Saturday, March 31, 2012

European roaming charges

The European Commission, European lawmakers and governments agreed to reform mobile roaming fees, allowing consumers to pay less for calls, texts and mobile Web services when travelling abroad, in a measure that could hit telecom industry profits.
The deal announced on Wednesday is expected to be approved by the European Parliament in May and would take effect in July.
The reform, which had been hotly opposed by many of Europe's biggest telecom groups such as Telecom Italia (TLIT.MI) and Telefonica (TEF.MC), includes caps on the prices charged to consumers that will decline annually until 2014.
But perhaps more significantly, it also aims to increase competition by allowing consumers to choose their mobile operator when they cross borders. In effect, European policy makers are trying to create a new market for roaming services instead of requiring people to use their home-country operator.
To do so, they have slashed by 50-90 percent the wholesale rates that operators charge each other to rent network access in the hope that this spurs some to create mobile voice and data offers aimed at customers travelling across borders.
Stephane Beyzian, a telecom analyst at investment bank Raymond James, said he was not sure major operators would be eager to offer such roaming deals since they would eat away at a lucrative source of profit.
"It's not at all clear that this new roaming market will materialise," he said. "The operators may try to hold the line on this."

Enhanced by Zemanta

Friday, March 30, 2012

WinRAR compression utility tool at eComTechnology

WinRAR compression utility tool at eComTechnology
Multi-user licenses and languages Government and educational institutions discounts available Purchase WinRAR at eComTechnology today.
… is a powerful compression tool with many integrated additional functions to help you organize your compressed archives.
… puts you ahead of the crowd when it comes to compression. Consistently creating smaller archives, WinRAR is often even faster than the competition. This will save you disc space, transmission costs AND valuable working time as well.
… has a graphic user interface, supports drag & drop, and can also be integrated to your context menu.
… is ideal for multimedia files. WinRAR automatically recognizes and selects the best compression method. The special compression algorithm compresses multimedia files, executables and object libraries particularly well…. is also ideal, if you are sending data through the web. Its 128 bit password encryptionand its authenticity signature technology will give you peace of mind you are looking for.
Buy WinRAR today at eComTechnology
WinRAR compression at eComTechnology

Thursday, March 29, 2012

New funding for Cleantech

The tide is finally turning for Canada’s early stage companies who are in desperate need of funding.
As has been well documented, over the past few years Canadian venture capital has severely dried up, particularly in life sciences and clean tech. These industries just don’t have the same buzz as plain vanilla technology right now, and small companies who need private capital to commercialize their research have, for the most part, been left out in the cold.
But over the past few weeks, there have been some very encouraging signs that things are starting to turn around. On Monday, Toronto’s MaRS Discovery District, the city’s big innovation hub, announced it has launched a new $30-million clean tech fund in collaboration with the private sector.
That announcement came on the same day that Merck invested $35-million in a new Quebec biosciences fund, working alongside Lumira Capital and Teralys Capital in hopes of raising $50-million in total.
“Finding that first million or two has always been a challenge in Canada, and we intend to fill that gap,” said Dr. Tom Rand, managing director of the MaRS fund. Mr. Rand will work with Murray McCaig to deploy the new capital, some of which has already been invested. Along with the announcement of the new fund, MaRS also disclosed that it has used some of the new money to invest in GreenMantra, which aims to convert plastics into chemicals and other fuels, and in Smart Energy Instruments, which is creating low-cost energy sensors.
On top of these new funds, a few weeks back the Globe announced that Ann Hanham, an influential venture capital player in Silicon Valley, is heading back to Canada to launch a $200-million fund that will invest in Canadian life sciences and biotech.

Enhanced by Zemanta

Wednesday, March 28, 2012

Microsoft combating online fraud

Image representing Microsoft as depicted in Cr...
Image via CrunchBase

Microsoft Corp claimed a victory in efforts to combat online banking fraud, saying it had confiscated several servers used to steal login names and passwords, disrupting some of the world's most sophisticated cybercrime rings.
The software maker said on Monday that its cybercrime investigation group also took legal and technical actions to fight notorious criminals who infect computers with a prevalent malicious software known as Zeus.
By recruiting computers into networks called botnets, Zeus logs the online activity of infected machines, providing criminals with credentials to access financial accounts.
"We've disrupted a critical source of money-making for digital fraudsters and cyber thieves, while gaining important information to help identify those responsible and better protect victims," said Richard Boscovich, senior attorney for the Microsoft Digital Crimes Unit, which handled the investigation in collaboration with the financial industry.
Microsoft's Digital Crimes Unit is worldwide team of investigators, lawyers, analysts and other specialists who fight cybercrime. A year ago they helped U.S. authorities take down a botnet known as Rustock that had been one of the biggest producers of spam e-mail. Some security experts estimated that in its heyday Rustock was responsible for half the spam in junk email bins.

Enhanced by Zemanta

Tuesday, March 27, 2012

Leak in North Sea could take six months to halt

A cloud of explosive natural gas boiling up from the North Sea out of a leak at Total's evacuated Elgin platform forced another shutdown off the Scottish coast on Tuesday as the French firm warned it could take six months to halt the flow.
Dubbed "the well from hell" by an environmentalist who said the unusually high pressure of the undersea reservoirs made it especially hard to shut off, the loss of oil and gas output from Elgin - as well as the prospect of a big repair bill - helped drive Total's share price down six percent on the Paris bourse.
As Shell pulled its bigger Shearwater facility offline too and an air and sea exclusion zone was declared around the forlorn Elgin rig, 150 miles east of Aberdeen, green campaigners denounced dangers in the technically challenging deep drilling that energy companies have undertaken around the globe to exploit the high prices created by insatiable demand.
The Elgin well, pumping some three percent of Britain's gas output from nearly four miles below the seabed, pushes the frontiers of technology and is one of the deepest, most highly pressurized, offshore natural gas fields in the world. It now sits empty following Sunday's emergency evacuation of 238 crew.

Monday, March 26, 2012

lawmakers have warned employers against requesting Facebook passwords

Facebook and lawmakers have warned employers against requesting Facebook passwords while screening job applicants, a controversial practice that underscores the blurring distinction between personal and professional lives the era of social media.
The practice has reportedly grown more commonplace as companies increasingly regard profiles - or embarrassing photos from wild nights out - as windows into a prospective employee's character.
On Friday, Facebook Inc's Chief Privacy Officer, Erin Egan, posted a note warning that the social networking company could "initiate legal action" against employers that demand Facebook passwords.
Also, lawmakers in several states and in Washington said they would introduce bills to prohibit companies from vetting employees by demanding access to private accounts.
Leland Yee, a California state senator, told Reuters on Friday he introduced legislation that would prohibit companies in the state from soliciting Facebook passwords from job applicants. The Associated Press reported that lawmakers in Illinois and Maryland were also considering similar moves.
"Employers can't ask in the course of an interview your sexual orientation, your age, and yet social media accounts may have that information," Yee said.
"Employers have legitimate questions about a person's job performance, but they can get that information the regular way, without cutting corners and violating people's privacy."
Egan said in a post on Facebook's website published on Friday that the social networking company has seen in recent months "a distressing increase in reports of employers or others seeking to gain inappropriate access to people's Facebook profiles.

Enhanced by Zemanta

Sunday, March 25, 2012

new payment solutions for UK and Australia

Expanding Reach to The United Kingdom and Australia

We are proud to announce that we have launched Paysafecard and POLi as the newest additions to our Alternative Payments portfolio.

Paysafecards are sold in more than 20,000 stores in the U.K and over 230,000 locations in 16 countries across Europe, and processing Paysafecard transactions on your website is without risk, as the payment is guaranteed and there are no chargebacks.

eComTechnology offer services that allow you to target consumers in North America, Europe and Asia.

Put one button on your site, click on it and be taken to 50+ payment options, it is that easy!

-not uncommon for us to see our clients experience a 30% or more increase in their sales.

-a great solution for start-ups and a solution for established merchants to increase sales.

-payment solutions are GEO-IP based, which means that automatically each payment page is translated into the consumer’s local language and a local phone number and email address is posted for support.

Whether you have a subscription website or sell goods and services, we provide a variety of methods that makes adding our services a simple process. We have incorporated our billing solutions into thousands of websites and our experienced tech staff can get you setup quickly.

Use of 50+ payment options in 40+ countries in 40 languages.

We are the One-Stop Solution for all your Alternative Payment needs.

eComTechnology provide merchants with a payment network that supports a vast array of national cards and non-card based payment schemes - among them direct debits, bank transfers, real-time banking, cash based payments, eWallets, prepaid cards and checks.

Alternative Payment Solutions

Saturday, March 24, 2012

(ICANN) depends on its U.S. government contract

A controversial attempt to expand Internet addresses far beyond the likes of .com, .org or .net has provoked a rare threat from the U.S. government to withdraw a key license from the body that runs the Internet's core functions.
The Internet Corporation for Assigned Names and Numbers (ICANN) depends on its U.S. government contract to coordinate the unique addresses that tell computers where to find each other, without which the global Internet could not function.
But this month the government warned that the non-profit body's rules against conflicts of interest were not strong enough and only temporarily extended ICANN's contract - which it has held since its formation in 1998 - instead of renewing it as many in the industry had expected.
A failure to secure the Internet Assigned Numbers Authority (IANA) contract would severely damage ICANN's ability to implement its address expansion program, the most radical move in the organization's history.
The conflict of interest concerns arise from the fact that some past and present board members stand to benefit financially from the liberalization of Web addresses through ties to organizations that make money from registering new domain names or consulting on the expansion.
Currently, organizations are restricted to a couple of dozen so-called top-level domains, such as .com, .org or .net, or country code domains such as
ICANN wants to enable brands, cities or firms seeking to build new Internet businesses to apply to own and run their own domains, for example .apple, .nyc or .gay, giving them more control over their Web presence and a greater choice of names.

Friday, March 23, 2012

IT skills shortage in Europe

European policy makers have identified a large shortfall in computing and IT skills among young people that threatens to dent Europe's ability to compete and could exacerbate youth unemployment in the coming decade.
While young Europeans may be good at using mobile smartphones and playing video games, they lack basic digital skills that could make them more easily employable in a rapidly digitizing economy, research from the European Commission shows.

The Commission estimates the shortfall of school leavers and graduates with required IT and digital skills could hit 700,000 by 2015, a deficit that will particularly affect leading digital economies such as Britain, France and Germany.

The findings add to concerns about growing unemployment across Europe, where 24 million people are out of work. Youth unemployment is a particular concern, with more than 50 percent of young people unemployed in Spain and Greece.

"Young people need to appreciate the professional aspects of the new digital world," said Antonio Tajani, the European commissioner for industry and entrepreneurship, as he launched a series of events labeled "e-skills week" to draw attention to the problem and generate ways of tackling it.

"This is more important than ever in the current economic context. And it is crucial to increase creativity which will favor entrepreneurship and new start-ups."

Europe continues to battle the impact of the eurozone debt crisis, with Italian labor reform talks and continued poor economic performance in Spain dampening hopes for a recovery.

At the same time, there are signs of economic recovery in the United States, Europe's largest economic rival and the world's most digitally advanced economy, while China continues to grow at an annualized rate of around 8 percent.

Thursday, March 22, 2012

Apple to overtake Intel

Intel Atom logo 2008
Intel Atom logo 2008 (Photo credit: Wikipedia)
Apple is on track to overtake Intel as the world's top mobile processor company, research firm In-Stat is expected to announce in an upcoming report, according to Infoworld.

Apple uses its proprietary information in building the A4, A5 and A5X processors used in its iPhones and iPads—or rather, provides the brains to the brawn of Samsung's foundry, at least in some cases. PCs are now Intel's major domain; but with global PC shipments seeing sub-2-percent growth last year, while smartphone sales soar and tablet sales remain on a track to overshoot PC sales, Apple could handily beat out Intel.

The report notes that Intel last year shipped 181 million processors for a 13.9 percent market share, while Apple shipped 176 million, for a share of 13.5 percent.

"Apple's continued success of the iPhone and iPad, as well as the stronger growth rates of the smartphone and tablet markets than PCs" will help it catch up to Intel, Jim McGregor, chief technology strategist at In-Stat, said in the report, according to Infoworld.

Intel, with its Medfield chips, the code name for its Atom processor Z2460, is aggressively working to get into the smartphone and tablet space, which could considerably increase its market share.

At the Consumer Electronics Show in January, Intel announced a multiyear strategic agreement with Motorola, which will use the chips in its smartphones beginning in the second half of 2012.
Enhanced by Zemanta

Wednesday, March 21, 2012

Facebook pre-roadshow

Facebook Inc is taking the next step on its IPO journey and has summoned research analysts from Wall Street banks to its Menlo Park headquarters early next week for a pre-roadshow briefing to discuss the finer points of its business and books.
The world's largest social network, which is racing toward what would be Silicon Valley's largest ever initial public offering, will not disclose new information during the meeting with analysts.

Instead, it will outline its strategy and answer questions on how to analyze its operations and help analysts build models on its financials, two sources told Reuters on condition of anonymity because the meeting is not public.

Called a "due diligence meeting", such pre-roadshow pow-wows are standard fare for future debutantes.

It is not clear how many analysts have been invited. One source said analysts from five to 10 of the largest banks underwriting Facebook's IPO will likely attend the meeting.

Tuesday, March 20, 2012

Microsoft's security leak

Microsoft's process for sharing information about security vulnerabilities in its products came under fire Friday after a roadmap for exploiting a severe, recently discovered flaw appeared on a hacking website in China.
The guideline, known as "proof-of-concept" code, most likely leaked from one the more than 70 security companies that get advance warnings from the company about major new holes, according to the researcher who found the flaw.

Microsoft said it was investigating the disclosure and "will take the necessary actions to protect customers and ensure that confidential information we share is protected pursuant to our contracts and program requirements."

"The details of the proof-of-concept code appear to match the vulnerability information shared with Microsoft Active Protections Program partners," said Yunsun Wee, Microsoft's director of its Trustworthy Computing effort.

Announced in 2008, Microsoft's program alerts security companies to upcoming patches, typically a day before the patches themselves are released. The idea is to give them time to prioritize and test the fixes before installing them to protect their customers.

The timing is essential, because once the patches come out, hackers can reverse-engineer them to figure out what problems they solve, then produce tools to break into unpatched systems. The window from patch release to working hacking code has shrunk from months or weeks to days and in some cases hours.
Enhanced by Zemanta

Monday, March 19, 2012

Pinterest climbing into the top favourites

Christina Gomez has carefully displayed her dream cribs, rockers and mobiles on Pinterest, the increasingly popular online bulletin board. Never mind that she doesn't have a baby.
"Ah, Pinterest - where I dress my unborn children and decorate my imaginary mansion," the San Antonio political consultant said - on Twitter - when asked about the website.

Gomez is addicted. And she's not alone. The social site where users can "pin" images and follow others' collections has surged in recent months to become the 16th most-visited site in the United States, according to the Web information company Alexa. That's a higher rank than

Pinterest CEO Ben Silbermann, who grew up in Iowa collecting bugs and stamps, said on Tuesday that his goal is to help people discover things that they didn't know they wanted. He said there are plenty of people trying to tell you what you want via billboards, catalogs or Internet ads.
Enhanced by Zemanta

Sunday, March 18, 2012

Check processing for Pharmacy

eComTechnology Check solutions for internet transactions.
Process your customer's checks on a virtual terminal right over the internet.
Works just like credit card processing. We deal with following business and others too worldwide.
eComTechnology credit card processing solutions.
Fully supported installation!
For more info apply at eComTechnology or email
High Risk eCheck Processing

Saturday, March 17, 2012

Nettalk, can finally put your land-line phone

By Robert Richardson

Nettalk, can finally put your land-line phone to rest for many of you! This one is simple with a few different options and easy installation.

Free local & long distance calling to U.S. and Canada and free calls to any other DUO worldwide.

Your own U.S. or Canadian phone number, depending on where you purchased the DUO.

Free voicemail to email and caller ID.
One price for the year can cover all calls in Canada and the United States at $59.95 and with each additional year for $39.95.
You get everything you need in the box, all you need is a phone. There is even a free app for your 3G/WiFi phone.

This is a great way to add a second phone or get rid of your land-line for good. Experience the most versatile digital phone service. Unlike others, the netTALK DUO is flexible enough to connect directly to your computer or directly to your Internet connection, so you don't have to rely on a computer for phone service, which works best for me. You down load a driver to your computer restart your computer and a quick registration, password change add a few free options and you are up and running. There is no need to leave your computer running to make or receive calls! The netTALK DUO is designed to connect directly to your router or modem, resulting in cost and energy savings while minimizing wear and tear on your computer. International plans available for 60 countries and available at leading retailers. This is the way it should be; a great product with simplicity and Tech support even available on weekends. Robert Richardson provides ecommerce solutions at eComTechnology. Thanks to Hudes Communications.

Enhanced by Zemanta

Friday, March 16, 2012

transmit up to 1 terabits per second of data

Image representing IBM as depicted in CrunchBase
Image via CrunchBase
IBM researchers continue to work with light in hopes of solving challenges in the rapidly evolving tech world. The latest example is a new prototype optical chip that they say can transmit up to 1 terabits per second of data, a number that could have huge implications in enterprise data centers and supercomputing environments.
The Holey Optochip, which IBM researchers will present March 8 at the Optical Fiber Communications Conference in Los Angeles, offers a boost in bandwidth that would mean, at 1T bps, the ability to download 500 high-definition movies. It would take about an hour to transmit the entire Library of Congress Web archive through the chip, according to IBM.
IBM scientists created the Holey Otpochip by taking a standard 90-nanometer CMOS chip and putting 48 holes in it. The holes allow optical access through the back of the chip to 24 receiver and 24 transmitter channels, according to IBM. The result, the scientists said, is a very compact, high-performing and highly energy-efficient optical module that promises bandwidth speeds to handle the rapidly growing amount of data traffic that is being created and run through both corporate and consumer networks.
The development of the Holey Optochip is the latest step by IBM scientists in leveraging optics to address modern computing challenges, according to Big Blue researcher Clint Schow, who was part of the team that created the prototype.
Enhanced by Zemanta

Thursday, March 15, 2012

Intel Temptations

Google cut cloud storage rate

google_heatrow_051125 (Photo credit: warrantedarrest)
One day after Amazon (NASDAQ:AMZN) Web Service slashed its cloud infrastructure prices for the nineteenth time, Google (NASDAQ:GOOG) has chopped the rates for its Cloud Storage software product, which lets developers sock away great chunks of data on the search engine company's servers.

Google first introduced Cloud Storage at Google I/O in May 2010. The service leverages the RESTful application programming interface (API) and Google's storage and networking infrastructure to store data and code from cloud computing projects while they are being built. The service provides storage for computation, static content hosting, Web applications, as well as the classic backup and recovery scenarios.

Enterprise storage providers have also integrated Google Cloud Storage to provide a Web-based alternative to their existing services. For example, Panzura allows global businesses to store, collaborate and back up files in the cloud using its Panzura File System and Cloud Storage.

Cloud Storage pricing is based on storage and bandwidth usage, which are are calculated in gigabytes (GB).
Enhanced by Zemanta

Wednesday, March 14, 2012

credit card processing for merchants

Do you have a high risk business in the United States, Europe, Canada or Asia? We can help!
eComTechnology provides check and credit card processing services to ecommerce businesses.
We work with not only traditional businesses but high risk and high volume businesses as well.
Get your Virtual Terminal or Gateway at eComTechnology today.
Need an offshore account?
We deal with following business and others too.
Whether in Asia, United States, Canada or based in Europe inquire or apply today and in most cases you can be processing in less than 10 days through your own virtual terminal or gateway.
ecomtechnology high risk credit card processing

Tuesday, March 13, 2012

Iceland's former prime minister went on trial

Geir Hilmar Haarde
Image via Wikipedia
Iceland's former prime minister went on trial Monday as the first world leader to face criminal charges over the 2008 financial crisis that affected much of the world economy.
Geir Haarde became a symbol of the bubble economy for Icelanders who lost their jobs and homes after the country's main commercial bank collapsed in 2008, sending its currency into a nosedive and inflation soaring.
Prosecutors opened the case at the Landsdomur, a special court being convened for the first time in Iceland's history. The trial is expected to last until mid-March, with the court taking another four to six weeks to deliver its verdict.
Mr. Haarde is accused of negligence for failing to prevent the financial implosion from which the small island country is still struggling to recover.
The former prime minister has rejected the charges, calling them “political persecution.”
Enhanced by Zemanta

Monday, March 12, 2012

Acute shortage of skilled labour

English: Flag of Canada over country contour F...
Image via Wikipedia
As Canada drags itself through a slow-motion recovery, one of the most pressing issues facing executives across the country is an acute shortage of skilled labour.
The most recent C-Suite survey of Canadian corporate executives shows that despite the high level of unemployment, companies just can’t get all the people they need to fill the skilled positions that are available.
With a federal budget coming this month, the executives say they want Ottawa to temper spending cuts with some new investments in skills training, and to open up immigration laws to allow more foreign workers to fill empty jobs.
The problem extends far beyond the oil patch. Executive from the Maritimes to Ontario’s high-tech heartland to Western Canada share similar difficulties in matching employee skills to job openings.
“It is a national problem,” said Francis McGuire, chief executive officer of Moncton, N.B.-based Major Drilling Group International Inc. “It exists everywhere.”
Enhanced by Zemanta

Sunday, March 11, 2012

NASA hacked

English: The NASA insignia. Español: Insignia ...
Image via Wikipedia
NASA said hackers stole employee credentials and gained access to mission-critical projects last year in 13 major network breaches that could compromise U.S. national security.
National Aeronautics and Space Administration Inspector General Paul Martin testified before Congress this week on the breaches, which appear to be among the more significant in a string of security problems for federal agencies.

The space agency discovered in November that hackers working through an Internet Protocol address in China broke into the -network of NASA's Jet Propulsion Laboratory, Martin said in testimony released on Wednesday. One of NASA's key labs, JPL manages 23 spacecraft conducting active space missions, including missions to Jupiter, Mars and Saturn.

He said the hackers gained full system access, which allowed them to modify, copy, or delete sensitive files, create new user accounts and upload hacking tools to steal user credentials and compromise other NASA systems. They were also able to modify system logs to conceal their actions.

"Our review disclosed that the intruders had compromised the accounts of the most privileged JPL users, giving the intruders access to most of JPL's networks," he said.
Enhanced by Zemanta

Saturday, March 10, 2012

Google Wallet

Google Wallet is going to be available on as many as 10 new Sprint (NYSE:S) phones in 2012, according to the creator of the mobile payment service.
Wallet is an application users may download from Google's Android Market. The program works in concert with near-field communication (NFC) sensors, allowing users to tap and pay for goods at checkout counters in retail stores such as Macy's and American Eagle Outfitters.
Wallet has seen little adoption because it has only been available on Sprint's Android-based Samsung Nexus S smartphone since the service launched in New York and San Francisco last September. Sprint will support Wallet on its Samsung Galaxy Nexus when that handset is available later this year.
The payment service has also experienced some bad press after security researchers last month revealed how Wallet can be hacked. Osama Bedier, vice president of Google Wallet and payments, argued that Wallet is very secure.
It was Bedier who promised at Mobile World Congress March 1 that U.S. consumers can expect Wallet to arrive on "at least 10 additional phones" this year. In addition to the Galaxy Nexus, this will include the LG Viper.
FierceMobileContent also noted that Bedier said Google remains in talks with other operators, device OEMs, banks, financial service firms and point-of-sale technology vendors on Wallet.
That should certainly boost Wallet's availability and profile among consumers looking to buy new Android smartphones this year.

Friday, March 09, 2012

Android OS malware

Image representing Android as depicted in Crun...
Image via CrunchBase
Malware that specifically targeted mobile operating systems increased in 2011 as smartphones became more popular with enterprise users, as well as consumers. These cyber-criminals also developed affection for the Google Android OS, which saw the biggest jump in malware during the past 12 months, according to a new report from Juniper Networks.

Malware targeting the Android mobile operating system grew by a whopping 3,325 percent in the last seven months of 2011, according to the 2011 Mobile Threat Report, which Juniper released Feb. 15. Android malware accounted for about 46.7 percent of unique malware samples that targeted mobile platforms, followed by 41 percent for Java Mobile Edition.

Overall, mobile malware more than doubled in 2011, growing by 155 percent across all platforms, which included Apple's iOS, Research In Motion's BlackBerry and Symbian. New malware samples targeting Java Mobile Edition increased by a little less than 50 percent in 2011. Java ME is popularly used on Symbian and Windows Mobile devices.

Juniper saw a "significant increase in the amount of mobile malware, its sophistication, as well as new nimble social-engineering-based attacks," said Daniel Hoffman, chief mobile security evangelist at Juniper Networks.

The Mobile Threat Center at Juniper Networks examined more than 793,631 applications and 28,472 unique malware samples to compile the report. Despite the eye-popping growth numbers, the total number for mobile malware remains minuscule, compared with malware targeting traditional computers.
Enhanced by Zemanta

Thursday, March 08, 2012

Zemanta Power User – Robert Richardson of eComTechnology

Zemanta Power User – Robert Richardson of eComTechnology

Posted by Ryan Lee, under power users on February 29th, 2012
eComTechnology high risk credit card processing
President of eComTechnology
We’re pleased to present Robert Richardson of eCom Technology as our featured Power User for this week! Happy readings :)
Who are you?
eComTechnology an ISO/Agent that focuses its services on merchant accounts and online payment processing services worldwide. We are operating our business realizing that the best way to be successful is to make our top priority our customers’ complete satisfaction. We look forward to helping you with all of your credit card processing needs whenever you need them.
We understand the importance of providing Internet merchants, whether standard e-commerce or high risk and offshore, with services that offer the most reliable and secure transaction features and credit card processing available on markets today. That’s why online merchants worldwide turn to eComTechnology for safe, real-time and cost-effective payment solutions.
With our network of partner processors we offer highly reliable payment gateways for live and batch processing, with a range of built-in services such as advanced fraud prevention tools, virtual terminal to process your phone/mail orders, recurring billing module, statement printing, live real-time statistics and more. Being a fully PCI compliant gateway, it supports Visa 3-D secure, MasterCard Secure Code and SSL processing.
Internet merchants from diverse industries are benefiting from our services including high risk merchants like adult entertainment, online pharmacies, online casinos, sportsbooks, bingo, betting exchanges, pre-paid cards, e-wallets, travel, e-wallet, replica products, and more. Our current merchants network includes: Canada, USA, UK, Denmark, Germany, Mauritius, Latvia, Panama, Hong Kong.
Our broad banking relationships, partnerships with other European payment service providers, dedicated customer service and technically perfected services are the foundation for our business relationship with you as our future customer.
What do you blog about?
I basically blog about technology business being internet, website,mobile,environment. Then I have two yachting sites which I cover worldwide sailing races or try too. Toss in a resort site which then I blog about travel as well. Then economics/business which goes on everything else covering the 20+ sites which are active with my posts daily.
When did you start using Zemanta?
I have been using Zemanta close to two years now or very close to it? I wouldn’t leave home without it.
How does Zemanta help you blog better?
It works consistently which is a big plus and I constantly update my sites with new version of WordPress and plugins and there never seems to be a problem there as a conflicting plugin. The images, articles, links and tags make blogging fast and more professional, not being one it really helps. Is great to read other peoples articles and then use their links as back up too, “I told you so”.
Do you have a power user tip that you can share with our users?
Zemanta will increase your search engine presence; look at my 20+ sites that are getting well over 1.5 million hits a month and like I said before I am no blogging pro, I do internet payment solutions worldwide.
Related articles
Related articles
Enhanced by Zemanta

Wednesday, March 07, 2012

merchant account guidelines

Credit card
Image via Wikipedia
Avoiding Credit Card Processing scams and protect your business
Credit card processing scams are unfortunately one of the fastest growing cyber crimes occurring today. These scams occur when businesses sign up with a new merchant account processing company only to discover that the credit card information being sent to the new company is getting stolen or misused, and/or they are being overcharged on transaction fees. Fortunately, there are ways that business owners can protect their business in 2012 from these scams.
A business owner should start by reading one of the many
credit card processing companies guideline websites. Since this is a relatively new field, credit card processing companies review websites rely largely on customer reviews of merchant account processors. Companies that are actually scams are usually identified within weeks on these websites.
There are several steps that a business can take, however, if they are considering doing business with a new merchant account processor. To start, only process a few credit cards in the first several weeks of doing business with a new company. Preferably, these should be cards owned by the business owner and/or his or her close friends and family members. If a company will steal credit card information, they will most likely do so immediately, and the business owner and his or her friends will immediately be notified of suspicious activity on their credit card. While canceling the credit cards will be a hassle, at least the business will not have alienated their customers to try out a new credit card processing service.
Next, run several different types of transactions on a card and carefully review the statement of fees that is generated from each transaction. Make sure that these fees line up with the amount stated by the processor when the business first signed up for services. Most of the scams that occur in this industry actually take the form of overcharging customers for transactions and/or charging customers for transactions that did not take place.
By carefully reviewing the statement that the credit card processing company sends to your business, it is possible to check that the amount that your business is being charged matches the amount that the credit card processor’s agreement states that you are supposed to be charged.
In addition to checking the fees charged for regular transactions, also look at the fees that are charged for transactions such as returns and chargebacks. Very few businesses keep accurate records of the number of credit card chargebacks that occur as the result of customers returning merchandise or taking care of mischarges, since these transactions rarely affect the bookkeeping of a business. Each one of these transactions, however, is subject to fees from the merchant account processor.
Because the fees from these transactions can be high and few businesses track these types of transactions, a common scam is to fabricate returns and chargebacks and charge businesses for them. These scams can be perpetrated by merchant account processors for months or years before the merchant account processor is caught.
Finally, be careful with how your business stores its customers’ credit card data. Typically, every transaction that occurs will generate a record that can include the client’s credit card number. Of course, by recording this data, a business has to be careful with how it disposes of it. Identity theft is a growing crime, but few people realize that the majority of data stolen is not done online, but rather from dumpsters.
To protect your business and your customers, make sure to shred any printed reports and receipts that have been already been logged before throwing them out. Losing your customer’s data can make your business instantly lose the trust that you have worked for years to create with your clients.

Enhanced by Zemanta

Tuesday, March 06, 2012

WinRAR for large email

WinRAR compression utility tool at eComTechnology
Multi-user licenses and languages Government and educational institutions discounts available Purchase WinRAR at eComTechnology today.
… is a powerful compression tool with many integrated additional functions to help you organize your compressed archives.
… puts you ahead of the crowd when it comes to compression. Consistently creating smaller archives, WinRAR is often even faster than the competition. This will save you disc space, transmission costs AND valuable working time as well.
… has a graphic user interface, supports drag & drop, and can also be integrated to your context menu.
… is ideal for multimedia files. WinRAR automatically recognizes and selects the best compression method. The special compression algorithm compresses multimedia files, executables and object libraries particularly well…. is also ideal, if you are sending data through the web. Its 128 bit password encryptionand its authenticity signature technology will give you peace of mind you are looking for.
Buy WinRAR today at eComTechnology
WinRAR compression at eComTechnology

Monday, March 05, 2012

Google (NASDAQ:GOOG) is offering up to $1 million in rewards

Image representing Google Chrome as depicted i...
Image via CrunchBase
Acting on the notion that it is harder to find exploits than security bugs, Google (NASDAQ:GOOG) is offering up to $1 million in rewards to those who find full and partial exploits in the popular Web browser.
The awards, which will be doled out at the Pwn2Own hacking contest at the CanSecWestCanSecWest security conference in Vancouver next week, also include a free Chromebook for every participant who submits an exploit.
The payouts include $60,000 for a full Chrome exploit covering user account persistence using only bugs in Chrome. Google is offering $40,000 for partial Chrome exploits covering persistence using at least one bug in Chrome itself, and other bugs, such as a WebKit bug combined with a Windows sandbox bug.
The company is further paying $20,000 for consolation awards, to those who find flaws in Flash, Windows or a driver, which may threaten any Web browser if exploited
The idea is not only to help Google hunt and squash bugs in Chrome, which has more than 220 million users, but also to help the Chrome security team study vulnerabilities and exploit techniques to bolster the browser's security in the future.
Enhanced by Zemanta

Sunday, March 04, 2012

850,000 new Android handsets and tablets activated

Google (NASDAQ:GOOG) said it is seeing 850,000 new Android handsets and tablets activated each day, a mark that should rise to 1 million daily activations in a couple months.
Andy Rubin, creator of Android and senior vice president of mobile and digital content for Google, made the announcement in a blog post published to accompany his presence at Mobile World Congress (MWC) in Barcelona Feb. 27.
The 850K number in itself isn't significant. What's significant is the growth trajectory Android has been on, considering that Rubin said he was seeing 700,000 Android activations as of Dec. 20.
If Android's device growth rate holds, Rubin & Co. should be trumpeting 1 million daily activations in April. The platform has also seen a year-over-year growth rate of 250 percent, with the Android device total amounting to more than 300 million units worldwide.
Google's Android Market, which had 150,000-plus apps at MWC in 2011, now has more than 450,000 apps. That's only 100,000 less than Apple's App Store. Google is also seeing more than 1 billion monthly app downloads in the Market.

Best Cuba City Guide – Interactive City Guide

Best Cuba City Guide – Interactive City Guide