"security" articles

Harry Wang , Director of Health and Mobile Product Research at Parks Associates shares his thoughts on new telecom services that capitalize on broadband connectivity. Harry believes that telcos do have several opportunities to diversify into new markets. 1. Telco App Stores These would enable telcos to distribute content across mutliple end user platforms. Wholesale Application Community (WAC) – a global mobile carriers’ initiative to offer app purchases no matter what...
 
by Parks Associates | Aug. 11, 2011
Tags: apps, cloud services, OTT, security
Parks Associates projects the percentage of U.S. households with professionally monitored services will expand to 30% by 2020, with consumer demand for remote monitoring, coupled with the expanding presence of broadband service providers, driving growth in the security market. In its new report IP-based Home Monitoring: Security , which analyzes trends driving the market in 2011 and beyond, the international research firm estimates U.S. security monitoring, representing 18% of U.S....
Verizon will soon start selling a Home Monitoring Control service, and Bright House will soon start selling a more premium home-monitoring and security service, staffed and connected to police and fire departments. "The more services they can get someone to sign up for, the stickier that customer is to them," said Bill Ablondi , director of home systems research for the Parks Associates market research firm. Having a phone company take over home automation makes some sense,...
 
by Parks Associates | Jul. 15, 2011
Tags: apps, home network, security
Parks Associates' Home Systems Research Director Bill Ablondi will present information about engaging consumers in the smart grid and energy management as a customer service at the 2011 ConnectivityWeek Conference this week. Ablondi says the full potential of Advanced Metering Infrastructures (AMI) and the smart meters being deployed across the U.S. cannot be achieved without consumer involvement. "If utilities can enroll consumers in programs that allow them to satisfy...
 
by Parks Associates | May. 23, 2011
Tags: security, smart grid
Parks Associates' Mobile Health: Uptake by Consumers and Care Providers is a primary consumer survey that examines use of mobile technologies by both consumers and care workers in health applications. Consumer Topics include: -- Use of mobile to access health and wellness information, track personal health conditions, and interact with care organizations  -- Use of mobile apps, widgets, Web 2.0 tools, games, and mobile social networking solutions for...
 
by Mindi Sue Sternblitz-Rubenstein | May. 16, 2011
Tags: apps, security
Connected home platform developer 4Home was acquired by Motorola today (12/01/10). 4Home will now become a part of Motorola’s Mobility division; terms of the deal have not yet been announced. 4Home’s solutions include energy management, healthcare monitoring, home security monitoring and entertainment management. 4Home, a Sunnyvale, CA based company, was founded in 2005 and has been a regular participant at Parks Associates’ CONNECTIONS conference. To date the company has...
 
by Parks Associates | Dec. 2, 2010
Tags: home network, security, set top
The word from Light Reading comes that Comcast has made its XFINITY™ Home Security service available to the Houston market. This is another example of mobile and broadband service providers expanding their value-added services offerings into home, health, safety, energy, and security monitoring. What is the demand for home and health management solutions from broadband providers. In Customer Support in the Digital Home, we found 15% of consumers in U.S. broadband households...
 
by | Oct. 6, 2010
Tags: security, set top, smartphones
Comcast has launched its its Constant Guard™ Bot Detection and Notification initiative. This service automatically notifies customers if their home computer appears to be infected with a bot, which the National Cyber Security Alliance has called “one of the Internet’s fastest growing cyber crimes.” A bot is a type of virus that allows an attacker to force a computer to perform designated actions, usually without the owner’s or user’s knowledge. Once a bot is in control...
 
by | Oct. 5, 2010
Tags: security

Prev Page of 24 Next

PA_Staff_Quotes_Jennifer_v1_600x60.jpg

PA_Staff_Quotes_Jennifer_v1_600x60.jpg