Media Search:



Control Group Appoints Ad Industry Veterans Andy Murray and Scott Hagedorn to Board of Directors

NEW YORK--(BUSINESS WIRE)--

Control Group, a technology and design company, today announced the appointment of Andy Murray and Scott Hagedorn as advisors to its board of directors. As recognized industry veterans, Murray and Hagedorn together bring more than four decades of executive leadership, advertising, and marketing expertise to the Control Group team.

"Our clients are realizing the impact that a refined user experience can have on their brand and profitability, saidCampbellHyers, Founding Partner & CEO of Control Group. "We believe that the best way to help our clients create a valuable and marketable product and service for their customers, is to base engineering and design decisions on a solid foundation on consumer, user, and market intelligence. AndyandScotthave fantastic knowledge is these areas."

Andy Murray is the founder and retired chairman of Saatchi X, and a pioneer in the advertising discipline of Shopper Marketing, which is the science and art of converting consumers into buyers. This is a welcome perspective to Control Group as it moves to bring more interactive and engaging experiences to the retail space.

"Control Group demonstrates a strong commitment to leveraging technology to deliver better consumer experiences," said Murray. Im thrilled to be a part of the Control Group team.

Scott Hagedorn is a 15-year marketing/advertising industry veteran and is currently CEO of Annalect Group, Omnicom Media Groups digital data and analytics organization. Scott is leading the effort to reinvent the fundamentals of media measurement and activation. He previously served as U.S. CEO of PHD Network.

"The momentum and innovation inside of Control Group is exciting. The monumental shift in how organizations connect with people at the intersection of the digital and physical worlds represents a massive opportunity. Needless to say, I am pleased to be a part of the Control Group board of directors," Hagedorn said.

About Control Group

Control Group is a technology and design companythat creates exceptional user experiences across the spectrum of human and technology touch points, from infrastructure to interface. With a full stack of expertise in software development, design, and enterprise systems,we deliver platforms, products, and managed services thatenhance brand and operational value,create new sources of revenue, and elicit a "wow". Our clients include leaders in Architecture, Media & Entertainment, Hospitality, Healthcare, Art, Finance, and Retail industries. For more information about Control Group and its services, go to http://www.controlgroup.com.

Link:
Control Group Appoints Ad Industry Veterans Andy Murray and Scott Hagedorn to Board of Directors

TouchRemote allows PC media control

Published by Steve Litchfield at 7:58 UTC, May 8th 2012

Launched last year and, for some unfathomable reason not covered here before, I thought TouchRemote was well worth a mention for anyone looking to control media on their Windows PC from a Symbian smartphone. This latest update works with Winamp, iTunes, VLC Media Player, Windows Media Player, Windows Media Center, ZoomPlayer and TerraTec HomeCinema - look past the implementation in Java and you'll see what looks to be a fairly comprehensive solution.

From the TouchRemote web site, here are some appropriate screenshots:

From left to right, the TouchRemote main menu on Symbian; the built-in implementation of Remote Desktop; the integral mouse emulation.

From left to right, the remote file manager; WinAmp media control; and iTunes control.

The TouchRemote download page has a trial version that offers most (though not all) of these functions, so you can check whether this is something that's practical for you in the first place.

Comments welcome - is this something that you need or is a solution looking for a problem?

Source / Credit: Nokialino

Go here to see the original:
TouchRemote allows PC media control

North Korea’s Control of Media Breached by Technology

By Nicole Gaouette - Wed May 09 22:56:31 GMT 2012

Pedro Ugarte via Getty Images

A North Korean woman checks a computer a at music software company in Pyongyang.

A North Korean woman checks a computer a at music software company in Pyongyang. Photographer: Pedro Ugarte via Getty Images

North Koreans are increasingly able to access global media and other information, loosening the regimes iron grip on their knowledge and potentially bringing far-reaching changes to the so-called hermit kingdom.

Interviews with refugees, travelers and defectors reveal that North Koreans are using illegal Chinese mobile phones, DVDs, computers and small flash drives to work around official barriers to outside information, according to a report being released today. The interviews, conducted over a decade by the Washington-based consulting group InterMedia, show the information environment has undergone significant changes since the 1990s.

North Korea has long sealed itself off from the world, with an official state ideology of juche, or self-reliance, and a narrative that pits a resilient regime against a hostile world. That narrative, and the isolation that has allowed it to flourish, are beginning to crack as new information penetrates the North, InterMedia said.

Positive perceptions of the outside world can call into question many of the North Korean regimes most central propaganda narratives, which legitimate the regime by portraying it as the countrys protector from hostile outside forces, according to the report, which was funded by the U.S. State Department.

The changes in information access are creating a more aware citizenry and a greater space between North Korean citizens and their leaders and between the regimes portrayal of North Korea and the prevailing reality on the ground, according to the report, titled A Quiet Opening: North Koreans in a Changing Media Environment.

The report noted that the changes taking place in North Korea so far are very small and there is little hope for any near-term grassroots pushback against the regime headed by Kim Jong Un, grandson of state founder Kim Il Sung.

Go here to read the rest:
North Korea’s Control of Media Breached by Technology

Dallas Political Parties Use Social Networking to Reach Voters

For political parties in Dallas, social networking sites like Facebook, Twitter, and YouTube have become valuable tools for communication and winning votes. The opportunities offered by these sites made a big difference in the 2008 elections, and many hope to capitalize on them again in November of 2010.

For Democrats, social networking connects to voters they need to target. "In 2008, we saw a whole new set of voters come in," according to Steve Tillery, executive director of the Dallas County Democratic Party. "A lot of local candidates had been using it, and there was lots of chatter there. We decided we needed to get in on this and build some excitement."

"It's helped in a few ways," Dallas County Republican Party chairman Jonathan Neerman said of social networking. "We've become more nimble in our communication tactics. When news breaks, you can quickly notify your entire mail list. It has also helped us reach out to different audiences."

The Democratic and Republican Parties both utilize Facebook, mostly to pass along political news of local interest and to promote their candidates. It has also been an effective fund-raising tool for Republicans. During a recent Dallas visit by Speaker of the House Nancy Pelosi, the county GOP used Facebook to promote a "money-bomb," a concentrated money-raising effort. Supporters were asked to contribute to the party in a "money-bomb" to counter Pelosi's local fund-raising efforts. All told, county Republicans raised over $10,000.

According to Tillery, the county Democratic party does not use social networking for fund-raising. "It just hasn't been successful for us," he said. What has worked for Democrats, he said, is using Facebook to organize volunteer efforts. During several recent neighborhood walks to "get out the vote," over 100 volunteers turned out, largely due to word on Facebook.

Some candidates also use social networking as a fund-raising tool. Stephen Broden, who is running for the U.S. House of Representatives in District 30 (Texas), uses Facebook and Twitter to communicate with supporters, even those outside his district. Many of them use links on his Facebook page to contribute to his campaign.

YouTube may be an entertainment source for most, but it has become a powerful political tool as well. The Dallas County Republican Party has used their official YouTube channel (dallascountygop) to post news stories, videos from rallies and speeches, and even original viral videos. When chairman Jonathan Neerman posted a video of his young daughter delivering yard signs, the response was instant. "We had people calling us wanting to have my daughter deliver signs to them," he said.

The Dallas County Democratic Party also has an official channel (dallascountydems2010) that shares videos of recent neighborhood walks in Dallas. The Dallas County Young Democrats posted a series of videos called "Meet the Democrats," featuring local candidates speaking from the heart about why they are running.

Twitter has been an especially effective tool used by candidates to keep in touch with supporters, and even make news. When Debra Medina was running for governor, she often made announcements via Twitter, ahead of traditional press releases.

As both parties look to make the most of their social networks, the big question is what comes next. "I want to know what is going to be the next big thing we will have to get into," Tillery said. "What is going to replace Facebook and Twitter?"

Go here to read the rest:
Dallas Political Parties Use Social Networking to Reach Voters

GFI Labs Observes Cybercriminals Targeting Users of Major Social Networking Sites in April

CLEARWATER, Fla., May 8, 2012 /PRNewswire/ -- GFI Software today released its VIPRE Report for April 2012, a collection of the 10 most prevalent threat detections encountered last month. In April, cybercriminals were seen exploiting users of major social networking sites including Facebook , Twitter, Tumblr and Pinterest in order to spread malware and spam surveys.

(Logo: http://photos.prnewswire.com/prnh/20120330/NE79547LOGO )

"In the same way that the popularity of social networking sites makes them a widely accepted tool for businesses to reach customers and elevate brand awareness, it also appeals to cybercriminals seeking a large pool of captive users to be targeted for malware and spam attacks," said Christopher Boyd, senior threat researcher at GFI Software. "Established sites like Facebook and Twitter have long been a breeding ground for new cyber-attacks, but now we are seeing scammers taking an interest in the popularity of newer sites like Pinterest in order to catch victims off guard and trick them into clicking on something they shouldn't."

Twitter users were the quarry of cybercriminals looking to distribute fake antivirus applications during a particularly vicious spam run which tweeted a link labeled "must-see" from numerous compromised accounts and spam-bots. Followers unlucky enough to click on the links were directed to a site infected with a fake antivirus program. Once installed, the program constantly alerted users that their machine was infected and requested payment to clean up the system. The next day, additional links used the Blackhole exploit kit to infect victims' machines with malware before automatically sending them to a site that was hosting another scareware program called "Windows Antivirus Patch."

Twitter was also used as a platform to take advantage of users on Pinterest, a social networking site which is rapidly gaining popularity. A spam campaign using the account "Pinterestdep" claimed to be offering Visa gift cards to users willing to provide their opinions about Pinterest. Instead of being directed to a user feedback form, victims were sent to a site which required them to complete up to 11 reward offers and to refer three friends to do so as well. Scammers also took advantage of Tumblr users who mistakenly entered "Tublr" into their web browser when attempting to access the popular micro-blogging site and redirected them to a message that claimed the victim had been selected as a "daily winner." Like the scam on Pinterest, the victim was then asked to fill out surveys or complete other offers in order to claim the prize.

In a rehash of a popular lure used previously on Facebook and MySpace, scammers tricked users into installing a fake application which promised to show them a list of people who had viewed their profile. The application did little more than tag the victim's friends in a spam image in order to spread the fake application among their network and serve them with surveys that generate affiliate cash for the scammer.

"With countless studies being released which point to the regularity with which users are visiting their favorite social networking sites, it should come as no surprise that cybercriminals see these sites as prime targets for their attacks as they look to reach as many people as possible," continued Boyd.

Top 10 Threat Detections for April GFI's top 10 threat detection list is compiled from collected scan data of tens of thousands of GFI VIPRE Antivirus customers who are part of GFI's ThreatNet automated threat tracking system. ThreatNet statistics revealed that Trojans remained the most used attack method in April 2012, taking four of the top 10 spots.

Detection

Type

Read more here:
GFI Labs Observes Cybercriminals Targeting Users of Major Social Networking Sites in April