View September 2012 Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Financing Transactions 12
MOBILE SMART FUNDAMENTALS MMA MEMBERS EDITION AUGUST 2012 messaging . advertising . apps . mcommerce www.mmaglobal.com NEW YORK • LONDON • SINGAPORE • SÃO PAULO MOBILE MARKETING ASSOCIATION AUGUST 2012 REPORT MMA Launches MXS Study Concludes that Optimal Spend on Mobile Should be 7% of Budget COMMITTED TO ARMING YOU WITH Last week the Mobile Marketing Association unveiled its new initiative, “MXS” which challenges marketers and agencies to look deeper at how they are allocating billions of ad THE INSIGHTS AND OPPORTUNITIES dollars in their marketing mix in light of the radically changing mobile centric consumer media landscape. MXS—which stands for Mobile’s X% Solution—is believed to be the first YOU NEED TO BUILD YOUR BUSINESS. empirically based study that gives guidance to marketers on how they can rebalance their marketing mix to achieve a higher return on their marketing dollars. MXS bypasses the equation used by some that share of time (should) equal share of budget and instead looks at an ROI analysis of mobile based on actual market cost, and current mobile effectiveness impact, as well as U.S. smartphone penetration and phone usage data (reach and frequency). The most important takeaways are as follows: • The study concludes that the optimized level of spend on mobile advertising for U.S. marketers in 2012 should be seven percent, on average, vs. the current budget allocation of less than one percent. Adjustments should be considered based on marketing goal and industry category. • Further, the analysis indicates that over the next 4 years, mobile’s share of the media mix is calculated to increase to at least 10 percent on average based on increased adoption of smartphones alone. -
VRINGO, INC. (Exact Name of Registrant As Specified in Its Charter)
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-Q (Mark One) ☒ QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the quarterly period ended March 31, 2014 ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number: 001-34785 VRINGO, INC. (Exact Name of Registrant as Specified in its Charter) Delaware 20-4988129 (State or other jurisdiction of (I.R.S. Employer incorporation or organization) Identification No.) 780 3rd Avenue, 15th Floor, New York, NY 10017 (Address of principal executive offices) (Zip Code) (212) 309-7549 (Registrant’s Telephone Number, Including Area Code) Indicate by check mark whether the registrant: (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes x No ☐ Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). Yes x No ☐ Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. -
Users of Jongla Will Get 50MB of Free Daily Data. This Is a Move to Target Indonesia’S Generation of Mobile-First Users, the Chat App’S CEO Tell E27
Users of Jongla will get 50MB of free daily data. This is a move to target Indonesia’s generation of mobile-first users, the chat app’s CEO tell e27 Jongla, a Finnish cross-platform messaging app, yesterday announced a new partnership with Indonesian telecom provider XL Axiata to provide users of its chat platform with 50MB of free daily data. The deal is part of a joint aim of both parties to get Indonesians online. This will help Jongla — available on iOS, Android, Windows Phone and Firefox mobile OS — extend its user base, while XL Axiata will take care of the marketing push in the Southeast Asian country. “Indonesia is one of the fastest growing mobile markets in the world with a population of almost 260 million people and about 25 per cent smartphone penetration rate. According to study by OnDevice, Indonesians have currently two to four instant messaging apps installed on average. This is clear evidence that they have not yet made up their mind when it comes to a preferred IM (instant messaging) solution,” Riku Salminen, CEO, Jongla, told e27. Jakarta XL axis capital group Axiata telecom review PT Indonesia Just last week, the Helsinki-based startup raised €3.4 million (US$4.25 million) in Series B investment from a group of private investors that included JSH Capital Oy, Ingman Finance Oy, Kontino Invest Oy and Holdington Ltd Oy — bringing its total raised capital to €7.3 million (US$9.1 million). “We in Jongla believe that we have seen just a tip of iceberg and the whole potential of Indonesian market is still untapped. -
Discovering and Analyzing Unlisted Chrome Extensions
Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions Aidan Beggs and Alexandros Kapravelos North Carolina State University fawbeggs,[email protected] Abstract. With browsers being a ubiquitous, if not required, method to access the web, they represent a unique and universal threat vec- tor. Browsers can run third-party extensions virtually invisibly in the background after a quick install. In this paper, we explore the abuse of browser extensions that achieve installations via suspicious methods. We scan the web for links to extension installations by performing a web crawling of the Alexa top 10,000 websites with recursive sub-page depth of 4 and leverage other tools to search for artifacts in the source code of webpages. We discover pages that have links to both listed and un- listed extensions, many times pointing to multiple different extensions that share the same name. Using this data, we were able to find 1,097 unlisted browser extensions ranging from internal directory lookup tools to hidden Google Docs extensions that pose a serious threat to their 127 million users. Keywords: browser extensions · JavaScript · browser security 1 Introduction Although they run largely in the background, extensions can be quite useful to the end user. Performing everything from letting users manage their email, to helping people manage their banking and crypto accounts, to blocking inva- sive ads (one of their most popular uses), extensions can ease the web browsing experience for many users. Upon installation, extensions will request the user for various permissions [9], however, many users have been conditioned to click "accept" without careful analysis of the permissions they are granting [10]. -
Ringcentral for Google Chrome Extension User Guide Introduction 6
RingCentral for Google Chrome Extension User Guide RingCentral for Google Chrome Extension | User Guide | Contents | 2 C ontents Introduction ................................ ............................... 4 About RingCentral for Google Chrome Extension ................................ ................... 5 About this Guide ...................................................................... 5 Basics ............................................................................. 5 Installation ................................................................. 7 Verify Installation ............................................................ 8 Login ..................................................................... 9 Minimize and Close Button .................................................... 10 Options .................................................................. 11 Settings .................................................................. 12 Calling ................................................................... 13 Region .................................................................. 14 Status ................................................................... 15 Click to Dial/SMS ........................................................... 15 Authorize ................................................................. 16 Feedback ................................................................. 16 EULA and Version ........................................................... 16 Logout .................................................................. -
Antitrust Attacks on Patent Assertion Entities
ANTITRUST ATTACKS ON PATENT ASSERTION ENTITIES MARK S. POPOFSKY MICHAEL D. LAUFERT* PAEs are antitrust’s latest “new new thing.”1 The last few years have wit- nessed, as this Symposium attests, the antitrust community’s discovery of Pat- ent Assertion Entities (PAEs). PAEs typically do not develop or practice patents.2 Rather, PAEs acquire patents from others (for instance inventors, operating companies, or other non-practicing entities) to profit through licens- ing or patent assertion. PAEs have received significant attention because their activities have become an enormous component of the patent litigation land- scape. PAEs in 2012 accounted for 62 percent of all recently filed patent liti- gation.3 This reflects a staggering four-fold increase in suits filed by PAEs since 2005.4 * Members respectively of the District of Columbia and California, and the District of Co- lumbia, Maryland, and Massachusetts Bars. Mr. Popofsky previously served as Senior Counsel to Assistant Attorney General Joel I. Klein in the Antitrust Division of the Department of Justice, and is Adjunct Professor of Advanced Antitrust at the Georgetown University Law Center. We appreciate the thoughtful comments provided by Steven Salop, Fiona Scott Morton, and the editors of this Journal, on drafts of this article. 1 MICHAEL LEWIS, THE NEW NEW THING: A SILICON VALLEY STORY (1999). 2 We define PAEs according to a definition given by the Federal Trade Commission. “The business model of PAEs focuses on purchasing and asserting patents against manufacturers al- ready using the technology, rather than developing and transferring technology.” FED. TRADE COMM’N, THE EVOLVING IP MARKETPLACE 8 (2011) [hereinafter EVOLVING IP MARKETPLACE], available at www.ftc.gov/os/2011/03/110307patentreport.pdf. -
A Perfectly Good Hour
A PERFECTLY GOOD HOUR 1. Social Capital 2. Social Intelligence 3. Listening 4. Identity 5. Language & Cursing 6. Nonverbal Communication 7. Satisfying Relationships 8. Consummate Love 9. Conflict Management 10. Styles of Parenting/Leading Modern Social Commentary Cartoons by David Hawker from PUNCH Magazine, 1981 A PERFECTLY GOOD HOUR Feel free to voice your opinion and to disagree. This is not a friction- free zone. AND, please do demonstrate social intelligence. Let’s Get Better Acquainted If you match this descriptor, keep your 1. You belong to an LLI Special Interest Group video on and unmute. 2. You are fluent in another language 3. You’ve received your flu shot If you don’t match this 4. You attended the LLI class on nanotechnology descriptor, temporarily 5. You have grandchildren stop your video. 6. You (have) participate(d) in Great Decisions 7. You have a pet 8. You play a musical instrument 9. You are/have been on the LLI Board 10. You think this is a fun poll How fortunate we are that during this global pandemic, we can stay home, attending LLI classes, reading, creating, baking, taking walks, and talking with our loved one. The last six months have exposed and magnified long standing inequities -- in our communities, in our hospitals, in our workplaces, and in schools. Too many of our school districts lack a fair share of resources to address the pandemic’s challenges; not every student can be taught remotely with attention to their need for social and emotional safe learning spaces. The current circumstances are poised to exacerbate existing disparities in academic opportunity and performance, particularly between white communities and communities of color. -
BOARD of EDUCATION GLENBROOK HIGH SCHOOLS April 13, 2020 REGULAR BOARD MEETING - 7:00 P.M
BOARD OF EDUCATION GLENBROOK HIGH SCHOOLS April 13, 2020 REGULAR BOARD MEETING - 7:00 p.m. Location: Glenbrook District Office Public Meeting Room 100A 3801 W. Lake Avenue, Glenview, IL 60026* * This meeting will be conducted telemetrically using the Zoom webinar platform pursuant to Executive Order in Response to COVID-19 No. 5 View Instructions on How to Join the Zoom Webinar AGENDA 1. (7:00) Call to Order – Roll Call 2. (7:02) Approval of the Agenda for this Meeting 3. (7:03) Recognition of Community Visitors Anyone who would like to address the Committee may do so by calling (847) 486-4728 and leaving up to a three-minute voicemail message. Comments should be related to topics on the board agenda. Messages must be left by 3:00 PM on the day of the meeting. Please leave your name and address on the message so that the administration may be able to follow up if necessary. Messages will be subsequently reviewed to ensure they are appropriate for a public presentation (e.g., no profanity), and then played aloud during the public comment period on the agenda. 4. (7:08) Board and Superintendent Reports 5. (7:15) Approval of Consent Agenda Items: A. Appointments a. Certified b. Support Staff B. Resignations/Terminations a. Certified b. Support Staff C. FOIA D. Approval of Accounts Payable Bills E. Approval of Payroll Disbursements F. Approval of Revolving Fund Reimbursement G. Minutes a. March 16, 2020, Special Board Meeting b. March 16, 2020, Special Closed Board Meeting c. March 16, 2020, Regular Board Meeting d. -
How to Install and Run Microsoft Office on a Chromebook
How to install and run Microsoft Office on a Chromebook To use Office on your Chromebook, install the Office mobile apps through the Google Play Store. If your Chromebook uses the Chrome Web Store instead, you can install Office Online to create, edit, and collaborate on your Office files in your browser. Notes: To find out which Chromebooks support the Office mobile apps from the Google Play Store, see Chrome OS Systems Supporting Android App. You can’t install the Windows or Mac desktop versions of Office 365 or Office 2016 on a Chromebook. How to install Office apps on a Chromebook: 1. Open the Google Play Store and search for the apps you want to install. Or you can click on any of these links to download a specific app: Microsoft Outlook, Microsoft Word, Microsoft Excel, Microsoft PowerPoint, OneNote, Office Lens, or Skype for Business. 2. Click Install. 3. Once your app(s) are installed, click the Launcher on your Chromebook and click on the app to open it. 4. Sign in with your personal Microsoft Account or your account associated with your Office 365 subscription. See Install and set up Office on an Android for details on how to sign in to Office on Android. Note: You can view files and do basic editing in the Office mobile apps if you're signed in with your Microsoft Account (it's free and you can use an existing email). If you have an Office 365 subscription, you can sign into the app with the account associated with your subscription to use more advanced editing features with Office 365. -
Discovering Browser Extensions Via Web Accessible Resources
Discovering Browser Extensions via Web Accessible Resources Alexander Sjösten Steven Van Acker Andrei Sabelfeld Chalmers University of Chalmers University of Chalmers University of Technology Technology Technology Gothenburg, Sweden Gothenburg, Sweden Gothenburg, Sweden [email protected] [email protected] [email protected] ABSTRACT The first and second scenarios present an exclusive point Browser extensions provide a powerful platform to enrich of view of websites, concerned with malicious extensions. browsing experience. At the same time, they raise impor- The third scenario presents an exclusive view of extensions, tant security questions. From the point of view of a website, concerned with malicious websites. The fourth scenario illus- some browser extensions are invasive, removing intended fea- trates legitimate synergies between websites and extensions. tures and adding unintended ones, e.g. extensions that hi- Finally, the fifth scenario illustrates the security goals of jack Facebook likes. Conversely, from the point of view of websites and extensions at outright clash. extensions, some websites are invasive, e.g. websites that by- Bank scenario Bank webpages manipulate sensitive in- pass ad blockers. Motivated by security goals at clash, this formation whose unauthorized access may lead to financial paper explores browser extension discovery, through a non- losses. It is desirable to detect potentially insecure and vul- behavioral technique, based on detecting extensions' web ac- nerable extensions and prevent extensions from injecting cessible resources. We report on an empirical study with third-party scripts into the bank's webpages. The latter tech- free Chrome and Firefox extensions, being able to detect nique is in fact a common practice for many extensions [28, over 50% of the top 1,000 free Chrome extensions, including 31]. -
View October 2012 Report
MOBILE SMART FUNDAMENTALS MMA MEMBERS EDITION OCTOBER 2012 messaging . advertising . apps . mcommerce www.mmaglobal.com NEW YORK • LONDON • SINGAPORE • SÃO PAULO MOBILE MARKETING ASSOCIATION OCTOBER 2012 REPORT The 2012 Mobile Election In 2008, when Obama was first elected as President, smartphones were just gaining popularity and tablets were R&D blueprints somewhere in Silicon Valley. Fast-forward to 2012, President Obama tweets on average 29 times a day and both parties have mobile apps explaining their policies. The election is a perfect indicator of the power of mobile and how it transformed the campaign process. As reported in VatorNews, one in ten Americans “dual-screened” the presidential debates on their TVs and on their mobile devices. Additionally, 35% of smartphones owners used their mobile device to fact check what was being said during the debates. Fundraising also received a technological face-lift. Obama initiated a mobile messaging campaign to encourage donations via SMS. And both Obama and Romney used Square at fundraising events for people to donate with their credit cards. By the 2016 elections, who knows what type of advancements we will make with mobile. According to a survey conducted by Mojiva, 85% of respondents would consider using their mobile device to vote on Election Day. Imagine mobile voting in a cab or on the treadmill or while you wait for coffee in Starbucks. The impact of mobile on the elections is not only apparent but should serve as inspiration for marketers aiming to move closer to consumers. With mobile, both Obama and Romney made a connection with constituents that was rich, dynamic and contextually relevant. -
Patent Assertion Entities and Antitrust: Operating Company Patent Transfers
theantitrustsource Ⅵ www.antitrustsource.com Ⅵ A p r i l 2 0 1 3 1 The Antitrust Source, April 2013. © 2013 by the American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association. Patent Assertion Entities and Antitrust: Operating Company Patent Transfers Mark S. Popofsky and Michael D. Laufert The power of a patent can depend on its holder. In one set of hands, a patent might play a defen- sive role, warding off suits by similarly armed competitors. But when placed in another’s, the same patent can serve as a weapon for extracting royalties from inadvertent infringers or for raising rivals’ costs. In short, much like the theory of relativity, the ability and incentive to assert a patent can turn on the positions rights holders and enforcement targets occupy. The ease with which patents change hands, and the eruption of new business models focused on patent monetization, amplify the importance of understanding the consequences of this TEinsteinian patent/antitrust twist. Today, a vibrant market exists for patent rights.1 Buyers of patents frequently include “patent trolls,” which, like the Federal Trade Commission, we call Patent Assertion Entities or “PAEs.” PAEs typically do not make or sell products. Rather, their business model is to make money from monetizing patent rights, typically by licensing or suing Operating Companies (firms that practice patents). In this article, we survey certain antitrust issues presented by an emerging trend: the out- sourcing by Operating Companies of patents to PAEs, a phenomenon some commentators describe as “privateering.”2 Operating Company transfers of patents to PAE proxies can raise competitive concerns.