World Tech M&A Report 2015

Total Page:16

File Type:pdf, Size:1020Kb

World Tech M&A Report 2015 WORLD TECH M&A REPORT 2015 www.corumgroup.com 2015 – ANOTHER RECORD YEAR? 2015 will continue the LUMINARY PANEL record pace established Thanks to our luminary panelists who took part in “Forecast 2015: last year in all 29 Global Tech M&A.” For more of their thoughts on the technology market sectors around landscape, view the original webcasts at www.corumgroup.com. the world, with Asia growing the fastest. This “I think the big disruption is going to come from report profiles those building ‘containers for trust’ for data, rethinking the sectors, who’s doing the way things are done so that identity and protection deals and valuations. and trust are the new defaults.” For the second year, we PETER COFFEE, SALESFORCE are profiling the Corum Top Ten Disruptive Technology Trends, with “Things become apps become services that individual reports by Corum’s top executives. become context available, which changes the way These trends are driving tech M&A, fueled by entertainment, social, work, transportation, and even nearly $2 trillion available to both strategic and reality function.” financial buyers. REESE JONES, SINGULARITY UNIVERSITY Special thanks to our panel of industry luminaries “We’re excited about software-enabled business models, for their insights and contribution to this report: not software or SaaS oriented, but consumer-related Peter Coffee from Salesforce, Reese Jones from services that allow an end user to subscribe to a solution Singularity University, Mukund Mohan from as opposed to buy or rent a piece of software.” Microsoft Ventures and Dr. Karl Popp from MUKUND MOHAN, MICROSOFT VENTURES SAP. They were joined by leaders from the Private Equity community: George Kase from “SAP as a company has a clear strategy. Marlin Equity, John Hodge from Rubicon, Blair We want to make the world run better and Greenberg from Bregal Sagemount and Martin improve people’s lives.” Scott from Riverside. DR. KARL POPP, SAP All presentations are archived under “Forecast 2015 – Global Tech M&A Report” at our website, corumgroup.com. We invite you to join us for monthly valuation updates the second PRIVATE EQUITY PANEL Thursday of each month. Further, we look forward to seeing you at one of our 150 live tech “Larger corporations are looking for smaller, innovative M&A educational events this year in every major companies to grow their top line. M&A is a major tool city (profiled in the back of this report). These for the larger strategics to grow their business. ” conferences and workshops are for sellers – the JOHN HODGE better educated you are on the complexities that RUBICON TECHNOLOGY PARTNERS derail most mergers, the greater your chances to successfully sell your company. “We are particularly seeking areas where innovative technology can enter well-established markets and Bruce Milne Conference Chair provide market innovation or disruption.” MARTIN SCOTT THE RIVERSIDE COMPANY “If I were a CEO of a technology business, I would make sure I had the KPIs right to ensure the quality of my recurring revenue.” Data for this report was compiled by Corum Group, the GEORGE KASE world’s leading seller of privately held software, Internet, MARLIN EQUITY PARTNERS IT and related companies. For further information, please contact Elon Gasper, V.P. Research at +1 425 455 8281 or “As executives build out their businesses, retention [email protected]. rates and deep integrations with their customers are what we look at most stringently.” © 2015 Corum Group Ltd. All Rights Reserved. BLAIR GREENBERG BREGAL SAGEMOUNT 1 corumgroup.com WORLD TECH M&A REPORT 2015 MARKET SET NEW HIGH ROBUST PUBLIC MARKETS DRIVE M&A 20% 2014 Public Markets Public stock markets hit new records in 2014, fueled by easy Weekly Percentage Change money and global growth, trends that continued in 2015. In NASDAQ S&P TECH Dow Jones 15% the technology sector, the disruptive tech trends profiled in this report resulted in double-digit M&A gains. Both strategic and 10% financial buyers set new highs for acquisitions, fueled by excess cash and record debt financing due to low interest cost. 2015 5% continues this pace. 0% TECH M&A PEAKS TRACK MARKET PEAKS -5% Technology acquisitions closely track the success of public JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC markets as reflected in the adjoining chart. With new peaks in the stock market, we expect the current high in valuations and deal NASDAQ PEAKS 1995–2015 volume to continue. However, if the tide turns, the M&A markets 5K drop quickly and precipitously. Not only do valuations tumble, but offers dry up. 4K While the current bull market is one of the longest in modern 3K history, there is increased turbulence in the geopolitical scene, along with concerns about currencies, interest rates and inflation. 2K History has taught us that no bull market lasts forever. During past market peaks, some firms have waited for the perfect moment, 1K only to wait too long. There’s no harm going to market early; it 0 can provide valuable feedback and build important relationships ‘95 ‘00 ‘05 ‘10 ‘15 that could increase a company’s ultimate value. CORUM TOP Technology companies cannot ignore the help them continue that disruptive success. disruptive technologies changing lives and TEN DISRUPTIVE Each year, Corum compiles a list of the transforming markets. Even the largest key trends driving deals, drawn from TECHNOLOGY firms must adapt to these trends or fall transactions in every sector, spanning TRENDS 2015 behind. No technology leader has the hundreds of events, global reports and foresight to always lead the innovation information from conversations with all of curve, and the most successful acquire the the buyers. 2015 has produced a particularly pioneering companies with the expertise to instructive set. MAJORITY ONLINE OMNI-CHANNEL DIGITAL IOT MOBILIZATION EXCHANGES MARKETING CURRENCY FLOW SOFTWARE CRITICAL MASS OF CONNECTING CONSISTENT DECREASING FRICTION EMERGING PLATFORMS, CONNECTED USERS CREATORS & MESSAGING ACROSS IN PAYMENTS & STANDARDS & CONSUMERS CHANNELS EXCHANGE ANALYTICS CONNECT ENMESHED DIGITAL FORCE POSITIONING SPORTS & DATA SYSTEMS MULTIPLIERS INTELLIGENCE GAMING SECURITY BLURRING THE LINES IN-HOUSE TOOLS PIVOTAL LEVELS REACHING PIVOTAL BUILDING BARRIERS CREATE BETWEEN SOFTWARE & TRANSFORM TRADITIONAL OF PRECISION & MOMENT IN IN AN AGE OF HARDWARE FIRMS INTO TECH FIRMS UNDERSTANDING CULTURE & TECH BLURRED LINES WORLD TECH M&A REPORT 2015 corumgroup.com 2 TECHNOLOGY ACQUIRERS SET NEW RECORDS STRATEGIC BUYERS SET NEW M&A RECORD Google reclaimed its top spot on the buyers TOP STRATEGIC ACQUIRERS: 2014 leaderboard with 37 acquisitions, a new high 37 for annual acquisitions by a strategic buyer. They started 2014 with two bold major acquisitions: consumer product purchase of Nest for $3.6B and London-based AI lab, 22 DeepMind. They both became platform 19 18 companies for Google to make other 14 14 13 12 acquisitions. Nest acquired home security 10 10 9 9 9 and monitoring firm Dropcam for $555M. DeepMind made two bolt-on acquisitions in artificial intelligence and online advertising, capping their buying spree by paying $500M for Skybox Imaging, a leader in light- ramped its deal volume by 157%, rolling TOP STRATEGIC BUYERS TOP PRIVATE EQUITY BUYERS weight satellites, imagery and related data 2012 2013 2014 2012 2013 2014 processing. up companies in digital media, backup and email security. 39 The runner-up among the acquirers was 37 Another fast mover, Dropbox, more 31 WPP, who, along with competitor Publicis, 30 than doubled its tech M&A purchases, led a wave of digital ad agency consolidation. 26 including facial and object recognition firm While some deals were direct, most 22 21 20 Kriegman-Belhumeur Vision Technology 19 acquisitions were through nearly a dozen 18 17 different subsidiaries. (KBVT) to help organize photos stored in 14 Dropbox accounts. 13 12 Yahoo, the previous year’s leader, dropped 7 8 to third, narrowing its strategy with a twin A number of perennial top buyers increased 5 6 focus on monetization and mobility. their pace, including Microsoft, EMC and Google WPP Yahoo Insight Venture Vista Equity Partners ABRY Partners Facebook. Partners Just behind Yahoo was business cloud TOP STRATEGIC BUYERS TOP PRIVATE EQUITY BUYERS services vendor j2 Global. The company 2012 2013 2014 2012 2013 2014 39 PRIVATE EQUITY SETS NEW RECORD FOR ACQUISITIONS37 Private Equity also made a record-breaking The chart showing the number of deals 31 number of deals in 2014, many of them from 2012-2014 for leading Strategic3 0vs. smaller tech bolt-ons for existing portfolio Financial buyers 26shows that the top PE 22 21 companies. Such acquisitions enabled firms dramatically increased the number 20 19 Insight Venture Partners to nearly double of transactions18 in 2014 due to smaller 17 14 its number of transactions, repeating as top transactions funded through1 their3 portfolio 12 PE acquirer for the year. companies. For the first7 time, the top ten 8 5 6 Vista Equity, while second in deal number, PE buyers beat the top ten strategic buyers in volume. Google WPP Yahoo Insight Venture Vista Equity Partners ABRY Partners was the top acquirer in terms of total value Partners with three megadeals, including the largest PE deal of the year, the $4.3B acquisition of 39 TOP PRIVATE EQUITY ACQUIRERS: 2014 TIBCO. Vista quickly followed up buying transaction processing services provider 31 TransFirst for an estimated $1.5B, then UK ERP provider, Advanced Computer Software, for $1.1B, a 3.3x multiple. 20 17 Coming in third was ABRY Partners with 20 16 15 transactions, most through bolt-ons to their 13 13 13 12 11 10 10 10 existing portfolio. For example, in the M2M space, RacoWireless was added to ABRY’s KORE Wireless, and Hopster acquired the digital coupon company, Inmar, and other firms.
Recommended publications
  • Tutorial Blogspot Plus Blogger Templates
    Tutorial Blogspot Plus Blogger Templates To Bloggers Everywhere 1 2 Contents Contact Us 25 Cara daftar Gmail 25 Cara daftar Blogger pertama kali 27 Cara login ke blogger pertama kali 28 Kontrol panel blogger (dashboard) 29 Cara posting di blogger 30 Halaman Pengaturan (menu dasar) 31 Banyak malware yang ditemukan google 32 Google ! Mesin pembobol yang menakutkan 32 Web Proxy (Anonymous) 33 Daftar alamat google lengkap 34 Google: tampil berdasarkan Link 37 Oom - Pemenang kontes programming VB6 source code 38 (www.planet-sourc... Oom - Keyboard Diagnostic 2002 (VB6 - Open Source) 39 Oom - Access Siemens GSM CellPhone With Full 40 AT+Command (VB6 - Ope... Oom - How to know speed form access (VB6) 40 Para blogger haus akan link blog 41 Nama blog cantik yang disia-siakan dan apakah pantas nama 41 blog dipe... Otomatisasi firewalling IP dan MAC Address dengan bash script 43 Firewalling IP Address dan MAC Address dengan iptables 44 Meminimalis serangan Denial of Service Attacks di Win Y2K/XP 47 Capek banget hari ini.. 48 3 daftar blog ke search engine 48 Etika dan cara promosi blog 49 Tool posting dan edit text blogger 52 Setting Blog : Tab Publikasi 53 Wordpress plugins untuk google adsense 54 Google meluncurkan pemanggilan META tag terbaru 54 “unavailable after” Setting Blog : Tab Format 55 Melacak posisi keyword di Yahoo 56 Mengetahui page ranking dan posisi keyword (kata kunci) anda 56 pada S... Percantik halaman blog programmer dengan "New Code 57 Scrolling Ticke... 20 Terbaik Situs Visual Basic 58 BEST BUY : 11 CD Full Source Code Untuk Programmer 60 Tips memulai blog untuk pemula 62 Lijit: Alternatif search untuk blogger 62 Berpartisipasi dalam Blog "17 Agustus Indonesia MERDEKA" 63 Trafik di blog lumayan, tapi kenapa masih aja minim komentar? 64 Editor posting compose blogger ternyata tidak "wysiwyg" 65 Google anti jual beli link 65 Tips blogger css validator menggunakan "JavaScript Console" 65 pada Fl..
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • 2008 New Media M&A Round-Up
    2008 New Media M&A Round‐Up The Year in Digital Media Mergers, Acquisitions & Capital Raises PEACHTREE MEDIA ADVISORS, INC. N EW M EDIA I NVESTMENT B ANKING EACHTREE EDIA DVISORS NC P M A , I . Better Service ▪ Lower Fees New Media Mergers & Acquisitions TABLE OF CONTENTS I. Internet/New Media M&A Transactions by Sector 1 II. M&A Transactions & Capital Raised in 2008 12 III. 2008 Interactive Media Valuations/Comps 31 IV. Conclusion/2009 Outlook 37 V. Out‐of‐Home/Alternative M&A Transactions 38 VI. Conclusion/2009 Outlook 38 VII. 2008 OOH Valuations/Comps 41 Peachtree Media Advisors, Inc. Peachtree Media Advisors, Inc. is a New York based investment bank serving the out‐of‐ home and interactive marketing sectors of media. The company provides mergers, acquisitions and capital raise advisory services to lower middle‐market companies in the two fastest growing sectors of media. John Doyle, Managing Director & Founder, has been a media investment banker for more than 12 years; closed and structured more than 22 deals; and has a strong knowledge‐base of financial and strategic buyers in these sectors. If you are interested in learning more about valuation, positioning, preparation or the merger and acquisition process, please go to www.PeachtreeMediaAdvisors.com or contact John Doyle at (212) 570‐1009. John H. Doyle II Managing Director & Founder Peachtree Media Advisors, Inc. 50 Vanderbilt Ave., #30 New York, NY 10017 PH. 212.570.1009 ▪ FAX 646.607.1786 www.peachtreemediaadvisors.com Table of Contents Better Service ▪ Lower Fees New Media Mergers & Acquisitions Online Media M&A Activity in 2008 Although the Enabling, Analytics and Ad Serving category had the fourth highest In 2008, there were 707 merger, acquisition level of reported transaction value in 2008, and capital raise transactions in the online this category had the largest percentage sector of media (92 more transactions than increase in capital flowing to it than any the 615 in 2007).
    [Show full text]
  • Kennedy Says Underground Nuclear Tests to Continue
    1 *•». temperate* «& fat* Distffbifttofl *>**. F«lr teafe*, tonenw Today- •ad today. High today, raw sad Sunday In the Ms, low 21,150 tonlgfct IM5. See Weather, Page DIAL 741-0010 VOL. 86, NO. 26 Iua*4 auiy' xo^v through rndir. gioma ciui P«UH __ **" ** Jl"1 B<at ••* •» Ad«U«ul Miillni Otticei. RED BANK, N. J., FRIDAY, AUGUST 2, 1963 7c PER COPY PAGE ONE Kennedy Says Underground Nuclear Tests to Continue WASHINGTON (AP) - Presi- our professional experts would Senate Republican Leader Ev Kennedy said he doesn't see you wait long enough and you see Mansfield said he hopes the dent Kennedy's announcement the help materially in reaching a de- erett M. Dirksen of Illinois, who anything wrong in senators' long enough you have to do some- treaty to be signed Monday in United States will continue un- cision on the treaty," he said. remains uncommitted on the adopting a wait and see attitude thing and you have to vote 'yes' Mosoow can be brought before the derground weapons testing may 1 Senate Democratic Leader Mike or "no. Senate before Labor Day. He aid his drive for Senate ratifica- treaty, said among the man; toward the treaty, as many Re- Mansfield of Montana said in a said he thinks various commit- tion of the limited nuclear treaty. things senators will want to learn publicans and some Democrats 'My judgment is when the tes- separate interview he believes tees ought to complete their hear- Kennedy told his news confer- underground tests will provide from military leaders is "whether have.
    [Show full text]
  • Resources for Parents, Grandparents and Caregivers
    Resources for parents, grandparents, and caregivers Many sites include resources suitable for multiple age groups, parents, and educators. http://www.deletepredators.com/ - A Tennessee Police Project. This is a project of the Tennessee Association of Chiefs of Police. It has materials for children, parents, schools, and law enforcement. It has links to some materials from the NetSmartz organization. http://connectsafely.org/ -Forum is for parents, teens, educators, advocates - everyone engaged in and interested in the impact of the social Web. The site has tips for teens and parents, as well as other resources for safe blogging and social networking. http://www.ikeepsafe.org/ -The Internet Keep Safe Coalition is a broad partnership of governors and/or first spouses, attorneys general, public health and educational professionals, law enforcement, and industry leaders working together for the health and safety of youth online. iKeepSafe uses these unique partnerships to disseminate safety resources to families worldwide. Website has links to materials for educators, parents, and children. http://safekids.com/ - Guidelines for Parents of Pre-Teens http://www.kidzui.com/joinus/safety?term=1885916 -The KidZui browser was designed to offer kids the same expansive experience adults have on the web. KidZui brought together a team of over 200 teachers and/or parents to scour the web in search of the best content for kids. http://www.commonsense.com/internet-safety-guide/index.php - Keeping your kids Internet safe and smart http://www.staysafeonline.info/basics/family.html - Internet Safety for families and children by the National Cyber Security Alliance http://www.getnetwise.org/ - Safety Tips for Families by the Internet Education Foundation œ includes video tutorials http://www.fbi.gov/publications/pguide/pguidee.htm - A Parent‘s Guide to Internet Safety http://www.netbullies.com/pages/7/index.htm - Resources about Net Bullies http://www.stopcyberbullying.org/parents/index.html - Stop CyberBullying.
    [Show full text]
  • Hulsart Figures In; Gram
    10SSOUTH CO. BISTWICW FBSEUOW* H»J» • This Week COVERING TUWNHUIP8 O f HOLMDEL. JJAUIKON One Section MARLBORO MATAWAN . " ; '■ AND :■--■ ' 16 PAGES MATAWAN. DOAOUOB Member - M«mbor • • ei»t YEAR — 51st W EEK National Editorial Association M ATAW AN, N .J; THURSDAY, JUNE 16rt96Q New Jersey Praia AnocUUon Single Copy Ten Cent* ■ Ree Program Opens Phillips Mills Matawan High School Seniors In National Houpr. Society The summer recreation pro­ Hulsart Figures In; gram . l o r Matawan Township . will (tart on Monday at I «-m. Recreation Park at the CUfhvood Park Recreation 25 Acres Sold For : Acre Sector Voted Field. - The program Is open lo Murlboio Township Planning residents of Matawan Township it In Holmdel Twp, ' Hoard was unanimous .In'one thing ' von!yanA anychlidiromt-to-13- Association To Meet Tursduy, Ihnl the township needs yea»4f4ge who has not regis­ - Hoimdel TownfhJp s6on7may gain a 25-acre recreation cenUjr Tlie Mutawnn Township Taxpny- u Master Plan nnd voted to'rec* tered, and wishes to do so, is eiumelid Hits to Ihe township. Un­ asked to report at 8 a, in. Mob* clubhouse In tho Palmer Aye.-Mid- era Association will meet Tuesday dle . Rd. area. Mayor James H._ der the ruling of Monmouth Count/ day,— r-^—■ ....... •night at a p.m. ot .the Oak Shades Judge J .‘Edward Ascher In tha Daniel J . ■■ Stanklewicz, rec- Ackerson could only inrorm spec­ Fjro Hwsw, A speaker will '.be tators at the tov^nshfp meeting Holmdel tnil-ncro lot'size cttsi', .tha ' reatlon dlrector. annoUnced lhe picscnt from the Ntny Jersey Tak- governing body could keep duvol-.
    [Show full text]
  • PC-Sztrájk? 2011 Legjobb Szoftverei 7 Így Találja
    DVD DVD Letöltés: legális vagy illegális? 2 Friss 9 GB 2011 A LEGÚJABB DRIVEREK, HASZNOS PROGRAMOK, 32 A HÓNAP JÁTÉKAI, EXKLUZÍV CSOMAgok… Szoftverek, filmek, zenék: a legjobb legális forrásokból, a legtitkosabb helyekről R A böngészője egy spion? Amit az Internet Explorer GO DIGITAL! és a Firefox elárul Önről R 46 2011/2 _ CHIPONLINE.HU PC-sztrájk? 2011 legjobb szoftverei 7 Így találja 45 friss teljes verzió mind magyar nyelven! meg a hibákat! Értékelés, elemzés, javítás: így oldja meg saját maga a PC-problémákat – lépésről lépésre R 24 Lassú DSL? Tíz tipp, CHIP 2010 A teljes évfolyam ami azonnal segít PDF-ben a DVD-n Exkluzív: tippjeink most gyűjthető formában R 56 EFI: az új szupergyors BIOS Az EFI-vel a PC-je: gyorsabb, biztonságosabb, hatékonyabb – részletesen bemutatjuk R 30 MICROSOFT, GOOGLE, APPLE 98 Újra firss registry R A profik kedvence most a CHIP DVD-jén. Hatékony és megbízható takarítás Ki gyártja a legjobb okostelefont? 1995 Ft, előfizetéssel 1395 Ft Teszt: Windows Phone 7, iPhone és tsai. XXIII. évfolyam, 2. szám, 2011. február >> PC >> sztrájk Az >> App-biznisz Az >> új szuper BIOS Letöltések: >> legális vagy illegális? Szörf >> a kanapéról Minden >> fáj megnyitható Kémkedik >> a böngészője? A legújabb>> LCD-tévék Gyermekek >> biztonságban Kiadja a Motor-Presse Budapest Lapkiadó Kft. Frankreich, Spanien, Portugal, Italien: EUR 6,80 Benelux: EUR 5,80 Griechenland: EUR 7,20 Dänemark: DKK 50,- Slowenien: EUR 6,70 Vezércikk HA ÖN EGY ANDROIDOS MOBILTELEFON VAGY EGY IPHONE TULAJDO- NOSA, bizonyára szembesült már azzal a ténnyel, hogy ha nem figyel, Szerkesztői ajánlat ezek az apró programok egész egyszerűen befurakodnak az életébe.
    [Show full text]
  • Download but Allow In-App Purchases
    FINDING CAMELITTLE: CHILDRENS TELEVISION IN A DIGITAL AGE ____________________________________________________ A Thesis Presented to The Honors Tutorial College Ohio University ____________________________________________________ In Partial Fulfillment Of the Requirements for Graduation From the Honors Tutorial College With the degree of Bachelor of Science in Media Arts and Studies ____________________________________________________ By Ryan H. Etter June 2011 FINDING CAMELITTE 2 This thesis is dedicated to all those who have worked in children’s entertainment before me. From the Saturday morning cartoons, to feature length movies, I would like to thank the people who not only gave me a childhood, but also gave me passion and direction as an adult. FINDING CAMELITTE 3 Table of Contents INTRODUCTION……………………………………………………………………4 CHAPTER 1: THE INDUSTRY………….………………………………………….8 CHAPTER 2: MAKING AN ANIMATED PROGRAM………………….………...16 CHAPTER 3: DEVELOPING CONTENT IN A DIGITAL AG…………………….24 CHAPTER 4: THE AUDIENCE………………..……………………………………43 CHAPTER 5: CAMELITTLE…………..……………………………………………51 REFERENCES………………….……………………………………………………73 CAMELITTLE PILOT DVD…………………………………………………Appendix FINDING CAMELITTE 4 Finding Camelittle: Children’s Television in a Digital Age Long ago and far away there was a land called Camelot. It was a kingdom ruled by the great king Arthur who was a virtuous and wise monarch. His reign was presented as idyllic and he was considered the model ruler. Many have used the imagery of Arthur’s Camelot to describe prosperous times in history, from the JFK presidency to the “Golden Age of Television.” For young children, the world is shaped by much smaller things than presidents or politics and, for myself; the world existed not only in my home or at school, but in the wonderfully imaginary places created in cartoons.
    [Show full text]
  • You Can Childproof Your Computer 27 February 2009, by Anne Krishnan
    You can childproof your computer 27 February 2009, By Anne Krishnan Every few months, I receive a question from a problems by restricting certain user accounts' reader whose computer was never the same after access to the control panel and designating safe a grandchild came to visit. Web sites for surfing. One computer's default language switched from Finally, the beauty of separate user accounts in English to German. Another could no longer Windows is that you can limit one or more people's launch Firefox. A third mysteriously lost its sound. access to the system resources, with no additional software required. For instance, by creating a user While it's difficult to figure out what buttons a child account for the kids, you can prevent your might have pressed or clicked to cause these grandchildren from being able to download problems, there are a number of ways that you can software to the system and protect your personal protect your computer while still allowing the kids files so the kids can't destroy them. to play on it. To open a new account in Windows XP, first log in Many computer problems can be attributed to kids' as "Administrator." Open the "Start" menu, click on indiscriminate Web surfing. Adults (hopefully) know "Control Panel" and double-click on "User to be careful in cyberspace, but children are more Accounts." Click on "Create New Account" and likely to invite any old malware home for dinner. enter a name for the account. KidZui is a Web interface that limits children's Now select the "Limited" radio button (the little surfing to a pre-approved set of Web sites, circle) at the top of the screen.
    [Show full text]
  • Horyzonty Anglistyki Praktyczne Czasopismo Dla Nauczycieli
    HORYZONTY ANGLISTYKI PRAKTYCZNE CZASOPISMO DLA NAUCZYCIELI CZASOPISMO DOSTĘPNE W PRENUMERACIE ISSN 2544-4239 ■ PAŹDZIERNIK-LISTOPAD 2018 (07) ■ NR. ART. 475407 TEMAT NUMERU GRAMMAR DRAMA, CZYLI MOI UCZNIOWIE NIE LUBIĄ GRAMATYKI BEFORE THE TEST KEEP CALM AND TEACH ON… CZY E8 TO EDUKACYJNY K2? STUDENT SKILLS LAB CO I GDZIE WARTO CZYTAĆ W SIECI? ROZMOWA Z PROF. HANNĄ KOMOROWSKĄ na temat nauczania, kształcenia nauczycieli oraz sposobów na szukanie motywacji OD REDAKCJI MÓWI SIĘ, ŻE WCZORAJSZY NAUCZYCIEL W PRZEDWCZORAJSZEJ SZKOLE UCZY DZISIEJSZEGO UCZNIA, JAK ROZWIĄZYWAĆ PROBLEMY JUTRA. BRZMI JAK PARADOKS, ALE NIM NIE JEST. TAK WYGLĄDAŁA EDUKACJA NA PRZEŁOMIE WIEKÓW. Zawsze starszy uczy młodszego. Ale czy daje mu odpowiednią ilość autonomii uczniowskiej? Już Maria Montessori radziła, by przyglądać się rozwojowi dziecka. By podążać za nim i niekoniecznie dogma- tycznie instruować go, o co właściwie w tym życiu chodzi. Każdy ma swój czas i każdy uczy się we własnym tempie. Technologie nie- samowicie sprzyjają tym filozofiom i podejściom metodologicznym. Czy 50-letnia nauczycielka może stać się liderem edukacji przyszło- ści dla młodego pokolenia, które uczy? I w końcu, czy pokolenie Z żyjące w świecie cyfr i komputerów, potrzebuje autorytetów? Amerykański pisarz Marc Prensky w artykule Digital Natives, Digi- tal Immigrants czyli cyfrowi tubylcy (młodzi ludzie wychowywani przez smartfony) i cyfrowi imigranci (ci, którzy poznali nowe tech- nologie w życiu dorosłym) opowiada o tej niesamowitej i odwiecz- nej dychotomii. Cyfrowi tubylcy czy cyfrowi imigranci – kto ma większe doświad- czenie? Kto gra główną rolę? I w końcu, kto tu kogo ma uczyć? Nauczycielka 50+, jest cyfrową imigrantką. Uczy w szkole, ale sama obsługi programów, takich jak: Paint, PowerPoint i Canvy, nauczyła się na szkoleniach.
    [Show full text]
  • Protect This House – Internet Safety for the Home
    Protect This House: Internet Safety for the Home Introduction: ........................................................................................................................ 2 Why Should We Care?........................................................................................................ 3 Online Rule of Agreement .......................................................................................... 4 How do I know if a computer has been secured? ....................................................... 4 Example Rules: Online Ten Commandments ............................................................. 5 Who is in the Driver's Seat? - User Restrictions ................................................................. 7 Parental Controls – Keep that Baby Gate Up! .................................................................. 10 Keep the Garbage Out! – Web Filters ............................................................................... 12 Anti-Spyware and Anti-Virus – Does my Computer have a Cold? .................................. 14 Operating System and Application Updates – Is your Foundation Secure? ..................... 17 Cell Phone Parental Controls ............................................................................................ 19 Safe Web Surfing .............................................................................................................. 23 Get your computer protected! ................................................................................... 23 Keep your
    [Show full text]