the W3C. Meta tags are optional page descriptors.

To learn more about best practices for title tag element, our post "How to Write Title Tags For Search Engine Optimization" tells you everything you need to know.

The Description Meta Tag
This is what the description tag looks like:

<meta name="description" content="Awesome Description Here">
Ideally, your description should be no longer than 155 characters (including spaces). However, check the search engine results page (SERP) of choice to confirm this. Some are longer and some are shorter. This is only a rule of thumb, not a definite "best practice" anymore.

The "description" meta tag helps websites in three important ways:

"Description" tells the search engine what your page or site is about: For the search engine to understand what your page is about, you need to write a good description. When Google's algorithm decides a description is badly written or inaccurate, it will replace that description with its own version of what is on the page. Wouldn't you prefer to describe your site to potential customers or visitors using your own words rather than leaving it in Google's artificial hands? Look at this example and judge for yourself:


"Description" helps with click through rates to your site: Writing a good description not only helps keep Google from rewriting it, but also helps you get good more people clicking through to your site. A well-written description not only tells users what is on your page, but also entices them to visit your site. A description is what shows up here in the search engine results. It is like good window dressing. Sites with poor descriptions will get less click throughs and the search engines will demote your site in favor of other sites.
"Description" helps with site rankings: The common belief (based on what Google said in 2009) is that nothing in the description will help you get rankings. However, I have seen evidence to the contrary. Is it heavily weighted? No, but if you want some value on a secondary keyword (say an –ing –ed or –s), use it here.
Two other quick notes on meta description tags:

Empty Descriptions: Can a description be empty? Yes. When it is empty Google and Bing will fill it in for you. In fact, sometimes (e.g., for blogs) you may prefer Google's or Bing's version. (Personally though, I always fill it in whenever possible, preferring my version to theirs, but if you have a small staff, this isn't always practical.)
Quotes: Don't use full quotation marks ("") in your description. It will likely cut off your description. Use single quotes to avoid this issue.
The Keywords Meta Tag
A long time ago in a galaxy far, far away, the "keywords" meta tag was a critical element for early search engines. Much like the dinosaurs, this tag is a fossil from ancient search engine times.

The only search engine that looks at the keywords anymore is Microsoft's Bing – and they use it to help detect spam. To avoid hurting your site, your best option is to never add this tag.

Or, if that's too radical for you to stomach, at least make sure you haven't stuffed 300 keywords in the hopes of higher search rankings. It won't work. Sorry.

If you already have keyword meta tags on your website, but they aren't spammy, there's no reason to spend the next week hurriedly taking them out. It's OK to leave them for now – just take them out as you're able, to reduce page weight and load times.

Other Meta Tags
There are many other meta tags, but none are really considered useful nowadays. Many of the tags that we used did things like:

Told the spider when to come back
<meta name="revisit-after" content="30 days">
Told the browser the distribution
< meta name="distribution" content="web">
Told the page to refresh
<meta http-equiv="refresh" content="30">
Told the page to redirect/refresh
<meta http-equiv="refresh" content="x_seconds; url=http://www.yourhost.com/pagetosendto.html">
We don't use these anymore, either because there are better ways (such as schema tagging or server side methods) or because the engines they used to work on are no longer in existence or Google has explicitly told us they are not great ideas (such as redirects at the page level).

NOTE: Schema tagging and rich data snippets are single-handedly the most important (and somewhat quietly announced) change to how your site interacts with the search engines and the search spiders. Learn it. Know it. Implement it.

Robots Meta Tag
The robots tag is still one of the most important tags. Not so much for the proper implementation, but the improper.

The robots meta tag lets you specify that a particular page should not be indexed by a search engine or if you do or do not want links on the page followed.

Believe it or not, it is still common for a site to be deindexed because someone accidentally added a noindex tag to the entire site. Understanding this tag is vitally important.

Here are the four implementations of the Robots Meta Tag and what they mean.

<META NAME="ROBOTS" CONTENT="NOINDEX, NOFOLLOW">
This means: "Do not Index this page. Do not follow the links on the page." Your page will drop OUT of the search index AND your links to other pages will not be followed. This will break the link path on your site from this page to other pages.

This tag is most often used when a site is in development. A developer will noindex/nofollow the pages of the site to keep them from being picked up by the search engines, then forget to remove the tag. When launching your new website, do not trust it has been removed. DOUBLE CHECK!
<META NAME="ROBOTS" CONTENT="INDEX, NOFOLLOW">
This means: "Do Index this page. Do not follow the links on the page." Your page WILL be in the index AND your links to other pages will not be followed. This will break the link path on your site from this page to other pages.
<META NAME="ROBOTS" CONTENT="NOINDEX, FOLLOW">
This means: "Do not Index this page. Do follow the links on the page." Your page will drop OUT of the index BUT your links to other pages will be followed. This will NOT break the link path on your site from this page to other pages.
<META NAME="ROBOTS" CONTENT="INDEX, FOLLOW">
This means: "Do Index this page. Do follow the links on the page." This means your page WILL be in the index AND your links to other pages will be followed. This will NOT break the link path on your site from this page to other pages.
NOTE: The robots tag may be ignored by less scrupulous spiders.

The Charset Tag
Finally, all sites must validate charset. In the U.S., that is the UTF-8 tag. Just make sure this is on your page if you're delivering HTML using English characters.

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
Conclusion
While meta tags aren't the magical solution that you may have heard, they still play an important role in helping your site get found in search engines. Enjoy your metas!

Below are some additional resources to help you on your path to search engine optimization.

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget