Apple’s iOS 7, which has some new security measures intended to deter theft, New York’s finest and other police agencies around the U.S. are making an effort to get people to download it.
The new feature is called Activation Lock (read the official information from Apple here) and basically what it does is force anyone who has the phone — including anyone who has stolen it — to enter an Apple ID and password before they can turn off the “Find My Phone” security feature, erase it or reactivate it.
Naturally, this feature is helpful to police who are often called upon to locate stolen phones, so they’re pushing iPhone owners to download the new OS.
Earlier in the week, New York Attorney General Eric Schneiderman and San Francisco’s District Attorney George Gascón issued a joint statement praising Apple and urging people to download iOS 7.
The NYPD were handing out fliers as well.
Pandora is fighting to lower artist royalties on two fronts: Congress and the courts. According to a decision just released by the Judge Denise Cote of the US District Court in Manhattan, publishers and their songwriters are not permitted to strike separate, market-driven deals with Pandora if they are also a member of a collecting society.
The private copyright deals, recently created by some of the largest publishers in the world, forced Pandora into higher publishing rates and were largely driven by the free market (ie, open negotiations between the two parties). The decision nullifies all of those deals struck by Sony, EMI, Music Publishing, Universal Publishing Group and BMG Music. This summary judgment also prevents any future direct deals from happening, at least for the foreseeable future.
According to Judge Cote, those deals broke the law, and specifically a federal agreement related to blanket performance licenses. The reasons for this relate to a consent decree forged by the federal government and US Department of Justice and societies like ASCAP, one that dates back to 1941.
The result = less money for songwriters, and a lot more money for Pandora. All of which raises more ugly questions about Pandora. It has been said that Pandora is a company that has created an overnight class of hyper-wealthy executives and investors, but left content creators effectively penniless.
A new technology, used by hackers, can allow them to track and pinpoint your exact geographic location of the posted pictures.
Hackers can track down your location on the web and find your home address, the school you or your children attend, your place of work or any place you visit. With a click of the mouse, online predators can can access multiple online media sites and search to find exactly where your pictures were taken.Smartphones can leave an invisible locator trail of all the information you access on the web.
Potential hackers access websites such as ………. and repost pictures that people upload online without their knowledge. When doing this they can translate the photos address to the picture.
You can disable this geo-tag service function on your smartphone by going to the “Settings” section of your phone and turning off the location services for your pictures.
So, before you post your pictures online, make sure you take all precautions to assure your privacy is not violated
Venture capitalists have invested $955 million in the healthcare IT industry. The federal government of the United States is planning to invest nearly $29 billion as incentives to motivate hospitals and clinics to digitize their healthcare records.
Along with these, there are several other food-monitoring, menu-tracking and calorie-counting applications to alarm the foodies and help the diet-conscious people.
The healthcare industry has been waiting for a much-needed boost. The wait is said to be worth it. Although the implementation of mobile applications and medical translation tools is in a preliminary stage, the technological advancements can upgrade patient treatment and save a considerable amount in health care costs.
Apple reports that the latest prerelease version of the operating software iOS 7 for iPhones and iPads that will be released later this year contains a folder called “BiometricKit UI”.
The folder contains code that says the phone will display a photo of a person holding an iPhone while touching their thumb on the home button and then will display a fingerprint image that changes colour during the setup process. Apple bought a fingerprint sensor company Authentec last year for $365 million. Authentec makes technology that cannot only identified fingerprints through scanning but also identifies the different fingers, so that each finger can be assigned a different task.
It’s certain whether Apple would use fingerprint scanning as a way letting people log into their phone, rather than type a PIN, or whether it would be linked to an eCommerce transaction system.
Apple so far has not installed Near Field Communication into its phones, which is the wireless communication system preferred by other smartphone makers including Samsung that lets people pay for goods by touching their phone against a scanner.
There also are rumours the new iPhone range will include a budget model that has been labelled the iPhone 5C.
New vehicles equipped with modern technology offer more conveniences and luxury to drivers while simultaneously making cars more vulnerable to hackers.
Vehicles coming off the production line over the last decade have evolved into powerful modes of transportation, in addition to technology that has produced drivable computers. These new digital cars, trucks and SUVs give the driver touch screens, digital radio and car controls such as temperature, music and more. However, just as PCs and other digital devices are vulnerable to hackers, so are the vehicles on the road.
US security experts conducted an investigation to determine just how serious the issue of car security may be revealing through experiments the shocking truth of just how much damage can be done in the wrong hands. Experts managed to take control of a vehicle, while someone else was behind the wheel through the simple use of a laptop computer.
Using cables, the researchers were able to hack into the cars on-board diagnostics port and electronic control units. They were able to take complete control of the two models used in the experiments including steering, using the breaks and even invading the monitor displays all from the backseat using a laptop computer. Two popular cars the 2012 Ford Escape and Toyota Prius were used to demonstrate this dangerous security problem.
In a another experiment, security experts managed to convert the touch screen instrument panel into a clock. Counting down from 60 seconds the team forced the vehicle to begin honking its horn in the last few seconds on the countdown and completely disable the car by shutting off the engine and locking doors as the clock reached zero.
Teams of researchers found that everything in these new models is vulnerable to hackers from the lights, instrument panels, steering and brakes to the engine itself. Its conclusion is that newer model vehicles are too fragile and that security should be a top issue for car makers light of this new information.
The only positive to this situation currently, according to the security team, is that cars are not yet connected to the internet where hackers could truly do some serious and dangerous damage. For the moment this means that hackers must have physical access to the vehicle in order to implement an attack.
More cars are becoming internet accessible. Researchers are urging manufacturers to develop hacker proof devices for these moving computers. The potential damage hackers could do from the internet poses a real threat to driver’s security and can even threatens loss of life.
Two computer hackers who have successfully managed to hack into and manipulate a pair of widely-owned automobiles will present their findings at the Def Con hacking conference in Las Vegas this week, various media outlets are reporting.
Google will start selling and renting digital textbooks through their Play store in August.In another announcement, Google’s Chromecast, a TV dongle that lets you stream online videos straight from your phone, tablet or laptop to your TV. Chromecast is based on a stripped-down version of Chrome OS, and interoperable with a multitude of devices.during the announcement Wednesday.
The Chromecast dongle is plugged into the HDMI port of a TV, and can then be auto-discovered by apps like the YouTube app on a mobile device. Users can then send videos straight to their TV, change the volume and compile collaborative playlists to queue up videos with the help of their mobile devices that are then displayed on the TV. This is basically the same functionality that’s been available on for Google TV devices but without the whole Google TV UI.
A mobile security company named Lookout, have proven that Google Glass can be hacked the development of a malicious QR code.
Up till now QR codes have needed specialised software to scan them and turn the code into an executable command (usually a redirect to a webpage) but Glass automatically processes any QR codes it detects when taking a picture. Lookout took advantage of this and created a QR code that – when snapped – directs the device to connect to a certain wi-fi network. Given this entry point the researchers were able to intercept data passing through Glass, and even stream live images to a remote display.
“We could become the middleman, and if we needed to strip out the encryption on the connection,” Mark Rogers, principal security analyst at Lookout, told The Guardian. “Then we could see the pictures or video that it’s uploading. We could also direct it to a site on the web which exploits a known vulnerability in Android 4.0.4 which hacked Glass at it browsed the page.”
This particular exploit is no longer a ‘threat’ to the rare-breed of Glass owners (Rogers disclosed the information to Google who fixed the problem with a software update back in May) but it’s certain that other, similar, vulnerabilities exist – and Google won’t be able to find them all before release.
AT&T Inc customers will be able to upgrade their phones once a year instead of waiting two years. AT&T is defending itself against challenges from T-Mobile US . AT&T’s latest offering, does not require upfront device fees, comes as the No. 2 U.S. mobile provider strives to regain the market share it has been losing to market leader Verizon Wireless, and to fight back against tougher competition from smaller rivals like fourth-ranked T-Mobile US. AT&T’s offer, soon to be available on July 26, appeared to be a direct response to T-Mobile’s announcement last week that its customers can now upgrade smartphones as often as twice a year. AT&T will charge customers $15 to $50 per month, depending on the device, on top of monthly service fees under the new offering, which does not require a long-term service contract. By excluding upfront device fees in its plan, AT&T is hoping to compete with T-Mobile US, which still requires an upfront payment. T-Mobile US Chief Marketing Officer Mark Sievert says the monthly phone installments is a “trick” to get more money out of customers because it is not changing its monthly service fees. “If you’re going to charge separately for the phone like they’re doing then you need to reduce the price of the service. Otherwise you’re paying twice for the same phone.” According to data reported a Wall Street Journal article, Americans are upgrading their devices less often as innovation slows and current smartphones are more than adequate for their needs.
Sources indicated that the watch will be available in a number of different colors (red, yellow, black, grey, white and blue), and that the watch will be made out of Oxynitride Aluminum. Oxynitride is 80% transparent, however, it is four times harder than glass. The Surface watch will run an adapted version of Windows 8, and will have its own built-in radios so it can be used independently from a smartphone. Both Apple and Microsoft’s smart watches are rumored to be coming late next year.
The Information Technology and Innovation Foundation (ITIF) has established the Center for Data Innovation to better educate policymakers around the world about the economic and social benefits. The center will focus its research and education efforts on developing public policies that will increase the potential benefits of data.
Data literate’ policymakers at the national, state and local levels, in order to make smart decisions about how information is collected, managed, analyzed and shared. The center will seeks make sense of data for those working in government and for those working in data industries.
The center’s first projects will be “Data Innovation Across America,” a component of the Millennial Trains Project. The effort, conducted by ITIF research analyst Travis Korte, seeks to investigate how data is changing communities and industries across the nation and will assist lawmakers in understanding how this transformation impacts policymaking and governance.
In addition, the center will take lead in the organization of Data Innovation Day, which will be held on January 24, 2014. ITIF launched the event in 2013 and the inaugural celebration brought together over 60 organizations from around the world to raise awareness about the benefits and opportunities that come from the increased use of information.
The center will produce a free weekly newsletter to provide leaders in business, government, and the non-profit sector with access to the latest information on big data, open data, data analytics, and data visualization.
Back in 2008, Nintendo announced an interesting peripheral called the Wii Vitality Sensor. This device, which fit over the user’s fingertip and measured their pulse and level of relaxation, was never released to stores. Nintendo president Satoru Iwata said “We pushed forward its development on the academic assumption that by observing the wave patterns of the human pulse, we could quantify how tense or relaxed a person is, or to be more specific, how much the sympathetic and parasympathetic nerves work as functions of the autonomic nerve,” Iwata said in the Q&A. “However, after a large-scale test of a prototype inside the company, we found out that for some people the sensor did not work as expected. We wondered if we should commercialize a product which works as expected for 90 people out of 100, but not so for the other 10 people.” Moreover, Iwata said that the Vitality Sensor was an “interesting” device.
Nintendo performed experiments with the sensor in conjunction with video games but has not provided any specifics. When the device was first announced, Nintendo said that it could be used to measure how scared a player is in a horror game. Alternately, it could be used to help a gamer learn to relax in order to improve their life. However, the Sensor’s narrow use doesn’t seem to be a reason that Nintendo axed it. Iwata suggests that if they could make the device more reliable, they’d release it.
New York City will be getting its own domain name. This is said to be a big hit with local businesses, travel sites and possibly cybersquatters looking to make some fast cash.
Approved by Internet address regulator ICANN, website owners in the East Coast metropolis will be able to apply for a .nyc address from later this year, although fees has yet to be announced.
A new app has been designed for Google Glass that promises hands-free cooking and works by voice commands and swipes. KitchMe, developed by Coupons.com, for example, is a free app that appears in the Glass timeline and allows users to search for a new recipe either by naming the dish out loud by name or by ingredients. The app, launched this week, will also search for recipes based on what’s already in the fridge, making it a handy tool for using up leftovers, wilting vegetables and foods nearing their expiration date. Users can swipe through recipe cards and ingredient lists. In addition, can also ask Glass to read the directions out loud for a hands-free cooking experience.
Coupons.com CEO Steven Boal says “Wearable technology is a huge opportunity and where better to focus than in the kitchen where so much of what we do today can be augmented by technology.” Developers are also working on new features like the ability to snap photos of meals and share them with friends, and enhanced voice recognition features for the next generation of KitchMe.
Bloomberg reported Tuesday that Apple and Time Warner Cable are about to close a deal that would bring new channels to the computer maker’s set-top box, Apple TV, for subscribers of the cable television service. A deal would bring the set-top box a significant influx of channels, and its first flood of live ones. Apple has been expanding its offerings on the device, which connects Web videos and other media to the traditional television but lacks the the broad array of channels that its chief competitor Roku offers. Roku already has Time Warner Cable content streaming 300 channels through it where you can view TV through your iPhone iPad or computer.
A new research in South Korea found excessive use of digital devices such as smartphones and iPads can contribute to a new form of a disorder called digital dementia.
According to the Medical Daily, a US-based medical news online publisher, digital dementia is characterised as the deterioration of brain function as a result of the overuse of digital technology such as computers, smartphones and the internet.
The research found that youngsters who relied on technology suffered deterioration in cognitive abilities, most commonly seen in patients who had suffered a head injury or psychiatric illness. Spending too much time with digital gadgets did not help one’s full development.
The study also revealed that teenagers, when teens relied on digital technology, they were no longer able to remember everyday details, even simple things such as their phone numbers.
“Overuse of smartphones and game devices hampers the balanced development of the brain,” Byun Gi-won, a doctor at the Balance Brain Centre in Seoul, said. “Heavy users are likely to develop the left side of their brains, leaving the right side untapped or underdeveloped.” It also cited researchers who said the right side of the brain was linked with concentration and, when it was underdeveloped, could affect attention and memory span. “In 15 per cent of cases, this can lead to the early onset of dementia. In addition to messing with memory, digital overuse is also connected with emotional underdevelopment, with children more at risk than adults as their brains are still growing,” it reported.
The findings come after a US study published earlier this year found young people were increasingly suffering memory problems, with 14 per cent of people aged between 18 and 39 complaining that their memory was poor.
Mr Shekhar said parents in Fiji should control how much time a child spends with digital technology and on the internet.
There is concern in the Fiji Islands that the children there are very much getting addicted to these technologies like these electronic games. Adapting to new technology can be very good. However it can also be very hazardous and dangerous if we don’t manage it well. As doctors have said, it will have a negative effect on the cognitive behaviour.
The Ministry of Health’s national adviser on non-communicable diseases, Dr Isimeli Tukana, said digital technology hampered the physical activity of people. He said they found an increasing alarming trend of children sitting idle with their digital gadgets. Dr Tukana said of Fiji says “It is an interesting study because Korea is very well ahead with the digitalisation era, which has just started in Fiji. So it will be very good to keep a close watch on that study. As in any other development, overuse of technology also has its disadvantages so we should be looking closely at that study in Korea to help us make some decisions on our front,” .”Here in Fiji, it (overuse of digital device) has cut down their physical activity, they are not as playful as our generation, they are more digitalised.”
On Tuesday, the National Science Foundation showcased a smartphone app that allows 911 operators critical insights into what’s going on at the scene of an emergency call. This app can relay crucial biometric data to dispatchers, enabling them to gather vital signs and other information that helps them assist victims and assist first responders.
The software, which was developed by researchers at the University of North Texas, led by Professor of Computer Science and Engineering Ram Dantu, offers users a host of features that could be life-saving in an emergency.
These include text-to-speech technology for clear communication; remote control of smartphone cameras to help 911 operators view emergency scenes; and monitors that relay breathing, blood-pressure and other vital signs to emergency responders. In addition, the app even includes a sensor that helps guide someone responding to an emergency through the proper steps to perform CPR.
The software is still in its pilot phase and will be demonstrating it next week at the 2013 National Emergency Number Association conference in Charlotte, N.C.
The app offers advantages over traditional 911 calls.
Its text-based communication capabilities, for instance, are -suited for deaf or hearing impaired users. Crucial in contacting officials during a scenario – a hostage or domestic abuse situation – where speaking aloud could be dangerous. They might also be critical in a mass-casualty emergency. The app’s biometric tools make full use of the capabilities of smartphones. A first-responder can place the phone on chest of victim, relaying the number of breaths per minute to the operator. It also enables monitoring of blood pressure and heart rate. If someone has irregular heartbeats, the operator is able to clearly see them on his end.
The app was devised on the Android platform, the next phase will be to develop it for the iPhone platform. Next phase an app store.
Canada’s metadata surveillance program has also raised some questions about how that intelligence is exchanged with CSIS.
Newly obtained correspondence shows that retired Supreme Court judge Charles Gonthier worried that mass-collection surveillance methods could blur lines between domestic- and foreign-intelligence gathering in Canada, by muddying the mandates of the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment Canada (CSEC or CSE). It has been almost ten years since the CSEC, an electronic eavesdropping agency, has been explicitly authorized to collect metadata – phone logs, Internet protocol addresses and similar information – in hopes these data trails will map out groups of terrorists.
The following document, obtained by The Globe through Access to Information laws, shows how Defence Minister Peter MacKay authorized a “Top Secret” program to mine global “metadata” in 2011. This disclosure includes a PowerPoint briefing that was given to the Minister prior to his signing off on the metadata – and other – phone calls.
NSA Director General Keith Alexander testified before the House Committee on Intelligence and said that the NSA’s surveillance programs have provided “critical leads to help prevent over 50 potential terrorist events.” Metadata can indicate when a call, email, or online chat began and how long the communication lasted. Section 215 of the Patriot Act provides the legal authority to obtain “business records” from phone companies. Metadata gives intelligence analysts a retrospective view of a sequence of events. Once a terrorist suspect has been identified or once an attack has taken place, intelligence analysts can use powerful software to sift through metadata to determine which numbers, IP addresses, or individuals are associated with the suspect. Phone numbers and IP addresses sometimes serve as a proxy for the general location of where the planning has taken place. Just by knowing how many individuals are in a chat room, how many individuals have contacted a particular phone user, or how many individuals are on an email chain could serve as an indicator of how many terrorists are involved in a plot. Furthermore, knowing when a suspect communicates can help identify his patterns of behavior. In addition, metadata can help establish whether a suspect communicates sporadically or on a set pattern (e.g., making a call every Thursday at 2:30 p.m.). Any deviation from that pattern could indicate that the plan changed at a certain point; any phone number or email address used consistently and then not at all could indicate that a suspect has stopped communicating with an associate. Additionally, a rapid increase in communication could indicate that an attack is about to happen.
Google says that they have a constitutional right to speak about the information given to the government, despite the gag orders that accompany the requests. Google is seeking permission with this petition to publish details about FISA requests, including the number of requests and how many account are affected. Google’s users are concerned about the allegations and Google is responding.
General David H. Petraeus biographer and mistress used anonymous e-mail accounts and sending messages using hotel WiFi networks. But the metadata — in this case the Internet protocol addresses pointing to network locations — gave the Charlotte woman away.
The IP addresses of the networks Paula Broadwell logged into this past fall to send threatening messages to a woman she perceived as a rival for the affection of Gen. David H. Petraeus traced back to the hotels. There, records corresponding to the dates the e-mails were sent revealed one common guest: Broadwell. Paula Broadwell, is the author of the David Petraeus biography.
New technology is in the works and has the potential to prevent lost luggage dramas. Airbus’ prototype, Bag2Go, is smart luggage that uses GPS and cellphone technology to keep track of luggage through the travel process.
Airbus’ Bag2Go luggage is equipped with numerous sensors that can be used to track your luggage as you travel.
Specifically, the luggage contains a GPS tracking device, a 2G mobile chip and an RFID chip. These connectivity elements could be used in conjunction with an iPhone app (it is assumed that Android would be supported as well) and handling systems in an airport to keep track of your checked baggage at all times.
The case is able to alert the owner when it has been opened, either by TSA security workers or perhaps the prying eyes of someone else. The luggage even comes with a scale built into the handle to allow users to weigh it before getting to the airport. Airbus reportedly worked with German luggage maker Rimowa and T-Mobile to create the prototype.
Well we’ve all heard so much talk about phone metadata. Theres also photo metadata. Hidden inside every digital photo is an Exchangeable Image File Format (EXIF) metadata text file containing information that can help legal professionals learn many different things about the image, such as who took, when and where it was taken, and with what type of equipment.
EXIF data can be used to glean insight from photos provided by clients as well as to identify and manage images taken by law office attorneys and staff. Yet many lawyers don’t fully understand how to effectively use EXIF metadata, or even know that such files exist.
EXIF metadata can include valuable information, such as a shot’s technical specifications, the type of camera used, the camera’s serial number and the date and time when the image was taken. Many newer cameras also come with GPS systems that automatically record exact location coordinates and altitude into the EXIF file.
Standard forensic tools, such as Forensic Toolkit from AccessData and EnCase from Guidance Software, can be used to access and examine EXIF metadata. Other programs that allow direct EXIF file viewing include photo-editing programs, such as Adobe Photoshop Lightroom, and viewer applications like Exif Viewer (Windows) and iExifer (Mac).
What can an attorney learn from EXIF metadata ? Actually a great deal. An attorney defending or prosecuting a child pornography suspect can, for example, can look at evidence photos’ EXIF files to see if they contain any “smoking gun” information, like GPS coordinates that match a specific location, such as the defendant’s home or the school he works at. The photo’s metadata can be checked for the camera brand and model, camera serial number, lens type, “artist” tag and various other fields to see if they match known facts about the photo’s creator. EXIF data can also help settle property disputes when theres a disagreement as to when or where a photo was taken.
EXIF metadata can be altered by anyone with the knowledge and motivation to do so. This fact must be taken into consideration before an attorney plans to submit metadata as courtroom evidence. The possibility of EXIF metadata alteration doesn’t necessarily preclude its use as evidence, but an attorney may need to prove a chain of custody and show that the files never fell into the hands of anyone who could benefit by changing any of the information.
Too much technological exposure in a school aged child can result in boredom in the classroom, inattentiveness, and possible behavioral problems.
The concern with technology and teens is that teens can become over-stimulated. Used to multi-tasking with checking their various social media feeds, while listening to their iPod, playing Angry Birds, and doing homework, teens brain’s become too busy too fast resulting in a feeling of anxiousness, aggression, and boredom. In addition, teens fail to learn necessary social skills when over-using social media. Experts recommend limiting teens exposure to technology as well as time spent on various devices. Teach children old fashioned values, such as hanging out with friends instead of tweeting them.
The Obama administration moved late Thursday to declassify information on the Federal Bureau Investigation and National Security Agency seizures of American phone records. Director of National Intelligence James Clapper, denounced the leaks of highly classified documents that revealed the programs and warned that America’s security will suffer.
Read More
Apple, will open a $5 billion dollar new facility and is predicted to create over new full-time jobs, and giving the local town an additional $13 million dollars in tax revenue annually.
Apple is currently working on an environmental impact report for the four-story, donut-shaped headquarters which will be called Apple Campus 2. The company is also rumored to spend around $5 billion on the new project. When Campus 2 opens, Apple will then have 24,000 full-time employees in Cupertino, and around 41,100 in the Santa Clara County.
Sixty three percent of Delegates at the 21st International Payments Summit believe real-time payment services are the key ingredient for future growth. It appears that Bitcoins has been rising in prominence and growing acceptance amongst merchants. Despite acknowledging the role that digital payments play in generating an immediate transfer of funds, 24% of delegates at the summit believe existing “legacy systems” mean that changes to payment structures can be difficult or risky.
http://news.sky.com/story/1096896/digital-currencies-get-smartphone-boost
iPatientCare mEHR (mobile EHR) is meant to provide highly mobile healthcare providers with anywhere, anytime access to patient’s clinical records at the point-of-care. This system allows physicians to view a complete clinical summary of patients, write a quick script, and capture charges, while making hospital rounds or visiting hospices.
The digital dashboard is available to the physicians at their finger tips and allows them to stay connected with the office from wherever they are. All the refill requests, lab results, appointment list, messages are delivered to them in a secured manner and they can perform the necessary actions using a simple touch of a button. What’s more? They get alerted for all the new documents and tasks, even when they are not connected to the system.
Wearable Charging StationCredit: Textiles Nanotechnology Laboratory/Cornell UniversityAbbey Liebman, a design student at Cornell University in Ithaca, N.Y., created a dress made with conductive cotton that can charge an iPhone via solar panel
Textiles Nanotechnology Laboratory/Cornell UniversityA wearable anti-malaria mosquito net capable of storing and releasing insecticides. The prototype was created at the Textile Nanotechnology Laboratory at Cornell University in Ithaca, N.Y.
Textiles Nanotechnology Laboratory/Cornell UniversityThese two dresses, designed by Olivia Ong, were colored with nanoparticles and are capable of killing 99.9999% of bacteria. The dresses were created at the Textile Nanotechnology Lab at Cornell University in Ithaca, N.Y.
Restaurant technology is booming as savvy consumers continue to expect more from their favorite eateries, and restaurateurs strive to plug into new advancements. Communication is key, whether between customers and staff, or behind the scenes, and many of the new restaurant technologies address that priority. In an industry that has been slow to embrace modern technology, many establishments are stepping up to make the most of cutting-edge restaurant technology.Restaurant technology that improves customer service is one of the biggest trends. Finding ways to incorporate mobile app technology into the restaurant experience is a hot topic. Netpage Unlimited( NPU) is an on-location, organization-wide, web-based messaging solution. More than a wireless paging system, this solution enables easy communication with customers and staff through texting, pagers, and emails. This system enables restaurants to manage a wait list, delegate staff responsibilities, provide real-time data to management, and more, all from a central command station.