Posted on 30 May 2012 by Thales DIS
On Saturday night, Informa’s Camille Mendler tweeted her frustration that UK viewers of the Eurovision Song Contest could not enter their votes by text. In questioning the decision, she referred to SMS as Europe’s ‘most ubiquitous and cheap communications method’. Research from Camille’s parent company, Informa, has today proved unequivocally that this assertion was correct. […]
Posted on 07 June 2012 by Thales DIS
This week, the Wall Street Journal reported that Facebook is working on technology that would let children younger than 13 years old use the site under parental supervision. This would be a dramatic change from the current setup, where you must be at least 13 years old to sign up and use the network. CNN […]
Posted on 28 June 2012 by Thales DIS
Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the results of our research into the attitudes of CIOs. Next on our agenda is the above question from Ardaman Kohli. It’s true that it doesn’t matter how secure CIOs themselves […]
Posted on by Dominique Brulé
Today’s announcement that Orange will undertake the first large scale rollout of NFC-enabled SIM cards in France is more proof, if it were needed, that NFC seems to be on the cusp of mass adoption. For the last few years, influencers and industry heavyweights have questioned whether NFC would ever achieve widespread adoption and, if it did, what would […]
Posted on 06 July 2012 by Alexander Vlasblom
It’s our 10th edition of The Netsize Guide – can you believe it? Ten years of showering insight on the mobile industry and sharing our views. We have previously looked at mobile CRM and how it is affecting brands and retailers, and investigated the notion of Truly Mobile courtesy of interviews with global brands such […]
Posted on 09 July 2012 by Thales DIS
Chief Information Officers are always faced with the same balancing act when it comes to security. On the one hand, they must maintain sufficient control over their IT resources to protect assets and sensitive data, while on the other hand, they must ensure controls are not so stringent that employees are discouraged from embracing IT and technological innovation, or attempt to bypass them completely.