Sunday 30 November 2014

Black Friday: Black Friday Headphone Deals UK 2014

Black Friday: Black Friday Headphone Deals UK 2014

Black Friday is in full swing so there's never been a better time to buy a new set headphones.


John Lewis have got some particularly striking deals on high-end Sennheisers and a range of other cans from Skullcandy and Yurbuds.


For a significant step up from the freebie buds that come with your phone, but one that won't break the bank, it's hard to go wrong with a set of Sennheiser CX300ii ear buds.


A true bargain on a TechRadar 5-star rated product at £21.99.


Black Friday headphone deals 2014:


AKG K452: High-Performance On-Ear Headphones for £54 at Amazon.


Sennheiser CX 300 II: Excellent earphones! Save £23 by picking them up at Amazon for £21.99.


Philips SHB6017: Bluetooth wireless sports earphones on Amazon for just £39.99.


Beats Solo 2: Get these Beats by Dre for just £135 at Tesco!


Sennheiser Over ear: Save £60.99 on the Sennheiser Momentum Closed headphones - now just £199 at Amazon


Sennheiser MM 30i: Ear-Canal Headset, now £29.95 on Amazon.


Sennheiser HD419: Sleek closed back headphones, save £15 - now £39.95 on Amazon.


Sennheiser HD201: Closed dynamic stereo headphones, now just £17.98 on Amazon.


AKG K550: High performance headphones, save £150.99 - now just £99 on Amazon


More headphones deals: Lots more black friday deals on headphones at John Lewis - check them out!




http://feedproxy.google.com/~r/techradar/portable-devices-news/~3/n3HW-JI-yxQ/story01.htm

In Depth: The hackathon-winning idea that apocalypse-proofs your phone's reception

In Depth: The hackathon-winning idea that apocalypse-proofs your phone's reception

It began with drinks, canapés and Deadmau5 blaring from high-end speakers. There was a palpable buzz in PayPal's town hall situated about 15 minute's drive outside of central San Jose, California. The room was filled to bursting with enthusiastic programmers, looking forward to the next 24 hours spread out over two days of the PayPal/Braintree Battle Hack Hackathon.


This meant two days of coding. Two days of crunch. Two days of endless coffee, Red Bull, arguments, U-turns, more arguments and above all, eye-reddening concentration. Sounds like hell on earth. For these people, it was sheer heaven.


The contestants at Battle Hack are the best of the best. These are the coders, crunchers and hackers who beat out the scores of their peers to qualify for PayPal/Braintree's hackathon. They're then flown from disparate parts of the world – London, Tel Aviv, Singapore, Miami to name a few – to San Jose to prove their mettle against the cream of the crop. Within a 24 hour timeframe they've got to create an app with social relevance, present it and somehow tie it in to Paypal's online payment system. The winners take home $100,000 a golden plated commemorative axe (have fun getting that through customs). Simple, really.


Battlehack


Except not. All of the participants in the Battle Hack final earned their place with an app they developed over a relatively long time. For the final they had just a few weeks to go one better on their winning work - a stern test by anyone's standards. Still, it was a strong field right from the outset.


Coming up with the killer app


Team San Francisco, for example, pitched an app that turns not using your smartphone into a game. Owners set time constraints for each other via their contact books and score points on a leaderboard by staying off the phone. Losers then donate money to charity when they go over their allotted time.


The four-person team from Toronto created an app for the visually impaired; using the iPhone's Siri function, visually impaired owners can scan items in the grocery store and have their phone tell them what they are and how much they cost.


Battlehack


For its part, Team London created a peer-to-peer education app aimed at students. Premium content can be purchased with PayPal, but the app functions principally as a free tutoring system that can be used globally. It's the sort of initiative that would benefit countless kids in the UK alone, and one the government probably wouldn't come up with in a month of Sundays.


In the end, Battle Hack 2014 was won by a pair of blokes from Israel, Shai Mishali and Pavel Kaminsky. Their triumphant idea? AirHop, an app that enables smartphone owners to make calls and send texts even if they have no simcard or reception. After they announced it on day one of Battle Hack, journalists in attendance were rather sceptical about their ability to pull it off. When they demoed it working the following day, we were surprised that the phone industry wasn't sending in the flying squad – since all of the presentations were being streamed live on YouTube.


Ready for the zombie apocalypse


"We had the idea for this about two days ago," says Pavel. "We were sitting in a coffee shop near my house and discussing what we were going to do at Battle Hack."


"I mentioned that I had to pick my girlfriend up from the airport and I had no reception. There were plenty of people around me but I was a bit shy to ask one of them whether or not I could use their phone to make a call. At that point, Shai and me started bouncing ideas off each other."


Battlehack


The way AirHop works is rather simple: it essentially lets users 'hop' onto another person's device and use their connection to make a phone call or send a text in exchange for a payment made through PayPal. It also allows them to use the host device's WiFi for a nominal fee. The implications of AirHop are pretty staggering. While in the First World connectivity is easy and abundant, in developing countries this isn't always the case. Pavel says they built the app with this in mind, although they haven't written off the possibility of AirHop causing a stir in the West.


"It doesn't have to be exclusively for the Third World, though," says Shai. "If you think about this year when you've seen riots and panic and the spread of Ebola – in a crisis situation, usually the first thing that breaks down is the lines of communication. AirHop could really help with this."


"Anywhere that's crowded, you'll have a connection problem too – music festivals, conferences – and if you're backpacking you could be without a signal," he adds. "It doesn't just have applications if the zombie apocalypse happens."


Shai and Pavel leave Battle Hack with the hackathon's premier bragging rights – not to mention two golden axes and $100,000 in their PayPal accounts. But they also take a groundbreaking piece of technology back out into the world, which they hope to take further. AirHop was created and demoed in just 24 hours. The mind boggles at the prospect of what these two could create with a bit more time and funding.
















http://feedproxy.google.com/~r/techradar/internet-news/~3/SXlHaVBmbvo/story01.htm

Will Windows 10 mean the end of malware?

Will Windows 10 mean the end of malware?

Introduction


Think Windows 8 was a big step forward in security? So did Microsoft – at the time. Looking back though, Chris Hallum, who manages the security features in Windows and Windows Phone, now thinks it had incremental improvements tackling a subset of the problem.


That's not helped by the fact that PC makers didn't start putting the same kind of touch sensor fingerprint readers as seen on the iPhone on their devices the way he'd hoped they would.


He's still hoping to see fingerprint sensors become common, but he's also bullish about what's coming next. "In Windows 10," he says confidently, "you'll see we actually decisively address entire classifications of issues with solutions that maybe in some ways can eradicate the issue in its entirely."


Password crisis


The first issue to tackle is passwords. "We're no longer thinking about passwords as a problem," he admits freely. "Passwords are actually a real-time crisis. You have to move to something better."


And that would be the 'next-generation credential'. It's going to use two-factor authentication, with the second factor being either the Trusted Platform Module security chip which is in many modern PCs and will be in every single Windows device in 2015, or your phone (where the equivalent of the TPM is "pretty close to pervasive") – or, he suggests mysteriously, "devices we're not talking about yet".


When you first make your account, your PC will create a key that's stored in a secure container, protected by the TPM – you might have one key for your personal account, another for your online bank and another for your work account that has a longer PIN.


"The user unlocks their Windows container with an unlock gesture, which could be a PIN or a password or biometrics, and they get access to it," says Hallum. That PIN isn't the usual four digits – it can be up to 20 characters long and it can include numbers, symbols, spaces and upper and lower case letters.


Finger printing good


Or you could use a fingerprint. Hallum expects readers that can tell whether your finger is a real finger and whether it's still alive, looking not just at the pattern but "the 3D image with the peaks and valleys" which flatten out on dead fingers and fake fingerprints.


He'd like to see a 9mm sensor that doesn't have a big chrome border around it so you can just press your whole fingertip on it once instead of multiple times like the iPhone, but OEMs may pick smaller, cheaper sensors. "We're going to get the cost down to where it can go mainstream," he says with cautious optimism. "We have an OEM signalling – not committing but signalling – that they may put it across their entire consumer range. Although I hope I don't get burned again because I talked about this for Windows 8…"


With or without fingerprint readers, the new password-replacing credentials are coming – not just from Microsoft but from fellow FIDO Alliance members like Google. Google's similar secure key proposal has already been ratified and Hallum says Microsoft is committed to getting its own system ratified by FIDO too.


Flexibility first


Hallum believes the flexibility of the Windows 10 credential is an advantage. "The differentiator for us is you will be able to use existing devices to authenticate for this; you can use your PC or your phone.


"That means your phone – including Windows Phone, Android, an iPhone with its fingerprint reader and maybe one day a BlackBerry – could store your credentials and pair to your PC via Bluetooth to sign you in. That means two-factor authentication will become ubiquitous, without people needing multiple fobs and physical tokens."


He's confident the credentials will be adopted by a range of services, and says Microsoft is evangelising it to both business and consumer services. "This is going to succeed. You're going to see a lot of consumer services like Netflix. They see how important this is for banking, for content, for consumer services." Business apps that you log into with a Windows username and password today will just work with them too. "Every app should be able to take advantage of it, unless you've done something that is not best practice."


Getting past Pass the Hash


Signing in with one of these next-generation credentials "unlocks the Windows container" because Windows 10 is made up of multiple containers. Windows is in one container, but the security token from Active Directory that lets you access resources on your company network and the LSA authentication service that issues it are in another, running on top of Hyper-V virtualisation in what Microsoft calls a Virtual Secure Mode.


Those tokens are what many attackers have been targeting when they break into companies using a technique known as Pass the Hash. "Once attackers have that token they have your identity, it's as good as having your username and password. They gain admin privileges and run a tool to extract the token and take it, and then they can move around the network and access all these servers without ever being asked for a password," explains Hallum.


"We've taken these tokens which were being protected by Windows in a software store which was susceptible to malware or to applications with a high level of privilege and we're putting them inside a container. Even the kernel doesn't have access to take information out of that container if it's compromised."


That container is the VSM. "The VSM is basically a mini OS. Think of it as a Windows core OS – it's a very small OS that will require about 1GB of memory and has just enough capability to run the LSA service that's used for all our authentication brokering."


It won't affect the performance of your PC, he says, but you will need to have Windows 10 on your PC, a CPU that supports hardware virtualisation and the next version of Windows Server on your Active Directory domain controller.


That means even if you are infected by a rootkit or bootkit that takes over the Windows kernel, your tokens would still be safe.


No cast iron guarantee


However, Hallum warns: "We can't promise Pass the Hash is not possible, there could be bugs in our implementation. But it is an architectural solution designed to prevent [this threat] rather than what we've done in the past which was just a defence that made it a little bit harder. It is one of the strongest mitigations we can do.


"We think this will be very decisive in dealing with that threat. I don't want to say we've solved identity but this is so substantial compared to anything we've done in the past. Virtual smartcards in 8 were incremental; this is virtual smart cards for the entire world."


VSMs can be used for other security features – if you run Windows 10 in a virtual machine, it can use a VSM as a virtual TPM. And if PC makers adopt the Windows 10 Enterprise Lockdown idea, the Windows code integrity service will live in another container, so even a compromised kernel can't turn off checks on the code that's allowed to run. And that code will be limited to Windows and applications that have been signed by Microsoft, apps from the Windows Store and software signed by either software vendors vetted by Microsoft or your own business (using certificates from a Certificate Authority Microsoft will run itself).


Those signed applications can be distributed through the Windows Store and there will be a way for businesses to sign apps they trust but didn't write (so you can sign software if the vendor has gone out of business and you can't be forced to upgrade to a new, signed version if you're happy with the version you have).


Trusted app ecosystem


Hallum calls it an attempt to "create a trusted app ecosystem" for PCs that protects them the way the App Store protects iOS devices, but is more suited to the way enterprises work.


Enterprise lockdown will only work with Windows Enterprise and with PCs preconfigured to support it by locking their UEFI boot systems "because if you can configure Windows for signed only [software], malware can configure it to not require signing." Microsoft is recommending that OEMs make this an option for all their business PCs and suggesting the premium they charge for it should be low, but it remains to be seen how well they'll support it.


Hallum certainly believes it can be extremely effective: "Assuming the person who owns signing applications in your business is trustworthy, we think we can all but eliminate malware." He also suggests it would have stopped the kind of PoS breaches that have happened in the last year.


File containers


Encrypted files on Windows 10 will also be stored in containers, but unlike mobile devices where all business documents are in one container – and are only protected if you choose to save them there – each file will be in its own container.


"Our container is different," Hallum explains. "It's a container at the file level so every single file – every document, any content item, the files for your app – they will be protected with an encryption container and then Windows becomes a broker of access control between them."


Windows 10 will also work out which files to encrypt, based on where the file comes from or what app you create or open it with, using policies you set.


"You'll be able to set locations on the network and say 'we consider these to be corporate – this is the corporate mail server, these are the corporate file servers on these IP address ranges, using these DNS addresses.


"When content comes from those locations, the system knows where it comes from and we can say 'let's go ahead and encrypt that at the file level'. In real time, as you're bringing content to your device, Windows knows what's corporate and what's personal, but it happens transparently behind the scenes and you don't have to think about it."


You can set policy to mark apps as business apps and all files created with them will be encrypted. You can use policy to mark some apps as personal and they won't be able to open encrypted business files. "We want to make sure apps that shouldn't have access to corporate networks can be gated," says Hallum. "These are the apps on the device I trust and will allow to connect to my VPN."


And for apps like Office that are used for both, there will be an option in the Save dialog to say whether a file saved on your PC is a business document that should be encrypted or a personal document that shouldn't.


Containers not constrainers


He suggests that's more convenient than the style of containers used in Samsung Knox or Good Technologies, which he calls 'constrainers'. "I'm constrained – I have to move to a secure place to access content. I need to use a specific application, maybe not the one I use on my PC, to access email. A container that contains the apps that contain the data is very effective at securing things but I have to change my behaviour, I have to stop using apps like Office.


"When we move the technology down the stack into the platform itself rather than building a protective solution that sits on top of the platform, as the others are, we can do a lot of the heavy lifting behind the scenes, where we don't have to interfere with the user experience to the same degree."


And yes, encrypted files will be usable on other devices. Hallum says OS X, iOS and Android will all be supported, either through Office or using readers. You'll be able to manage this with any MDM, not just Microsoft management tools like System Center.


There are other Windows 10 security features still in development and Hallum thinks security will make Windows 10 a compelling upgrade. "Every previous release of Windows has delivered defence in depth, but we've just made it harder. If you didn't deploy a release, you always had the excuse of plausible deniability; you could say 'it just made it harder, it wasn't the solution'. Once there's an OS available that you can deploy that will eliminate most of these attacks, there are no more excuses. You're making a choice to be vulnerable."

















http://feedproxy.google.com/~r/techradar/software-news/~3/rSaRlpqb_mU/story01.htm

Saturday 29 November 2014

Week in Gaming: Super Smash Bros. comes home to the Wii U, Metal Gear ventures back online

Week in Gaming: Super Smash Bros. comes home to the Wii U, Metal Gear ventures back online

If a perfect storm of Black Friday, Nintendo Day, and the launch of a new Star Wars trailer can't break the internet, Kim Kardashian doesn't have a hope in hell.


And I'm pretty glad they didn't because I've been spending every spare minute brawling my heart out on Super Smash Bros. for Wii U, and I can tell you that it's every bit as brilliant as you'd expect - not to mention that it looks great on the big screen in HD.


I'm grateful to have a portable option, truly, but this is a game that feels at home on the TV, best enjoyed in a local multiplayer match of furious button mashing and angry swear words.



But the launch of Nintnendo's Amiibo range was also a significant moment for the company, with the Mario creator betting big on collectable figurines. However, I'm sure you're aware that these aren't merely toys; each figure can store data and interact with the Wii U or 3DS via NFC, much like the ones of Skylanders and Disney Infinity. Think of them as memory cards with a bit more attitude.



Super Smash Bros

There has been an awakening


Speaking of Star Wars, Microsoft just fulfilled a fantasy I didn't even know I had by bringing the worlds of Minecraft and Star Wars together in perfect harmony.


This week it launched some Xbox exclusive DLC for its recently-acquired sandbox title, which includes a bunch of character skins taken from the original movie trilogy. Microsoft also plans more Star Wars themed DLC for the future, but for now, Xbox One and Xbox 360 users can go and dress up with 55 different costumes, including Boba Fett. Laugh it up, fuzzblock.


Waiting for DayZ


It wasn't the best week to be a DayZ fan though, as developer Bohemia Interactive announced that the game won't transition into beta until Q4 2015, and that the final game won't arrive until "the first half of 2016".


There should be a console prototype up and ready by Q3 next year, with an official release some time after. When that will be, we have no idea. But at this rate, we'll be staving off real zombies before we get anywhere near a final release version of DayZ.


SNNNAAAAAAAAAKE


The Metal Gear franchise isn't one that seems to lend itself to any sort of multiplayer, but I never thought 50 Cent: Blood on the Sand would be any good, and boy was my face red.


Metal Gear Online, which came bundled with Metal Gear Solid 4: Guns of the Patriots on the PS3, was a surprisingly decent spin-off until its servers were terminated in 2012. So we were pleased when Hideo Kojima promised us a new online component to The Phantom Pain.


And as revealed by Geoff Knight, Kojima will attend next week's Game Awards to premiere the new Metal Gear Online, so we can expect to be much the wiser come Friday.


This is the first year for the Game Awards show, the latest incarnation of the Spike VGA awards, which has played host to some significant first-looks and teasers over the years. We don't expect Metal Gear Online to be the only big game shown off. Naughty Dog's Neil Druckmann has already teased something big for the event, which could be a hint at some new Unchartered 4 footage.


And hey, is a Fallout 4 tease really out of the question? I don't think so.
















http://feedproxy.google.com/~r/techradar/gaming-news/~3/gTy_F-CKJ58/story01.htm

Industry voice: How to deliver the best value from cloud for business

Industry voice: How to deliver the best value from cloud for business

Many businesses are currently thinking about moving business critical functionality to the cloud. But when is the right time to migrate? And how can businesses drive this migration successfully?


For smaller and medium sized businesses there is still a lot of confusion about when they should consider moving to cloud-based back office functionality. Why? It is partly driven by a reluctance from some IT suppliers to lose the opportunity to sell and maintain hardware. But legitimate concerns over issues like security and availability also muddy the waters.


Cloud adoption is being driven by the increased variety of services available, reductions in the cost of upfront capital investment and improvements in internet security. The cloud is no longer only seen as a data storage option with many Software as a Service business applications. These used to be limited to email and general office processes but as the platform matures, these are embracing every office process – from HR to finance.


A typical example would be that of the Accounts Payable function. Historically this was a labour intensive and largely manual process that relied on invoices being received by post, being matched to purchase orders, being processed for approval and ultimately being paid.


The opportunities for lost invoices amongst huge piles of paperwork was significant, leading to bill chasing from suppliers. If anything, matters got worse at the dawn of the digital age. Now invoices were arriving by fax, email and paper. The email invoices might be formatted as PDFs, Word documents, Excel spreadsheets or within the body of the email, with no consistency of format or approach. Managing this experience to the satisfaction of all parties required a lot of manual labour.


Larger organisations could invest in document management and automation systems to automate much of this process but smaller businesses did not have this option. This issue was particularly intense for businesses that receive huge numbers of small invoices. The processing cost per invoice can be anything from £2 to £20.


The evolution of the cloud has transformed this kind of process and democratised access to the tools traditionally accessed only by larger businesses. Invoices can be scanned and uploaded to a remote server for storage – in itself a significant advantage over traditional paper storage.


However the real magic takes place when invoices are automatically matched to purchase orders – removing the need for significant manual intervention and eradicating the manual intervention. Typically more than 90% of all invoices can be matched in this way, leaving accounts staff to deal with the exceptional.


So at what point does it become viable for a business to move to a cloud-based service? At Readsoft we typically find that it is less about the size of business and more about volume of invoices. Any business that receives more than 1000 invoices per year can benefit from this back office automation. Businesses that receive 5000 or more invoices can see significant improvements in cash flow visibility, benefit from early payment discounts and see a significant return on investment.


Furthermore once a business is signed up, all it requires is a networked scanner in order to get up and running. Usability is a key consideration, with the best cloud-based systems being simple to use and requiring little training.


The cloud is not only about email and storage. For businesses that wish to reduce capital costs and function more efficiently, numerous back office functions can be taken into the cloud to drive business efficiency and drive down cost.



  • Simon Shorthose is Managing Director of Readsoft UK. Readsoft is a provider of business automation services for back office processes.
















http://feedproxy.google.com/~r/techradar/internet-news/~3/ZDhS-1rUbhY/story01.htm

Industry voice: How to remove your data from the internet

Industry voice: How to remove your data from the internet

Nearly 90 years after his death, Harry Houdini is still revered for escaping a straitjacket while suspended upside down from a crane, and living to tell about being buried alive and submerged in water. He was the master of removing himself from one seemingly impossible situation after another.


However, if alive today and asked to help businesses remove a digital footprint from the Internet, even he might look at the stunt with a sceptical eye.


Removing data from the Internet has been made a bit easier with a recent court ruling where Google is obliged to remove certain search results as long as an individual requests their information to be omitted from search results. But it doesn't guarantee that content is completely removed; it just makes finding negative content a little bit harder.


The potential certainly exists for employees' online habits to prove problematic for their employers. A recent GFI survey found that one-third (33%) of small business employees use social networks for personal reasons while working.


Using search engines to do background research has become routine in all walks of life. Googling a job applicant is practically the first order of business for hiring managers. Online reputation management, for professional and social reasons, is essential in today's digital world.


Reclaiming your online reputation is time-consuming and a test of patience. Requesting the online publisher remove the content in question is a good first step (though most websites aren't legally obligated to acquiesce). Deleting accounts with social media giants Facebook, LinkedIn and Twitter is another logical move.


High cost of customer loss


One of the top priorities for any business is protecting its reputation. The speed with which information travels on the web can be a big help in achieving this goal – or a giant hindrance. It all depends on the content being disseminated.


A hit to reputation, warranted or otherwise, can leave businesses scrambling to retain customers and recoup lost revenue. According to Accenture, $5.9 trillion consumer dollars are annually up for grabs globally as dissatisfied customers change suppliers. To that end, 28% of customers said comments posted to social media sites factor into their buying decisions.


Preventative measure


Preventing these problems is best achieved by being proactive. Certain email archiving solutions can extract key bits of data from corporate email, which may provide insight into workforce morale.


Of course, there's no substitute for maintaining an "open-door policy." Businesses benefit from owners, executives and managers who routinely communicate with employees. It reinforces the notion that everyone's opinion, effort and commitment to the company is valued. It also stands to reason that employees who feel appreciated are less likely to talk negatively about their employer, or risk publicly embarrassing themselves out of concern for the company's well-being.


At the end of the day, though, businesses should focus on controlling their own content, specifically the volume of it. A popular and affordable method for burying unwanted information is to pump out positive content (and optimise online profiles) that tips search results in your favour.


Even if remotely true, bad press for businesses can be extremely difficult to remove from the Internet. But just as Houdini achieved with his vanishing elephant act, it's possible to make online content disappear – from view, anyway.



  • Sergio Galindo is the general manager of the Infrastructure Business Unit at GFI Software.




http://feedproxy.google.com/~r/techradar/internet-news/~3/JhOA5C9nnOs/story01.htm

Analysis: Television has to embrace our second screen habit

Analysis: Television has to embrace our second screen habit

Second screening is officially a growing trend, with a number of us choosing to split our focus between our television and another device.


And yet, the television industry remains in flux at how to best use this trend to its advantage. In the UK the BBC is not only prominent on Twitter and Facebook, but also increasingly on upcoming social networks like Snapchat and Instagram, but even this traditional TV trailblazer has the limitations of its remit to consider.


Twitter is actively encouraging television talent and shows to engage the audience in new ways, Shazam has evolved from a way to name and buy that tune to an engagement tool, and ideas in this particular growth area range from the brilliant to the batty.


This week saw the Westminster eForum gather to discuss the rising tide of second or dual-screening and ask whether it is a threat or a boon for the television companies. And broadly speaking, as analyst Simon Terrington said, the answer is obviously 'both'.


"Television is still the screen that we would miss the most, but phones [are] increasingly important and tablets and computers are growing as well," he said.


"There are two views when you think of social media, firstly this is where the industry is going and if we don't embrace it we'll be left behind, lose the young and better off people and be left with older less well-off people.


"The other view social media is a different business - it's just communication and people have always talked about TV it's just happening in a different way."


Tweet all about it


As you would expect, other expert speakers including Dan Biddle, who is head of TV partnerships for Twitter UK, and Shazam's Iain Dendle, are very much on the side of the first view, believing that being part of the conversation with the audience is crucial.


"There's a flicking of the eyes between the first screen and the second this has been called meerkatting. When I was at BBC we worried about splitting people's attention and asked 'are we taking them away from the first screen' - but as we've said that is already happening whether it's the ironing or something else.


"It's not split attention, it's double attention. We have data that shows that people who are tweeting are far more engaged with the messages that come out of that TV show."


Biddle went on to give examples of how social is radically changing some aspects of TV, telling an anecdote of Richard Curtis wandering the streets of Shepherd's Bush peering in windows during one of the first broadcasts of Blackadder to see if his new show would be popular - something that could now be cut out by Twitter conversations.


"The fact that [second screening means] we can see audience and know it is there means you can connect with that audience."


Dendle and Shazam aim to add even more engagement by allowing viewers to use their devices, listen to the audio on a show or even an advert and quickly enter a rich interactive environment.


"An advert for Jaguar we did... brought engagement from one percent of the audience of the program it appeared in", he told the room. That's a phenomenal number of people, although it is difficult to judge how many people went on to buy a car.


What was abundantly clear from the talk was that there is no shortage of ideas as to how TV should tap into our 'meerkatting' but that they must be prepared to embrace a new and complicated market in order to enhance our experience and earn more engagement.
















http://feedproxy.google.com/~r/techradar/television-news/~3/LAjyGzr2w6I/story01.htm