About Satish Jawale


Posts by Satish Jawale:

Twitter – Twitter, Inc.

Twitter, Inc. - Twitter  artwork


Twitter, Inc.

Genre: News

Release Date: October 9, 2009

See what’s happening in the world right now. From breaking news and entertainment, sports and politics, to big events and everyday interests. If it’s happening anywhere, it’s happening on Twitter. Get the full story as it unfolds, with all the live commentary.

Be part of what everyone is talking about and get videos, live footage and Moments, direct from the source.

Join in on all the action by sharing what’s happening in your world. On Twitter you can post photos with stickers, GIFs, videos, and even stream live video with the Periscope button. There is no better way to have your voice heard.

© © Twitter, Inc.

Source: Apple

Netflix – Netflix, Inc.

Netflix, Inc. - Netflix  artwork


Netflix, Inc.

Genre: Entertainment

Release Date: April 1, 2010

Subscribe Now on Your iPhone® or iPad®

Watch TV shows and movies recommended just for you, including award-winning Netflix original series, movies, and documentaries.

Netflix has something for everyone. There’s even a safe watching experience just for kids with family-friendly entertainment.

No commercials. No hidden fees. Try one month free. You can cancel anytime.

How does Netflix work?

• Netflix adds TV shows and movies all the time. Browse titles or search for your favorites.
• The more you watch, the better Netflix gets at recommending TV shows and movies that you’ll love—just for you.
• You can create up to five individual profiles within a single Netflix account. Profiles allow different members of your household to have their own personalized Netflix experience built around the movies and TV shows they enjoy.
• Instantly stream on iOS devices or on the web.

© © 2011 Netflix, Inc.

Source: Apple

Security and Productivity is Key for Small Businesses, Too. DTEK50 and BlackBerry Software are the Solution.

Mixed race businessman working in office

If you run a small or midsize business (SMB), you know the struggle of doing the work you want to do – innovating and growing your business – while keeping track of the business-critical, yet mundane, things that demand your attention. You’re no doubt spread wide and thin trying to keep all the wheels of accounting, human resources, sales, marketing, IT, etc. moving in the same direction.

Mobility is a special challenge for SMBs. If you’re running a small business, you’re probably outsourcing IT to a consulting firm that is charging you every time a problem with an employee’s smartphone crops up. And midsize businesses’ IT staffs are overextended – provisioning, managing, and supporting employees’ mobile devices are just more boxes on their very long to-do list.

You can’t overlook the huge mobile security threat from your employees bringing devices onto your network to maintain access to their business apps, data, and communications. If you’re like many SMBs, you’re not enforcing IT security policies – if you even have them.

You’re wide open for data loss (and the associated fines) if employees click on a phishing email, leave an unencrypted device at a restaurant, download a malware-laden app, or turn off authentication because it slows them down.

And, with cost pressures being what they are, you probably don’t have the IT budget for a top-of-the-line, end-to-end security suite to lock down how, when, and where employees can use their smartphones – or the IT staff to manage it, even if you did.

BlackBerry’s DTEK50 Builds-In Security So You Don’t Have to


BlackBerry’s new Android-powered DTEK50 is the smartphone you and your employees have been waiting for. It delivers out-of-the-box functionality, completely wrapped in serious security, at a price that cost-conscious SMBs and employees can afford.

DTEK50 is not like the other phones on the market. While it’s backed by the most popular smartphone OS in the world, it bakes in security from the ground up to protect you, your employees, and your SMB from mobile threats.

  • A Stronger Android: This isn’t your everyday Android. We add numerous patches and configuration changes, backed by the experts in BlackBerry’s Security Research Group, to minimize the risk that DTEK50 will be hacked. Also, DTEK50’s secure boot checks each step of the startup process to ensure it hasn’t been tampered with since the last restart as an extra layer of protection against accidentally downloading malware-laden apps. With these modifications to Android, DTEK50 does some of IT’s heavy lifting to help protect SMBs that don’t have enough time or resources to deal with mobile malware threats.
  • Frequent OS Updates: We established with our first Android device, PRIV, that we’re the fastest device maker to deliver Android security updates. Our competitors wait weeks or months to release Android patches, but DTEK50 and PRIV get them practically as soon as Google releases them. This means less opportunity for a device to be vulnerable to an already-known threat.
  • Protection for Data on Lost Devices: Every time an employee loses his or her smartphone (which happens a lot), your key business data – customer information, emails, intellectual property – is at risk of falling into the wrong hands. DTEK50 encrypts data by default by government-grade FIPS 140-2 encryption, automatically protecting the data on DTEK50 from unwarranted access, even if the device is lost or stolen.
  • Security at the Chip Level: Our hardware root of trust adds security keys to DTEK50’s processor as it’s being built, rather than layering it on afterward with extra software, like our competitors do. Add-ons can create conflicts with other hardware or software on a device. Fewer potential conflicts means fewer malfunctioning devices and less employee downtime.
  • Complete Control of Your Own Privacy: DTEK by BlackBerry continually monitors users’ apps and operating system for potential privacy risks, like rogue apps that take pictures, send texts, or use the devices’ microphone without permission. Not only that, but DTEK also tells the user what to do to eliminate the risk, turning DTEK50 into a monitoring and remediation partner to your IT resources.

DTEK50’s Robust Features Keep You Connected

DTEK50 is a true workhorse that gives you and your employees nonstop access to the apps and data they depend on to get their jobs done.

  • DTEK50 FramesApp-tastic: Apps are what transform a smartphone from just a telephone into a do-it-all, on-the-go productivity device for mobile workers. DTEK50 offers full access to over 1 million apps in the Google Play store. With serious productivity tools, like Microsoft Office, Salesforce, or QuickBooks, workers can get tons of work done anywhere and anytime, right from the palm of their hand. And, if a difficult client situation leaves them a little stressed out, they can take a short breather with fun apps like Pokemon GO, Instagram, or Spotify. Whether for work or play, you can find it all (and more) in Google Play.
  • Typing Accuracy: Autocorrect, fat fingers, and moving too fast make it all too easy to make typos on a smartphone, but a misspelled word or a missing “not” in a sentence can change the entire meaning of a message. DTEK50’s onscreen Intelligent Keyboard learns from users to increase typing accuracy and speed. Also, Type by Swiping enables one-hand typing by letting you slide a finger from letter to letter to spell words. These features reduce the opportunity for typos that might cost you a customer’s goodwill, if not serious money or even legal action.
  • Stay Organized with BlackBerry Hub: With all of your emails, instant messages, texts, phone calls, calendar, and social networking consolidated in a single app, BlackBerry Hub will turn you into a communications powerhouse. Forget flipping from app to app to check your messages and social media communications – it’s all right there on Hub’s display.
  • Thin, Light, and Powerful: At just 7.4mm thin, DTEK50 is the slimmest BlackBerry ever made, and its 135g weight barely tips the scale. But within that slight package is a powerful, 2,610 mAh battery that delivers up to 17 hours on a single charge, plus rapid-charging technology should all of your productivity make you run out of juice.
  • Easy on the Eyes: DTEK50’s 5.2”, full-HD display is the ideal screen to view business documents on the go. It also serves as the perfect canvas for photos and videos taken with the 13MP rear-facing camera or the 8MP front-facing camera, both of which deliver 30fps video, which make it easy for field technicians, for example, to send photos of malfunctioning machines or parts that need to be ordered to their colleagues back at the office.

DTEK50 Won’t Bust Your Budget

SavingCost is always a consideration, whether you’re buying devices for your employees or your workers are trying to select the perfect phone to use for work and play. DTEK50 not only treats users’ business and personal information with the utmost privacy they demand, it does it at a price point anyone can afford.

DTEK50 is available to buy from ShopBlackBerry.com in the US, UK, Netherlands, and Canada, and pre-order from France, Spain, Germany, and Italy for $299 USD ($429 CDN, €339, and £275).

If you’re ready to say goodbye to the usual smartphone and switch to a device that enables security and productivity, check out BlackBerry’s secure Android DTEK50.

Source: Blackberry

Email Attachments are the Biggest Overlooked Threat to Enterprise Data. Here’s How IT can Plug this Gap

Email ProtectionEmail isn’t going anywhere. The typical business employee sends and receives 122 emails every day, a number that is expected to grow to 129 by 2019. Even in the age of smartphones and the cloud, email remains essential to communication, and is the primary means by which people share documents. From a security standpoint, that means a great many attachments pass through your email gateway – attachments which often contain very sensitive information.

It’s up to you to prevent that information from falling into the wrong hands.

Chances are, you’ve already taken some steps towards doing so. Maybe you’ve got an email data loss prevention (DLP) system in place, and require your employees to make use of an enterprise file sync and sharing (EFSS) tool. Unfortunately, those two steps on their own probably aren’t enough.

There are a few reasons for that.

Old and rusted storage gate.1) User-Controlled Security Is Inconsistent

With a traditional EFSS tool, the end user has control of how shared files are secured, and what a recipient can do with them. You should already see the problem here – each user is going to make their own judgement calls on how each attachment should be protected. By definition, this means that your security won’t be consistent across your user-base; a file that one user considers sensitive, another might not bother applying protections to.

2) End Users Make Mistakes…

It’s frighteningly easy to make a blunder that puts highly-sensitive data into the hands of someone who shouldn’t have it – that’s why incidents like what occurred recently in Northern Ireland are so common.

And no one is immune to those mistakes, not even you. Maybe you misplaced a character in an email address, maybe your client autocompleted an address with someone else, or maybe you just spaced out for a moment. Regardless of the reasons, without file-level security, hitting ‘send’ means you’ve just forwarded a confidential earnings report to Aunt Ethel or the details of an acquisition to your friend at a competing firm.

Man concentrating on a problem3) …and They Don’t Always Understand Security

Consistency aside, it’s both unreasonable and a little naïve to make regular employees entirely responsible for protecting your data. Most people aren’t security experts, even with proper training.  They won’t necessarily know what an appropriate level of security is, and many of them might not even be cognizant of the need for file-level protections.

4) Manual Controls Are Inefficient

Even if every user could be trusted to diligently apply controls to the documents that needed protection, they shouldn’t be expected to. Having to dictate a few settings for one or two attachments might not seem like a lot of work…but imagine having to do that for nearly every email you send out. It’s an extra, unnecessary step in what’s otherwise a very simple process – it’s sacrificing convenience for security (which, as we know, never works)

A lot of clips

5) DLP Alone Isn’t Always the Best Option

The problem with Email DLP is that it’s very limited in how it can be applied – you either stop the email, you send it without protection, or you lock it off in a quarantine (at which point it needs to be examined by someone senior). Given the confidential nature of the stuff that’s frequently sent via email –intellectual property, details on mergers & acquisitions, highly-placed people that you’re recruiting – this isn’t a task that can be handled by just anyone.

Without a means of automating DLP, someone like your CSO has to frequently review emails and decide what to do with them. Don’t you think their time is better spent elsewhere?

A Better Way to Do Enterprise Email

Now available as a standalone product, WatchDox by Blackberry Email Protector allows your IT department complete control over how recipients both access and use files sent through your email portal.  It integrates seamlessly with existing DLP systems, allowing for automatic protection of sensitive documents, with no intervention required. Most importantly, it’s unobtrusive – all the user has to do is hit ‘send.’

A padlocked chainlink fence gateSome of the file protections available through Email Protector are as follows:

  • Access control: Fully accessible, available as a digital-rights-management-protected download, or viewable only online. Access can be revoked at any time, and set to expire after a certain time period.
  • User permissions: Control whether users can view, edit, copy, print, or forward a file.
  • Custom watermarks: Include the recipient/sender’s email/IP address to deter malicious sharing.
  • Spotlight: Blur the screen everywhere but where the mouse is pointed, preventing screen capture.

Traditional EFSS is insufficient, and DLP is inefficient. In order to protect your business, you need something that allows your IT department complete control over your outbound attachments – even when they leave your firewall. You need Email Protector.

To learn more about how Email Protector can help you protect sensitive data within your organization, view our recent webinar Introducing Email Protector. You can also check out the official Email Protector Product Page for information on how to purchase Email Protector. Licenses start at $3.00 (USD) per user per month.  Finally, visit the WatchDox Product Page to learn more about what our secure EFSS solution can do for you.

Source: Blackberry

BlackBerry’s Cryptographic Security Technology is at the Heart of the ‘Software-Defined Car’

Certicom, the crypto expert in the BlackBerry Technology Solutions family, is prepared to lead the way to a secure software-defined future for the automotive industry –because when it comes to the future, proven experience matters.

Tomorrow, please join Certicom for a 60-minute webinar, demo, and Q&A focusing on the three important elements of security for the emerging software-defined car:

1) Securing the supply chain
2) Public Key Infrastructure (PKI) certificate management
3) Software-defined car with a trust anchor (live demo)

Register by clicking on the banner below:

Certicom Webinar RegistrationCerticom is a recognized leader in public key infrastructure (PKI) security design, innovation, and delivery. PKI is a foundational technology that has become the cornerstone of real world security across the Internet, mobile, medical, financial, government, military, consumer, automotive, industrial, IoT, and just about every application that communicates information electronically.

Public Key Cryptography uses public-private cryptographic key pairs to sign digital certificates and provide the essential elements of security, which are confidentiality, data integrity, authentication, and non-repudiation. PKI establishes the infrastructure that defines how digital certificates are created, distributed, stored, and revoked.

Public Key Cryptography matters

It is not at all an overstatement to characterize Public Key Cryptography as having established the main way that security is provided throughout today’s (and tomorrow’s) connected world. In fact, anyone who has ever logged on to a secure web site such as e-commerce or e-banking has used Public Key crypto, most likely without even knowing it. it is already built into personal computers and smart phones, and it won’t be long before it is built into every embedded application as well. And, that is a very important notion to grasp.

Certicom means security

Certicom Means Security

Proven PKI solutions from world leading software and security infrastructure suppliers like Certicom increase device (e.g. semiconductor chip and board) security, fight counterfeiting and cloning of products and firmware, promote product and personal identity authentication, secure asset management in supply chains, and improve the security of numerous other applications, including the emerging Internet of things (“IoT”).

Public Key crypto’s tremendous growth is being increasingly driven by two powerful forces: 1) the widespread adoption of autonomous communicating devices (including IoT) across many applications segments, and 2) the realization that such devices absolutely must be authenticated (as noted by Dr. Vint Cerf, who is credited as one of the founders of the Internet). In addition to authentication, the other critical components of security are needed for true security; namely, confidentiality, data integrity, and non-repudiation.

More things connecting translates directly into more targets, so security from end-to-end is becoming mandatory. In fact, vulnerability increases faster than the increase in the number of nodes. (This is a corollary to Metcalf’s Law of the power of a network growing at the 4th power of the number of nodes.)

Security matters

More Attack Surfaces

Security matters to everyone because everything that connects is vulnerable.  Because Certicom solutions are resource optimized, certified, and practical it is easy to obtain world class, security and protect manufacturing supply chains to enhance revenue, profit, and protect brand equity.

Certicom’s 3 products families of government validated crypto libraries, PKI certificate solutions, and asset management systems make “things” not just secure, but BlackBerry secure, without having to become a crypto expert.

This was originally published on the QNX Auto blog.

Source: Blackberry

Android 7.0 Nougat: a more powerful OS, made for you

Today, we’ll begin rolling out Android 7.0 Nougat to Nexus devices. And with more ways to make Android your own, it’s by far our sweetest release yet.

We took a different approach to building and launching Nougat this year. For starters, we invited developers to take a sneak peek at Android N back in March, so they could bring their apps to the new platform earlier. And of course we asked you to help us come up with names for this year’s release, resulting in lots of great ideas, and a delicious unveiling back in June.

Android Nougat reflects input from thousands of fans and developers all over the world. There are over 250 major features in Android Nougat, but we wanted to highlight a few of the features you’ve been most excited about.

More personal
Providing more ways to customize your phone to fit your personality is kind of a big deal, and Android has been leading the way since day one (Homescreen widgets, anyone?). With Android Nougat, you’ll have even more ways to make your phone your own, including:

  • Expanded emoji: There are now over 1,500 different emoji built into Android, including 72 new ones, so go ahead: express yourself.

  • Quick Settings controls: Quick Settings gives you easy access to things like bluetooth, WiFi and the all-important flashlight. With Android Nougat, you can actually control what tiles go where, and move ‘em around to fit your needs.
  • Multi-locale support: Apps can tailor their content based on your locale settings. So if you speak multiple languages, for instance, then search engines can show results in each of those languages. 
Expanded emoji and Quick Settings controls

More productive
Whether you’re responding to work emails or making plans with friends, Android Nougat helps you multitask with ease with new features like Multi-window, Direct reply, and Quick switch.

  • Multi-window: Run two apps side-by-side. The windows are resizable, too, by simply dragging the divider.
  • Direct Reply: Reply directly to notifications without having to open any app.
  • Quick Switch: Switch between your two most recently used apps by simply double tapping the Overview button.

More battery smarts
Starting with the release of Android Marshmallow last year, we have been making the battery smarter. That’s why we made the Doze feature even dozier with Android Nougat. Your device can now drop into lower power usage when it’s getting jostled around in your pocket or bag while on the move.*

More immersive
Android Nougat is designed with immersive experiences in mind—including support for VulkanTM (an advanced 3D rendering API) and Daydream (Google’s platform for mobile virtual reality).

  • VulkanTM: Games will now leap to life thanks to high-speed, next-generation graphics — all powered by your device’s multi-core processor.
  • Daydream: Android Nougat is ready to transport you to virtual worlds with Daydream-ready phones, headsets and controllers — all coming later this year.

More secure
As always, Android is built with powerful layers of security and encryption to keep your private data private. For new devices coming this fall, we’ve also added new features like Seamless updates, File-based encryption and and Direct Boot.

  • Seamless updates: New Android devices with Nougat can install software updates in the background which means you won’t have to wait while your device installs the update and optimizes all your apps for the new version. And for current Nexus users, software updates now install much faster, so you won’t have to wait for minutes while your device reboots. 
  • File-based encryption: Android Nougat can better isolate and protect files for individual users on your device.
  • Direct Boot: Direct Boot helps your device startup faster, and apps run securely even before you unlock your device when your device reboots.

And for those of you who also want to use your Android device at work, there are also new security features for using Android in enterprise, which you can learn more about on the Android for Work website.

Coming soon, to a device near you
Today, and over the next several weeks, the Nexus 6, Nexus 5X, Nexus 6P, Nexus 9, Nexus Player, Pixel C and General Mobile 4G (Android One) will get an over the air software update** to Android 7.0 Nougat. Any devices enrolled in the Android Beta Program will also receive this final version.

And there are many tasty devices coming from our partners running Android Nougat, including the upcoming LG V20 which will be the first new smartphone that ships with Android Nougat, right out of the box. You can learn even more about Android Nougat at www.android.com/nougat.

Posted by Sameer Samat, VP of Product Management, Android & Google Play

*Hey, just a reminder that actual battery performance varies and will depend on a number factors including signal strength, network configuration, battery age, operating temperature, features selected, device settings, and voice, data, and other application usage patterns.

**The Nexus and Pixel C update to Android 7.0 Nougat occurs in stages and some carriers will receive the update later than others. This update will be pushed simultaneously to devices in the Android Beta Program.

Source: Android

Windows 10 Tip: Use Cortana above your lock screen

Happy Monday, everyone! In last week’s Windows 10 Tip, we showed you how to get started with Microsoft Edge extensions.

Today, we’re going to show you how your personal digital assistant, Cortana*, can help you with all kinds of tasks across your device – even above your lock screen, thanks to the Windows 10 Anniversary Update.

Cortana allows you to perform tasks including set timers, track flights or even check the traffic, just using your voice. And now, with the Windows 10 Anniversary Update, you can talk to Cortana on your PC’s lock screen.

Here’s how to use Cortana above your lock screen:

Start by saying “Hey Cortana,” and ask her what the weather will be like this week, to remind you to do something or to play your favorite songs – without unlocking your device!

Start by saying “Hey Cortana,” and ask her what the weather will be like this week, to remind you to do something or to play your favorite songs – without unlocking your computer!

Check out Cortana’s Tips and Tricks menu in your taskbar to see what tasks Cortana can help you with, and have a great week!

*Cortana available in select markets.

Source: Windows

Good Dynamics Applications SDK Update: iOS 10 & Android N Releases


Good Dynamics Applications SDK Update: iOS 10 & Android N Releases

With the upcoming release of iOS 10 and Android N there will be a Good Dynamics SDK update for compatibility. All Customers and Partners currently with Good Dynamics apps are encouraged to update and test with upcoming compatible versions of the Good Dynamics SDKs in order to avoid any app disruption when users upgrade their OS. The goal is to complete this by September 1st so your apps can be tested before iOS 10 and Android N are generally available. New apps must also be built with these SDKs.

Please visit this iOS 10 and Android N Updates page for the latest information, and follow it to get notified as changes go live. We highly recommend upgrading and testing your apps with the most recent GD SDKs located on the downloads page.  

Attend the Live Developer Webcast –  August 23rd 11:30 AM ET
IMPORTANT ACTION REQUIRED: Good Dynamics Applications – iOS 10 & Android N Release

Join us for this Webcast for an important Good Dynamics SDK update for the upcoming releases of iOS 10 & Android N.

We will provide an overview and a technical walkthrough on what is required to avoid any disruption with your GD applications currently deployed when users upgrade their OS.

In this webcast we will cover:

  • Overview & Timeline
  • Technical Walkthrough of Requirements
  • Development Resources Available
  • Question & Answer Period

Register to Join the Webcast HERE
(Use and share this same link to watch this as a recorded Webcast after August 23rd)

Source: Developer Blackberry

Spotify Music – Spotify Ltd.

Spotify Ltd. - Spotify Music  artwork

Spotify Music

Spotify Ltd.

Genre: Music

Release Date: July 14, 2011

Spotify is the best way to listen to music on mobile or tablet.

Search for any track, artist or album and listen for free. Make and share playlists. Build your biggest, best ever music collection.

Get inspired with personal recommendations, and readymade playlists for just about everything.

Listen absolutely free with ads, or get Spotify Premium.

Free on mobile
• Play any artist, album, or playlist in shuffle mode.

Free on tablet
• Play any song, any time.

Premium features
• Play any song, any time on any device: mobile, tablet or computer.
• Enjoy ad-free music.
• Listen offline.
• Get better sound quality.

Please note: This app features Nielsen’s audience measurement software which will allow you to contribute to market research, such as Nielsen’s Audio Measurement. If you don't want to participate, you can opt-out within the app settings. To learn more about our digital audience measurement products and your choices in regard to them, please visit http://www.nielsen.com/digitalprivacy for more information.

Privacy policy: http://www.spotify.com/legal/privacy-policy/
Terms of use: https://www.spotify.com/legal/end-user-agreement/

Love Spotify? 
Like us on Facebook: http://www.facebook.com/spotify 
Follow us on Twitter: http://twitter.com/spotify

© © 2008–2016 Spotify Ltd.

Source: Apple

These events allow to you to share time with other replica watches sale watch lovers as well as learn about what the brands are up to. In the process, you'll get treated to rolex replica sale fabulous dinners, meet celebrities, receive gifts, and feel like a valued customer who the brands really want to rolex replica sale have a relationship with. Depending on where you live and the brands you like to purchase from, these events can be quite frequent, and also really fun. Their value should not be underestimated, and again, if you don't purchase rolex replica sale watches in an "official manner" you'll never be included. Personally, I have to say that while I don't like spending more money than I need to, the value of these above unexpected benefits, in many instances, can make up for the discounts replica watches available at gray market retailers when you want to buy a new watch. In a sense, each time you rolex replica sale purchase a high-end timepiece, you are designating yourself as part of a elite group of replica watches sale people who have the appreciation and resources for luxury items.