Saroj Kar

Saroj is a Staff Writer at SiliconANGLE covering DevOps, Emerging Tech, Mobile and Gaming news. If you have a story idea or tip, send it to @SiliconAngle on Twitter.

Latest from Saroj Kar

Top iPhone and Android Apps Can Be BYOD’s Biggest Threat

San Francisco-based mobile app security provider Appthority has released its App Reputation Report that unveils the hidden security risks for top mobile apps. The report discloses security issues raised by the BYOD movement, along with the top targeted app categories on the Android and iOS platform and the sensitive data that the apps can access. The Appthority ...

Gamification Becomes the Norm: 7 Ways to Game Your Business

The year 2011 was marked by the emergence of new social paradigms, techniques and the latest buzzwords around mobility,  the cloud and social gaming. One more buzzword we have heard more in recent past is gamification – the transfer of gaming activity to enterprise software for marketing and business purposes. Gamification typically applies to applications ...

NFC Payments Will exceed $180 Billion by 2017, Obstacles Remain

According to a new study from Juniper Research, the global market for mobile payments, with the help of NFC-enabled devices will exceed $180 billion by 2017, a seven-fold increase compared to 2012. At the same time, leading regions in this area, which include North America, Western Europe, the Far East and China, will accumulate about ...

Beats Audio Couldn’t Save HTC: A Troubled Relationship Amongst Mobile Rivalries

One year after its stake in Beats Electronics, a company specializing in audio processing,  HTC announced to recede half of the company shares. HTC had bought 50.1% stake in Beats Electronics, founded by hip-hop impresario Jimmy Iovine and rap legend Dr. Dre. for $309 million in August 2011, in an effort to differentiate their handsets ...

Do You Trust Facebook or a Grocery Store with your Data?

Despite the rise of Facebook, the fact remains that companies like Google, Amazon generate more confidence with consumers. At least that’s what a recent a report says, by location-based marketing firm Placecast, conducted online by Harris Interactive. According to the survey, users with their personal data trust Facebook less than other internet companies including Amazon, ...

People Treat Brands Like…Other People, with Different Relationship Types

Brand management is becoming a discipline through which companies create, manage and foster relationships with customers. Brands need ambassadors to those who not only like the brand, but want its products with all their heart.  For those people who feel a deep connection to their brand, they become advocates, recommending and above all, get involved ...

The Two Sides of BYOD [Infographic]

BYOD looks like an unstoppable trend, as more and more people look for the convenience of their own device at work and on the go.  It’s been found to improve job satisfaction, commitment and productivity because it allows each individual to decide a key part of its contribution to business. For example, Cisco allows their ...

IBM Sequoia Faces Competition in Supercomputing Race

The Japanese are no longer owners of the most powerful supercomputer in the world. One again, it’s US that holds the title.  We’ve known for a while that Sequoia is a supercomputer developed by IBM, with the potential to be the fastest system of its kind in the world. The latest Top500 list of supercomputers, ...

Alternatives for Spool Now That Facebook’s Bought and Crushed It

Facebook has hired the mobile team behind the startup application development provider, Spool, in what appears to be the latest acquisition for social network.  This talent buy is largely in part to expand its technical staff. Although the social network is hiring all of Spool’s employees, the company didn’t comment on whether it has acquired ...

Cisco Releases Patches for Multiple Vulnerabilities in TelePresence Endpoint Devices

Cisco has acknowledged bugs in multiple versions of their TelePresence devices software, which would allow a remote attacker to take control of videophones by injecting arbitrary code and malicious commands. The company has released four separate advisories bulletin on the risks and advice customers to apply the security patches immediately. A total of five vulnerabilities ...