There is no one on Earth who wants to spend more time looking for parking. There is no way to enjoy the experience; nothing to be learned from circling city blocks in a desperate but futile search of a free space—in short, there is nothing...
Mobile devices are now a central part of consumers’ overall lives, or it is for 85 percent of them at least, according to a new report. And while keeping in touch with loved ones has helped push the market along, the enhanced communications capabilities mobile...
When it comes to fighting cybersecurity threats, there are many possible philosophies, but one school of thought says that if you can’t beat ‘em, it’s time to consider paying them. Get the Full Story Complete the form to unlock this article and enjoy unlimited free...
Is 2014 the year of the B2B high-tech financial services bubble? If so, it may already have burst. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to...
Executives always want to know where a particular trend—especially a payment type—will be many years in the future. But it takes a steel-willed employee to push back, pointing out that the number of variables are so many that any projection beyond 2-3 years is utterly...
Amsterdam-based Gemalto has moved to improve and expand its data security protection offerings through the acquisition of Maryland-based SafeNet. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe...
One of my colleagues recently shared an anecdote about something she observed while in a hotel lobby in San Francisco. A group of young people had gathered, ready to head out for the evening. They were debating how to get to their destination. After a...
It seems Apple is getting ready to make a shift in the way that families can share content purchased in its app store by making it easier to distinguish sharable from not sharable material. A new tag was discovered by iFun that will apparently work...
In an ideal security world (an oxymoron, admittedly), vendors do not confirm or even acknowledge security holes until they have been fixed. Why encourage the bad guys any more than is necessary? Indeed, the hole that exists after a bug has been discovered and publicized...