Updated: 2011-11-07 19:03:15

nielsen.com contact us careers Consumer Featured Insights Global Media Entertainment Online Mobile Reports Downloads Home Media Entertainment Nielsen News Online Mobile 40 of Tablet and Smartphone Owners Use Them While Watching TV October 13, 2011 American consumers are increasingly connected and our recent survey shows they are increasingly multitasking when it comes to . multimedia Roughly 40 percent of tablet and smartphone owners in the U.S . used their devices daily while watching TV , while only 14 percent of eReader owners said they watched TV while using their device every . day And what are smartphone and tablet owners doing while watching TV Checking email . Email was the top activity for both men and women during television programming and commercial breaks . In addition , women
Updated: 2011-11-07 19:03:14

, 1080p From Wikipedia , the free encyclopedia Redirected from Full HD Jump to : navigation search This article may require cleanup to meet Wikipedia's quality standards Consider using more specific cleanup instructions Please help improve this article if you can . The talk page may contain suggestions . October 2009 1080p pronounced ten eighty p iː is the shorthand identification for a set of HDTV high-definition video modes that are characterized by 1080 horizontal lines of vertical resolution 1 and progressive scan meaning unlike the 1080i display standard , the image is not interlaced The term usually assumes a widescreen aspect ratio of 16:9 implying a resolution of 1,920 pixels wide by 1,080 high . This resolution is similar to that of 2K digital cinema technology . The frame rate
Updated: 2011-11-07 19:03:13
, HDTV blur From Wikipedia , the free encyclopedia Jump to : navigation search HDTV blur is a common term used to describe a number of different artifacts on modern consumer high-definition television . sets The following factors are generally the primary or secondary causes of HDTV blur in some cases more than one of these factors may be in play at the studio or receiver end of the transmission . chain Pixel response time on LCD displays blur in the color response of the active pixel Lower camera shutter speeds common in Hollywood production films blur in the content of the film Blur from eye tracking fast moving objects on sample-and-hold LCD , plasma , or . microdisplay 1 Resolution resampling blur due to resizing image to fit the native resolution of the HDTV Blur due to 3:2 pulldown
Updated: 2011-11-07 19:03:11
, Average revenue per user From Wikipedia , the free encyclopedia Redirected from ARPU Jump to : navigation search Average revenue per user sometimes average revenue per unit usually abbreviated to ARPU is a measure used primarily by consumer communications and networking companies , defined as the total revenue divided by the number of . subscribers This term is used by companies that offer subscription services to clients for example , telephone carriers Internet service providers and hosts . It is a measure of the revenue generated by one customer phone pager etc . per unit time , typically per year or month . In mobile telephony , ARPU includes not only the revenues billed to the customer each month for usage , but also the revenue generated from incoming calls , payable within the
Updated: 2011-11-07 19:03:10
jump to site navigation menu Top 25 Multichannel Video Programming Distributors as of June 2011 1 25 Rank MSO BasicVideoSubscribers 1 Comcast Corporation 22,525,000 2 DirecTV 19,433,000 3 Dish Network Corporation 14,056,000 4 Time Warner Cable , . Inc 12,235,000 5 Cox Communications , . Inc 1 4,838,000 6 Charter Communications , . Inc 4,413,000 7 Verizon Communications , . Inc 3,848,000 8 AT . Inc 3,407,000 9 Cablevision Systems Corporation 3,284,000 10 Bright House Networks LLC 1 2,139,000 11 Suddenlink Communications 1 1,274,000 12 Mediacom Communications Corporation 1,139,000 13 Insight Communications Company , . Inc 680,000 14 CableOne , . Inc 637,000 15 WideOpenWest Networks , LLC 1 421,000 16 RCN . Corp 1 338,000 17 Knology Holdings 263,000 18 Atlantic Broadband Group , LLC 261,000
Updated: 2011-11-07 15:42:08

The popular sportswear manufacturer Adidas has suffered a "sophisticated, criminal cyber attack" made against a number of its sites. <img alt="" border="0" src="http://stats.wordpress.com/b.gif?host=nakedsecurity.sophos.com&blog=15254721&post=96686&subd=sophosnews&ref=&feed=1" width="1" height="1" /
Updated: 2011-11-07 02:05:35
The commercials for Droid Bionic talk about remote access to the files on your PC. They are doing this through a Motorola app named Zum0cast. The Zumacast is one of many apps preinstalled on the Driod Bionic. To get started, I registered for free at Zumocast, and installed their software on my home computer. When installing the software, [...]
Updated: 2011-11-07 00:50:06

Take a closer look at one of the nasty JavaScript threats that we have seen injected into thousands of legitimate web sites recently, for the purpose of infecting users with malware.
Updated: 2011-11-05 17:42:15
A new version of the Lastpass toolbar was released late this week, and I dutifully installed it on my systems. During the installation, I was prompted by Symantec that less than 5 computers have been seen with this file thus I should only install it if I am sure it is safe. I clicked allow [...]
Updated: 2011-11-05 00:47:18
Recently, a Washington DC prosecutor declined to prosecute a former Washington METRO employee accused of theft. He was found to have taken home nine laptop computers, a power generator, a DVD player, a BlackBerry wireless device, a color printer, a digital camera, lots of tools and a computer monitor. The prosecutor wrote that the absence of enforcement of [...]
Updated: 2011-11-04 14:09:40

Customers build a relationship based on trust with security vendors. After all, customers who buy security solutions like anti-virus or anti-spam grant security companies access to update computers and devices. Question is should security companies open their doors to people known to have dabbled in grey and black-hat hacking?
Updated: 2011-11-04 04:47:52
The Federal Desktop Core Configuration blog (actually Microsoft’s USGCB Tech Blog, my Google Reader hasn’t updated the blog title) has a post on the risks of enabling “Initialize and script ActiveX controls not marked as safe” in any Internet Explorer security zone. Prior to Windows 7, our IE security policy was the wild west. “Do whatever [...]
Updated: 2011-11-04 03:58:52

Microsoft have released a security advisory for the vulnerability used in the Duqu Trojan. They are providing a workaround, but it disables the use of embedded True Type Fonts.
Updated: 2011-11-02 04:33:14

Symantec published a report earlier this week about an attack on the Chemical Industry. They call this attack Nitro. In one example of the attack, an encrypted 7zip file is used. Encryption prevents scanners from examining the contents of the file. Some SMTP gateways, block encrypted files by default. Most places find that hurts productivity more than [...]
Updated: 2011-11-02 03:04:27

Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Blogs Consumer 418 Corporate 230 Enterprise 416 McAfee Labs 1111 Archive November 2011 2 October 2011 48 September 2011 35 August 2011 41 July 2011 33 June 2011 41 May 2011 43 April 2011 43 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Tags 1 million guarantee access to live fraud resolution agents Acquisition Android Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical
Updated: 2011-11-02 03:02:36

Test for the presence of alcohol, and how much, in just seconds. The Keychain Breathalyzer provides results quickly and is convenient to carry.
Updated: 2011-11-02 03:02:36

This digital alcohol breathalyzer provides an accurate and easy-to-read measure of how much someone has had to drink in seconds.
Updated: 2011-11-01 17:51:34
I recently acquired a new iMac at work to replace the 4yr old one I was using. The new iMac came with Lion on it, and since I had upgraded to Lion on my work machine, I went ahead and upgraded all of my home machines as well. My Macbook Air is my primary “workstation [...]
Updated: 2011-11-01 07:49:30
1st, Nov, 2011 from KSOffice Team
Kingsoft Office is the best alternative of Microsoft Office 2010/2007, it support all of Microsoft Office document types and you can open, edit, save in Microsoft Office doc/docx, xls/xlsx, ppt/pptx. It is one of the most popular office software in the world and already is the perfect chose for matching [...]
Updated: 2011-10-27 20:00:49
As part of deployment of JAVA 1.6 update 29, I decided it was time to take a closer look at removing older versions of JAVA. At one point in time, new JAVA installs left all previous versions installed on the system. In 1.6 update 10, JAVA began installing JAVA into %programfile%\java\jre6. Each subsequent update would replace the [...]
Updated: 2011-10-27 08:11:48

This personal bug detector is an all-in-one counter-surveillance tool. Detect the presence of wired and wireless cameras, wireless mics, transmitter bugs, and GPS trackers in seconds.
Updated: 2011-10-27 01:14:40
Back in June I wrote about my methodology of deploying SCUP and how I wished I had the time to work out deploying JAVA with SCUP. The quarterly update for JAVA was released last week, so it was time to go another round. When deploying JAVA in an interactive manner, the install will prompt the user if [...]
Updated: 2011-10-26 04:35:19
When it comes to giving advice about picking strong passwords, experts are quick to point out some of the good password generators and managers available, or recite best-practices for making up your own. And although we do so with the best of intentions, it’s still easy for people’s eyes to gloss over when presented with [...]
Updated: 2011-10-20 02:39:39
The New York Times had an article on the use of iPads by Baltimore Ravens and the Tampa Bay Bucs to replace their playbook. They briefly mention some of the security involved. The article mentions the following security 1. Device username Password 2. The playbook app also has a separate password. 3. Some data is kept [...]
Updated: 2011-10-18 20:11:53

The Bluetooth Mobile Phone Recorder pairs quickly with any cell phone with Bluetooth, enabling you to easily record both sides of a conversation. Stores 340 hours of audio!
Updated: 2011-10-17 02:18:22
Last year at about this time, Qualys and Cyber-Ark announced a new integration. I implemented this last week. Most companies have password policies requiring the expiration of passwords. Yet these policies hardly ever get applied to service and application accounts only users. Many times these service passwords even predate the implementation of strong password requirements. This is [...]
Updated: 2011-10-14 04:59:58
Security researcher Mario Heiderich (also creator of the HTML5 Security Cheatsheet and lead developer for PHPIDS) has been posting some interesting cross-site scripting challenges lately that highlight aspects of security on the client side. The most recent, called XSSMe², involved a page with a reflected XSS vulnerability that allowed one to insert arbitrary HTML – no [...]
Updated: 2011-10-12 09:51:20
13th, Oct, 2011 from KSOffice Team
Kingsoft Office 2010 is the best alternative of Microsoft Office 2010/2007, it support all of Microsoft Office document types and you can open, edit, save in Microsoft Office doc/docx, xls/xlsx, ppt/pptx. For most of Office suite functions, Users can not feel the difference of these two products. Except fully compatible [...]