NFC & the Growth of Connected Consumer Electronics Devices

Total Page:16

File Type:pdf, Size:1020Kb

NFC & the Growth of Connected Consumer Electronics Devices NFC & The Growth of Connected Consumer Electronics Devices Paula Hunter NFC Solutions Summit June 3-4| Austin, TX Agenda § Internet of Things § Global Market Situation § Convergence - IOT and NFC § NFC Forum Update 2 What is the Internet of Things? 3 What is the Internet of Things? A world in which every device that produces data can connect to the Internet § Remote sensors § Home appliances § Consumer electronics § Heating/cooling systems § Office equipment § Automobile engines … and many, many more 4 What is the Internet of Things? § The Internet of Things removes barriers: – Machine-to-machine – Machine-to-people – People-to-machine § The Internet of Things promises: – Greater access to data – Greater management of data – Greater control of devices § Gartner: 26+ billion connected devices by 2020 5 Benefits of the Internet of Things § Increased productivity § Fewer steps § Less data re-entry § Greater, easier control § Better coordination § Data analytics § Cost savings 6 Business Examples of the Internet of Things According to Information Week: § Union Pacific cut train derailments by 75% using remote sensors § Dubai Aluminum used sensor data to improve efficiency and increase output by 3.4% § FedEx expects to save $9 million/year with truck sensors for more efficient dock assignments 7 Consumer Examples of the Internet of Things § Wearable baby monitors § Cars that send alerts for service needs § Smart thermostats that automatically adjust the temperature § Ovens that preheat in time for your arrival home … and many more 8 What Does the Internet of Things Require? NFC Provides: § An inexpensive § NFC-enabled chips means of providing intelligence § Easy network § NFC Connection access Handover § A way to link § NFC tags physical objects to the online world § A means of easy § Intuitive tap user control interface 9 NFC Technology Global Market Situation 10 Recent Developments § First NFC-enabled household appliances launched § Wearables market takes off § First nationwide NFC payments rollout in US § New HCE feature in Android 4.4 § Top payment associations launch HCE solutions § Major North American coffee shop launches NFC pay § New NFC/Bluetooth LE solutions – Smart thermostats, hybrid beacons 11 NFC Phones Available Now (Representative) § Flagship models with NFC § Samsung Galaxy S4 & S3 § LG G2, select Optimus series § HTC One series § Motorola Moto X § Blackberry Z10 & Q10 § Nokia select Lumia series § Sony select Xperia series § Google Nexus 4/7/10, Galaxy Nexus § Android, BlackBerry, Windows Phone 8 all support NFC at operating system level § 100% of Top 25 Amazon US contract phones 12 NFC Tablets (Representative) NFC-enabled tablets on the market or coming soon Asmaitha Sruta Asus Padfone Asus Padfone 2 Asus Vivo Tab/ 7” Tablet Infinity Asus Vivo Tab Tab RT Smart DLI Fujitsu BWC ToughSlate 7″Cetrix CT973G Cetrix CD661 9000 Arrows Tab Google Nexus Google Nexus HP Elitepad HP Elitebook Kuoziro 7 10 900 Revolve FT701W 13 13 More NFC Devices Additional types of NFC devices available now or on the way Moneto: NFC Barclay Card Glidepoint NFC I-O Data Nintendo Wii U microSD for the Payment wristbands trackpad WiFi Router controllers iPhone & Android RhythmTrak Revosys V5 taxi Samsung NFC-enabledSmart Meters for Sony RC-S380 ViVOtech NFC Heart Monitor terminal/tablet laser printer utility companies reader/writer payment terminals 14 NFC Laptops HP Envy x2 Lenovo ThinkPad Helix Sony Vaio Fit 15 More N-Marks in the World N-Mark Licenses per Year 843 722 517 198 217 2009 2010 2011 2012 2013 2,708 downloads since 2009 16 Analyst Forecasts § ABI Research – 125M NFC handsets shipped in 2012; 285M shipped in 2013; 500+M in 2014 – NFC-enabled smartphone shipments are anticipated to increase by 481% from 2012 to 2015 § Berg Insight – 1 in 3 mobile phones will come with NFC by 2017 – From 2012 to 2017, installed base of NFC handsets will increase at a CAGR of 65% to reach 2.1bn units – By 2017, the penetration rate for NFC in handsets will reach approximately 32% § Gartner – 50% of smartphones will have NFC capability by 2015 § IHS Technology – Two in three phones will come with NFC by 2018 – Annual shipments increasing from 275M units in 2013 to 1.2B units in 2018 § Juniper Research – 1.5B+ mobile wallets in use around the world by 2018 – By 2017, 1 in 4 US consumers will use NFC-enabled devices to pay for goods in-store 17 Convergence of NFC and IOT 18 Recent NFC Developments Supporting the Internet of Things Bluetooth 4.0 • Extends power and reach of NFC • Enables seamless customer experience Wi-Fi Alliance • Extends power and reach of NFC • Enables seamless customer experience Host Card Emulation (HCE) • Supports easy development NFC model and deployment of NFC solutions 19 Updated Bluetooth Secure Simple Pairing with NFC § Application Document guides developers in building solutions that seamlessly combine Bluetooth and NFC § Updated to include Bluetooth® Smart devices and Bluetooth LE § Product of formal liaison with Bluetooth SIG signed last November 20 Wi-Fi Alliance Pushes the NFC Button § Wi-Fi CERTIFIED Wi-Fi Protected Setup™ now includes NFC “tap- to-connect” for simple setup of security-protected Wi-Fi devices and networks § Extends the reach of Wi-Fi Protected Setup to smart home devices (refrigerators, thermostats, security systems) with a single tap § Key enabler for the Internet of Things 21 HCE on Android 4.4 Secure Element http://developer.android.com/guide/topics/connectivity/nfc/hce.html New mode introduction: Host Card Emulation and RW mode covered, additional to P2P mode (Android Beam) 22 NFC in the Internet of Things eProvenance § Temperature/humidity sensors in fine wine cases § Provides data en route with a tap of an NFC-enabled device § Tracks cold chain for quality § Ensures provenance 23 NFC in the Internet of Things Touch an NFC-enabled phone to the TV remote and its screen is instantly mirrored on the TV 24 NFC in the Internet of Things § Smart Lighting § Link energy-harvesting wireless light switches to a home network with a touch an NFC-enabled phone § Simplifies setup and control 25 NFC in the Internet of Things NFC-enabled appliances allow control from anywhere and receive helpful Web content. 26 NFC in the Internet of Things NFC-enabled vending machines § Pay with a tap § Earn loyalty points 27 The NFC Forum 28 Mission and Goals § The mission of the NFC Forum is to advance the use of NFC technology by: § Developing standards-based specifications that ensure interoperability among devices and services § Encouraging the development of products using NFC Forum specifications § Educating the market globally about NFC technology § Ensuring that products claiming NFC capabilities comply with NFC Forum specifications § Promoting the NFC Forum N-Mark 29 Members – February 2014 SPONSOR MEMBERS PRINCIPAL MEMBERS 30 Members – February 2014 ASSOCIATE MEMBERS 31 Members – February 2014 IMPLEMENTER MEMBERS NONPROFIT MEMBERS 32 New Set of Integrated Specifications § NFC Activity 1.1 § Connection Handover 1.3 § NCI 1.1 § Digital Protocol 1.1 § LLCP 1.2 § Type 1/2/3/4 Tags … designed for use together to streamline and accelerate NFC product development Mediated Handover is a new feature of Connection Handover 1.3 33 Special Interest Group Sectors Consumer Transport Health Payment Retail Electronics Air Transport & Financial PC, Tablet, Ticketing Pharmacy Institutions Product Tags Embedded Public Transport Terminal Handsets, & Ticketing Insurance Manufacturers POS, Vending Remote Controls Computer Other Transport Peripherals Schemes Clinic Merchants Coupons Appliances Hospital …future… Management …future... Points, Rewards Personal Auto Potential to establish additional working groups as partners identify high market importance and opportunity 34 Liaison Partners 35 NFC Is Here! Still Some Challenges to Overcome 1 NFC adoption varies by region. Payment is complex due to multiple players 2 and business models. Solutions and simpler models like HCE are underway. Customer awareness limited outside Asia, 3 fewer opportunities to experience NFC. The NFC Forum is the place to foster 4 adoption and help overcome challenges. 36 Thank You … and Join Us! www.nfc-forum.org 37 .
Recommended publications
  • Your HTC One® VX User Guide 2 Contents Contents
    Your HTC One® VX User guide 2 Contents Contents Unboxing HTC One VX 10 Back cover 11 SIM card 13 Storage card 14 Charging the battery 15 Switching the power on or off 15 Setting up your phone Setting up HTC One VX for the first time 17 Home screen 17 Getting contacts into HTC One VX 18 Transferring contacts from your old phone through Bluetooth 19 Getting photos, videos, and music on or off HTC One VX 19 Getting to know your settings 20 Updating the HTC One VX software 20 Your first week with your new phone Features you'll enjoy on HTC One VX 22 Touch gestures 24 Motion gestures 27 Sleep mode 29 Unlocking the screen 30 Making your first call 30 Sending your first text message 31 The HTC Sense keyboard 31 Notifications 31 Copying and sharing text 34 Capturing the HTC One VX screen 35 Switching between recently opened apps 35 Can't find the Menu button? 35 Checking battery usage 36 Camera Camera basics 37 Taking a photo 38 Recording video 38 Keeping the camera on standby 39 Taking continuous camera shots 39 3 Contents Camera scenes 40 Improving portrait shots 40 Taking a group shot 40 Taking a panoramic photo 40 Using HDR 41 Recording videos in slow motion 41 Improving video stability 41 Changing camera and video settings 42 Personalizing Making HTC One VX truly yours 43 Personalizing HTC One VX with scenes 43 Changing your wallpaper 44 Applying a new skin 45 Personalizing your Home screen with widgets 45 Adding apps and other shortcuts on your Home screen 46 Rearranging or removing widgets and icons on your Home screen 47 Personalizing
    [Show full text]
  • Trusense: Information Leakage from Trustzone
    TruSense: Information Leakage from TrustZone Ning Zhang∗, Kun Suny, Deborah Shandsz Wenjing Lou∗z, Y. Thomas Hou∗ ∗Virginia Polytechnic Institute and State University, VA yGeorge Mason University, Fairfax, VA zNational Science Foundation, Arlington, VA Abstract—With the emergence of Internet of Things, mobile Unlike software exploitations that target vulnerabilities in devices are generating more network traffic than ever. TrustZone the system, side-channel attacks target information leakage of is a hardware-enabled trusted execution environment for ARM a physical implementation via its interactions with the execu- processors. While TrustZone is effective in providing the much- needed memory isolation, we observe that it is possible to derive tion environment. Side-channel information can be obtained secret information from secure world using the cache contention, from different types of physical features, such as power [10], due to its high-performance cache sharing design. electromagnetic wave [11], acoustic [12] and time [13], [14], In this work, we propose TruSense to study the timing-based [15]. Among these side channels, the cache-based timing cache side-channel information leakage of TrustZone. TruSense attack is one of the most important areas of research [14], can be launched from not only the normal world operating system but also a non-privileged user application. Without access [15], [16], [8], [17], [18]. to virtual-to-physical address mapping in user applications, we Processor cache is one of the basic components in mod- devise a novel method that uses the expected channel statistics ern memory architecture to bridge the gap between the fast to allocate memory for cache probing.
    [Show full text]
  • Winnovative HTML to PDF Converter for .NET
    Convert iTunes Movies to Android Tablets &Phones TunesKit for Mac For Windows Buy Resource Tutorial Support How to Convert iTunes Movies to Android Phones and Tablets Posted by Andy Miller on August 22, 2014 11:05:35 AM. iTunes as the world's biggest digital content store, also attracts many android fans to buy or rent movies, songs or iBooks here. However, the problems come up when they realized the DRM protection existing. All Apple movies are copy protected by Fairplay DRM protection. The consumers are not allowed to transfer their purchased or rented movies to any Non‐apple devices, of course including the Android phones and tablets. What to do if the android fans want to watch the iTunes movies to their Samsung Galaxy S5 or Galaxy Tab/Note, orHTC one M8, or even Amazon Kindle Fire? You know all these Android devices' screen is larger than iPhone. Crack iTunes DRM and Convert iTunes Movies to Android Devices To convert and transfer the iTunes purchased or rented movies to our android phones or tablets, we have to remove the DRM from iTunes movies at first. TunesKit iTunes DRM Media Converter is a great choice to help you accomplish your task. With TunesKit DRM Media Converter, we can easily get rid of the Fairplay DRM protection from both iTunes purchased and rented movies/TV shows. It converts iTunes DRMed M4V to common MP4 format which can be supported by any android phones and tablets well. The important reason we recommend it is that it can do this work very fast, nearly 20x faster than other similar application.
    [Show full text]
  • 130 Demystifying Arm Trustzone: a Comprehensive Survey
    Demystifying Arm TrustZone: A Comprehensive Survey SANDRO PINTO, Centro Algoritmi, Universidade do Minho NUNO SANTOS, INESC-ID, Instituto Superior Técnico, Universidade de Lisboa The world is undergoing an unprecedented technological transformation, evolving into a state where ubiq- uitous Internet-enabled “things” will be able to generate and share large amounts of security- and privacy- sensitive data. To cope with the security threats that are thus foreseeable, system designers can find in Arm TrustZone hardware technology a most valuable resource. TrustZone is a System-on-Chip and CPU system- wide security solution, available on today’s Arm application processors and present in the new generation Arm microcontrollers, which are expected to dominate the market of smart “things.” Although this technol- ogy has remained relatively underground since its inception in 2004, over the past years, numerous initiatives have significantly advanced the state of the art involving Arm TrustZone. Motivated by this revival ofinter- est, this paper presents an in-depth study of TrustZone technology. We provide a comprehensive survey of relevant work from academia and industry, presenting existing systems into two main areas, namely, Trusted Execution Environments and hardware-assisted virtualization. Furthermore, we analyze the most relevant weaknesses of existing systems and propose new research directions within the realm of tiniest devices and the Internet of Things, which we believe to have potential to yield high-impact contributions in the future. CCS Concepts: • Computer systems organization → Embedded and cyber-physical systems;•Secu- rity and privacy → Systems security; Security in hardware; Software and application security; Additional Key Words and Phrases: TrustZone, security, virtualization, TEE, survey, Arm ACM Reference format: Sandro Pinto and Nuno Santos.
    [Show full text]
  • Characterizing and Detecting Compatibility Issues for Android Apps
    Taming Android Fragmentation: Characterizing and Detecting Compatibility Issues for Android Apps Lili Wei, Yepang Liu, Shing-Chi Cheung Department of Computer Science and Engineering The Hong Kong University of Science and Technology, Hong Kong, China {lweiae, andrewust, scc}@cse.ust.hk ABSTRACT Android smartphones and tablets, it has also induced the Android ecosystem is heavily fragmented. The numerous heavy fragmentation of the Android ecosystem. The frag- combinations of different device models and operating sys- mentation causes unprecedented challenges to app develop- tem versions make it impossible for Android app developers ers: there are more than 10 major versions of Android OS to exhaustively test their apps. As a result, various compat- running on 24,000+ distinct device models, and it is imprac- ibility issues arise, causing poor user experience. However, tical for developers to fully test the compatibility of their little is known on the characteristics of such fragmentation- apps on such devices [4]. In practice, they often receive induced compatibility issues and no mature tools exist to complaints from users reporting the poor compatibility of help developers quickly diagnose and fix these issues. To their apps on certain devices and have to deal with these bridge the gap, we conducted an empirical study on 191 issues frequently [7, 53]. real-world compatibility issues collected from popular open- Existing studies have investigated the Android fragmen- source Android apps. Our study characterized the symp- tation problem from several aspects. For example, Han et toms and root causes of compatibility issues, and disclosed al. were among the first who studied the compatibility is- that the patches of these issues exhibit common patterns.
    [Show full text]
  • Sony Computer Entertainment Announces Htc As Part of the Playstation™Certified License Program
    SONY COMPUTER ENTERTAINMENT ANNOUNCES HTC AS PART OF THE PLAYSTATION™CERTIFIED LICENSE PROGRAM PLAYSTATION®SUITE RENAMED “PLAYSTATION®MOBILE” Further Proliferate The PlayStation® Experience Across Mobile Devices Tokyo, June 5, 2012 – Sony Computer Entertainment Inc. (SCE) today announced HTC Corporation (HTC) will join the PlayStation™Certified license program*1. By collaborating with HTC, a global designer of smartphones and the world’s first company to launch Android-powered devices, SCE aims to deliver the PlayStation® experience to even more users around the world. “HTC is focused on delivering innovative mobile experiences for people everywhere and SCE’s immersive world of gaming will bring compelling entertainment to HTC One customers across the globe,” said Kouji Kodera, Chief Product Officer, HTC Corporation. In addition to third party developers and publishers as well as a wide range of content developers who have agreed to develop content for PlayStation®Suite, SCE Worldwide Studios is developing attractive games. SCE is positioned to proliferate the world of PlayStation across mobile devices with the progress of content development and the expansion of PlayStation Certified devices. In conjunction with this development, SCE will rename PlayStation Suite to PlayStation®Mobile, and position it as a new platform. SCE will further accelerate the expansion of PlayStation Certified devices and continue to collaborate with content developers to drive the delivery of compelling entertainment experiences through PlayStation Mobile. - more - 2-2-2-2 SONY COMPUTER ENTERTAINMENT ANNOUNCES HTC AS PART OF THE PLAYSTATION™CERTIFIED LICENSE PROGRAM About PlayStation®Mobile PlayStation®Mobile marries fun, engaging PlayStation-style gaming with the convenience of PlayStation™Certified mobile devices and offers mobile users a superlative store navigation and purchase experience.
    [Show full text]
  • Mobile Phones/Tablets Iphone 4, 4S, 5, 5C, 5S, 6, 6+, 6S, 6S+, 7
    Mobile Phones/Tablets iPhone 4, 4S, 5, 5C, 5S, 6, 6+, 6S, 6S+, 7, 7+, SE All Repairs Supported iPhone 7, 7+ Home Button Not Replaceable iPad – All Models Screen Replacement Only Nokia Lumia – All Models All Repairs Supported Samsung Galaxy S, S2, S3, S4 All Repairs Supported Samsung Galaxy S5, S6, S7 Screen Replacement Only Samsung Galaxy A Series All Repairs Supported Samsung Galaxy Note Series All Repairs Supported Samsung Galaxy Tab Series All Repairs Supported HTC One Series All Repairs Supported HTC Desire Series All Repairs Supported Sony Xperia Z/X Series No Repairs Supported Google Nexus Series All Repairs Supported Motorola – All Models All Repairs Supported Nokia – All Models All Repairs Supported Blackberry – All Models All Repairs Supported LG – All Models All Repairs Supported Huawei – All Models All Repairs Supported Lenovo – All Models All Repairs Supported Microsoft – All Models All Repairs Supported Xiaomi – All Models All Repairs Supported Acer – All Models All Repairs Supported Asus – All Models All Repairs Supported Oppo – All Models All Repairs Supported OnePlus – All Models All Repairs Supported Vodafone – All Models All Repairs Supported Archos – All Models All Repairs Supported Kobo – All Models All Repairs Supported Advent – All Models All Repairs Supported Amazon Kindle Fire – All Models All Repairs Supported Barnes & Noble – All Models All Repairs Supported Amazon Phone – All Models All Repairs Supported Toshiba – All Models All Repairs Supported Dell – All Models All Repairs Supported MSI – All Models All Repairs
    [Show full text]
  • QSEE Trustzone Kernel Integer Overflow Vulnerability
    QSEE TrustZone Kernel Integer Overflow Vulnerability Dan Rosenberg [email protected] July 1, 2014 1 Introduction This paper discusses the nature of a vulnerability within the Qualcomm QSEE TrustZone implementation as present on a wide variety of Android devices. The actual exploitation mechanisms employed in the proof-of-concept exploit are not covered in this document. 2 Software Description \ARM TrustZone technology is a system-wide approach to security for a wide array of client and server computing platforms, including handsets, tablets, wearable devices and enterprise systems. Applications enabled by the technol- ogy are extremely varied but include payment protection technology, digital rights management, BYOD, and a host of secured enterprise solutions." [2] 3 Background TrustZone segments both hardware and software into \secure" and \non-secure" domains, referred to as \worlds". The non-secure world includes the traditional operating system kernel and its corresponding userland applications, while the secure world often includes a trusted operating system referred to as a Trusted Execution Environment (TEE). Software running in the secure world has privi- leged access to all hardware and the non-secure world, but the non-secure world is restricted from accessing device peripherals and memory regions designated by TrustZone as protected. The non-secure world may issue requests to the secure world via a number of mechanisms, including the privileged Secure Mon- itor Call (SMC) ARM instruction. Further documentation on TrustZone may be found on ARM's website [1]. 1 4 Affected Devices The vulnerability described in this document affects Qualcomm's implementa- tion of the Trusted Execution Environment (\QSEE") as present on a wide variety of Android mobile devices.
    [Show full text]
  • HTC- May Survive in Bipolar World
    Netra Pal Singh1 JEL: Q55, O14 DOI: 10.5937/industrija44-9853 UDC: 005.591.6 338.45:621.395.721.5 Case research HTC- May Survive in Bipolar World Article history: Received: 26 December 2015 Sent for revision: 5 February 2016 Received in revised form: 3 July 2016 Accepted: 3 July 2016 Available online: 8 October 2016 Abstract: The core assets of HTC are people, innovations, and technology. But in the recent quarters, HTC has started retrenching people even from R&D divisions which are responsible for innovation and developing new technologies. It means HTC’s core assets are depleting. HTC was known for its cutting edge technology of 16mp camera and high speed '4G' technology but performing badly in the last two and half year. Why is it so? Paper objectives are to identify reasons for its downfall of HTC, distress signals for HTC downfall, and possible revival strategies for survival of HTC in Bipolar world (Samsung and Apple) of smartphones makers. In addition, research paper present eight research proposition/ questions with respect to present state of HTC and its future and possible answers to these research propositions/ questions. Research paper ends with concluding remarks in the context of HTC future. Keywords: HTC, Android, Window, Innovation, Cutting edge technology, Bipolar World, Smartphone. Šanse HTC-a da preživi u bipolarnom svetu Apstrakt: Ljudi, inovacije i tehnologija su ključni resursi HTC-a. Međutim, u poslednjih nekoliko meseci, HTC je počeo da otpušta ljude čak iz sektora za istraživanje i razvoj koji su odgovorni za inovacije i razvoj novih tehnologija. To znači da se HTC-ovi ključni resursi osipaju.
    [Show full text]
  • Security Analysis of Android Factory Resets
    Security Analysis of Android Factory Resets Laurent Simon Ross Anderson University of Cambridge University of Cambridge [email protected] [email protected] Abstract File system yaffs2 ext4 With hundreds of millions of devices expected to be MTD device Block device traded by 20181, flaws in smartphone sanitisation functions Device driver N N+1 N+2 N+3 N N+1 N+2 N+3 2 could be a serious problem. Trade press reports have al- Mapping after overwrite Original block mapping of block N ready raised doubts about the effectiveness of Android “Fac- Controller tory Reset”, but this paper presents the first comprehensive study of the issue. We study the implementation of Factory Flash memory N N+1 N+2 N+3 M N N+1 N+2 N+3 Reset on 21 Android smartphones from 5 vendors running Fig. 1. Yaffs2 with raw flash access vs. Ext4 with logical block access. Android versions v2.3.x to v4.3. We estimate that up to 500 On an eMMC (right), the logical block N is mapped to the physical block million devices may not properly sanitise their data partition N + 3 by the eMMC, and remapped to block M after an overwrite. MTD where credentials and other sensitive data are stored, and stands for Memory Technology Device. up to 630M may not properly sanitise the internal SD card where multimedia files are generally saved. We found we discusses practical solutions to mitigate these problems (Sec- could recover Google credentials on all devices presenting a tion III and Section VI).
    [Show full text]
  • Livescribe+ & Livescribe Link Android Application End
    LIVESCRIBE+ & LIVESCRIBE LINK ANDROID APPLICATION END USER LICENSE AGREEMENT LIVESCRIBE, INC. ("LIVESCRIBE") MAKES AVAILABLE THE LIVESCRIBE+ OR LIVESCRIBE LINK APPLICATION, AS THE CASE MAY BE (THE "APPLICATION"), SUBJECT TO THE LICENSE TERMS SET FORTH BELOW (THIS "AGREEMENT"). THE TERM "APPLICATION" INCLUDES THE SOFTWARE ITSELF, TOGETHER WITH ANY AND ALL ONLINE AND/OR ELECTRONIC DOCUMENTATION, ASSOCIATED MEDIA AND MATERIALS. YOU ARE SOLELY RESPONSIBLE FOR ALL TELECOMMUNICATIONS AND OTHER CONNECTIVITY CHARGES INCURRED THROUGH YOUR USE OF THE APPLICATION. PERSONAL INFORMATION WHICH YOU MAY PROVIDE IN CONNECTION WITH THIS AGREEMENT IS GOVERNED BY LIVESCRIBE’S PRIVACY POLICY, SET FORTH AT www.livescribe.com/legal/privacy.html. BY DOWNLOADING, INSTALLING, AND/OR USING THE APPLICATION, YOU ACCEPT AND EXPRESSLY CONSENT TO ALL TERMS OF THIS AGREEMENT, AS IT MAY BE UPDATED FROM TIME TO TIME IN LIVESCRIBE'S SOLE DISCRETION. IMPORTANT NOTE REGARDING COPYRIGHTED MATERIALS: The Application is licensed to you only for reproduction of materials (i) which are not subject to copyright protection, (ii) for which any applicable copyright has expired, (iii) which are otherwise in the public domain, (iv) in which you own the copyright, and/or (v) which you are expressly authorized or are otherwise legally permitted (e.g. under the "fair use doctrine") to reproduce. If you are uncertain about your right to copy or permit access to any particular materials, you should contact your legal advisor. CONSENT TO USE OF DATA. You agree that Livescribe and its affiliated companies may collect and use usage data, including but not limited to technical information about your Smartpen, your usage of your Smartpen (e.g., monthly minutes usage, etc.), your usage of the Application, your usage of any Smartpen application software, and the version of your computer operating system and related system software.
    [Show full text]
  • Buying Tips for Smartphones Across All Price Ranges
    Buying Tips for Smartphones Across All Price Ranges Confused over which smartphone to by in this festive season? We’re not surprised given the plethora of options that are out there. Here are some buying tips and some smartphone recommendations across all price ranges - Rohit Arora uying a smartphone can be a tough task when smartphones like HTC One series and LG G2, G3 etc. Even you have so many options available in the Apple uses LCD panels by the name Retina display that market. So here we are with some essential has a particular resolution of 640x960 in iPhone 4, 4S and Bbuying tips that can help you make the right 640×1136 in iPhone 5 and 5S. choice this festive season. Display protection methods Displays Smartphone displays have a coating to protect them from The screen is the first thing you notice when you buy a scratches and accidental falls. The two widely used coatings smartphone as this is the gateway to the smartphone are Gorilla Glass and Dragontail. These are actually alkali- experience. You should look for at least an HD screen aluminosilicate glass shields that have damage resistance (1280x720) as text look sharp, crisp and pixels can’t be properties to protect the screens. differentiated on it. At present, the display technologies which are used in smartphones are listed below: Processor and RAM Smartphones usage is all about multitasking, shifting from AMOLED & Super AMOLED application to application with no time-lag. AMOLED stands for Active-Matrix Organic Light-Emitting A faster processor will reduce the calculation time and Diode and are commonly seen in Samsung phones.
    [Show full text]