Spotify Captures Half Of British Teens Streaming Hours

first_img Email Spotify Captures Half Of British Teens’ Streaming Hours U.K. Teens Prefer Streaming Over Radio spotify-captures-half-british-teens-streaming-hours Research reveals young U.K. music listeners rely on playlists, Spotify and YouTube more than radioPhilip MerrillGRAMMYs Sep 6, 2017 – 4:50 pm Research firm AudienceNet revealed fascinating findings from a June 2017 survey of music consumption in the U.K., showing radio still has a place in young people’s lives but streaming playlists, Spotify and YouTube have replaced passive listening with an on-demand culture giving listeners the power to navigate.The “Audiomonitor” survey shows the 16–24 age group has diverged from the UK’s national average, signaling a new stage as streaming services become dominant with youth. This divergence towards on-demand listening is strongest among 16–19 year-olds.Albums versus playlists: Brits over 65 spend 41 percent of their time listening to albums, but time spent listening tilts in favor of playlists among 16–24 year-olds. The 16–19 segment spent only 20 percent of their time on albums and 35 percent of their time listening to playlists.Radio: The average British listener spends 43 percent of their time listening to radio and three-quarters of 16–24 year-olds listen to some radio each week. But among 16–19 year-olds radio listening has dropped down to just 10 percent of their time.Streaming: While only 24 percent of UK listeners use streaming, in general, this rate rises to 62 percent among the 16–19 age group.YouTube versus Spotify: YouTube has a 31 percent weekly reach on average, almost double Spotify’s 16 percent. But among the streaming hours of the 16–19 demographic, Spotify dominates with 51 percent of their streaming time while YouTube accounts for 33 percent. AudienceNet estimates that Spotify accounts for a total of 30 percent of 16–19 year-olds’ listening hours.More changes are inevitable as streaming audiences supply real-time data detailing their listening habits to music services, artists, and across social media.Spotify For Artists Promises Closer Connection To Fan BasesRead more Twitter News Facebook last_img read more

Oikya Front gets nod for Chattogram rally

first_imgJatiya Oikya Front rally in Sylhet. Prothom Alo File PhotoThe Jatiya Oikya Front, a newly formed political alliance, has obtained permission to hold its rally in Chattogram.The Front held its first rally in Sylhet on 24 October to mobilise public support in favour of the alliance’s seven-point demand, including holding the 11th parliamentary elections under a non-party administration.Chattogram Metropolitan Police (CMP) gave the permission asking them to restrict their rally on a part of a road along the Bangladesh Nationalist Party (BNP) office in the city.CMP commissioner Md Mahabubur Rahman told Prothom Alo that the permission was given on conditions.The Front leaders were asked to finish the rally within 5:00pm.On 13 October, the BNP together with Kamal Hossain-led Jatiya Oikya Prokriya, JSD and Nagorik Oikya launched the Jatiya Oikya Front to press for their seven-point demand, including holding the next polls under a non-party administration.last_img read more

KMC to conduct food drives during Puja

first_imgKolkata: The Kolkata Municipal Corporation (KMC) will conduct regular food drives during Durga Puja, with a special emphasis on keeping the quality of packaged drinking water and soft drinks in check. “For the last few years, we have been conducting drives during Puja to ensure that quality of food is not compromised with. But there are chances of tampering with packaged water and soft drinks. So, I have instructed my team of food inspectors to give special focus on the same,” Member, Mayor-in-Council (Health) Atin Ghosh said. Also Read – Rain batters Kolkata, cripples normal lifeHe added that food safety officers have been directed to take strong action against the businessmen who will be found selling inferior quality drinks. The drive that will start in a day or two, will continue on a regular basis till Kali Puja. Ghosh will himself lead drives at Borough 6 on October 9, in Kankurgachi area on October 10, in Park Cicus and Gariahat area on October 11. “There will be random drives in food stalls adjacent to puja pandals in South Kolkata on October 13 and in North Kolkata on October 14,” he added. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedGhosh further assured city residents that no trace of formalin has been found in fish brought from Andhra Pradesh. “This year, we have collected as many as 88 fish samples from 22 markets in the city. After the Bihar government imposed ban on fish from Andhra Pradesh, we collected six samples from Patipukur Market. All these samples have been found to be safe,” Ghosh said, adding that further drives will continue in this regard. KMC has already examined the various samples of fish, meat, meat products and other things that have been collected during food drives in the last few months.last_img read more

Cellphone Hacking Could it Happen to You

first_img Register Now » If the cellphone hacking scandal that caused the downfall of Britain’s best-selling tabloid, News of the World, made you wonder about your own vulnerability, consider these statistics.Globally, telecommunications-fraud losses, which includes cases of mobile-phone fraud, were estimated to hit $72 billion to $80 billion in 2009, up 34 percent from 2005, according to a 2009 survey of security experts from the Roseland, N.J.,-based Communications Fraud Control Association. Hacking alone accounted for $3.2 billion in losses for the telecom industry, says CFCA.What’s more, the problems have likely only expanded as smartphone use has escalated. In the U.S., smartphone ownership grew 60 percent from 2009 to 2010. And then from 2010 to 2011, the increase was 42 percent, according to Javelin Strategy & Research’s July Second Annual Antivirus, Browser, and Mobile Security Report.The uptick is significant because analysts had long suggested that cellphone insecurity wasn’t a huge threat because each phone and service provider offered different operating systems — making the creation of malware for mobile phones tricky. But as the devises proliferate, the category will become increasingly fruitful for fraudsters, according to Boaz Bechar, a vice president of business development at the Tel Aviv-based security firm, Humbug Telecom Labs, which works with international service providers.To protect yours and your company’s data here are three mobile phone security tips to consider:Lock it up. At the very least, make sure your phone and keypad are password protected, says Bechar. On some phones, you might even enable a so-called lock-out in which the phone locks itself after a set stretch of inactivity. “That way, if someone steals your phone, they can’t access your information,” he says. Then, make sure that you use strong passwords that are long and difficult to ascertain. They should also be completely different than the passwords you use for your banking and online accounts. And absolutely do not program your passwords into your phone.Make sure your voicemail password is also hard to crack, says Bechar. Even if you’re not worried about someone eavesdropping on your phone calls, fraudsters can certainly drain your bank account if you’re not wary. The code should be six to eight digits and don’t even consider using 1,2,3,4,5,6,7,8, he says. You might even call your provider and disconnect your ability to remotely check your messages.Watch that app. Last year, more than one million of China’s cellphone users were infected with a virus that automatically sends text messages. How did they catch that virus? They downloaded an antivirus application that they thought would help protect them against hackers. If you want to download encryption software, do. But just make sure it’s from a reputable seller. Bechar adds that sticking to apps in, say, Apple’s App Store, which certifies its apps, can also be a good idea.Keep it clean. Depending on what kind of phone you have, different applications can be used to help you remove your information remotely. For instance, MyMotoblur can erase your data from Motorola devises. Before you sell or discard a device, make sure you erase it then, too. July 8, 2011 min read Growing a business sometimes requires thinking outside the box. Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Opinions expressed by Entrepreneur contributors are their own.last_img read more

What DDoS Attacks Are and How to Survive Them

first_img Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Illustration from Shutterstock.comNever heard of a DDoS attack? Small companies that do business online ought to learn about this growing online threat — and figure out how they’ll respond should one ever hit them.Consider what happened to Los Angeles-based business-planning publishing and advisory company Growthink. Last September, a surprise flood of bogus traffic knocked its website off the internet for several days. Growthink turned to its hosting firm for help, only to have its website sidelined so other sites wouldn’t be collateral damage. It finally recovered by hiring a DDoS-protection firm, BlockDos, to filter out the bad traffic. Then it moved to a new hosting service, Rackspace, so it would be better prepared next time.”It was pretty intense,” says Kevin McGinn, Growthink’s IT director. “We had no idea why we were being singled out.”Growthink had suffered a “distributed denial-of-service” attack. In a DDoS attack, legitimate site visitors are denied access by hackers who immobilize the site either with a flood of bogus internet traffic or a surgical strike that exhausts the resources of a specific web application. Successful attacks can cripple business operations. Growthink estimates its website outage erased $50,000 in revenue.Related: Why You Might Need to Rethink Your Internet Security — NowAs Growthink discovered, it isn’t always clear who’s out to get you. Experts say e-commerce outfits and other businesses that rely heavily on the web for their livelihoods are most at risk. Smaller companies are most often attacked by unscrupulous competitors and extortionists, although disgruntled former employees, vandals and “hacktivists,” or hackers with a political agenda, are also known culprits.With both the number and ferocity of attacks rising, DDoS incidents are a growing threat. In the last year, CloudFlare, a San Francisco cloud-based web performance and security firm, said it has seen a 700 percent rise in DDoS traffic.Small companies are increasingly finding themselves in the crosshairs, experts say, as the cost of mounting attacks drops and large companies get better at stopping them. Attackers can rent “botnets” of 1,000 hijacked malware-infected home PCs capable of taking down sites of most small-to-medium-sized businesses for only $400 a week, according to Incapsula, a competitor to CloudFlare that’s a subsidiary of security firm Imperva, both of Redwood Shores, Calif.Even modest extortionists can profit. Australian e-commerce company Endless Wardrobe received an email in May demanding $3,500 via Western Union. When the firm didn’t comply, its site was knocked offline for a week by a torrent of bogus visits. The downtime cut revenue by at least the amount of the demanded ransom.Here are tips on how to survive if you find your business under a DDoS attack, too.Related: How to Make Your Website Hacker-ProofFind a hosting service or ISP that will help. Many hosting services put large numbers of small websites on the same servers to boost efficiency. That’s fine until one site is attacked and the hosting company takes it offline so other customers on the server aren’t hurt as well.Check your contracts and speak with your hosting service or internet service provider, or ISP, to find out what it will do if you come under attack. Will it help you stop the attack and recover, and if so, at what cost? Will it send you a giant bill because an attack generated a ton of extra traffic to your site?A growing number of these service providers are offering security features, including DDoS protection, as a way to differentiate themselves in a crowded market. Such companies, which often employ technology from specialists such as Arbor Networks, include Firehost, Rackspace and iWeb.Hire help.Companies that provide website acceleration services also often help fend off DDoS attacks. For instance, CloudFlare provides a free basic level of DDoS protection that it says will stop most attacks, and two tiers of service at $20 and $200 a month that can stop larger attacks. Incapsula includes DDoS protection as part of its Enterprise tier of service for an undisclosed fee.If you’re targeted with a highly sophisticated attack, however, you may want to consider hiring a DDoS-protection specialist, such as Prolexic, a cloud-based security company based in Hollywood, Fla.Investigate ways to fortify your site.CloudFlare co-founder and CEO Matthew Prince suggests using nginx web server software — favored by the likes of Netflix and WordPress — because it can be more resistant to DDoS than other programs. He also recommends using the latest versions of your web software, such as WordPress and shopping carts, to prevent some application-based attacks.Related: How to Determine If Cyber Insurance Coverage Is Right for You August 2, 2012 4 min read Opinions expressed by Entrepreneur contributors are their own. Growing a business sometimes requires thinking outside the box. Register Now »last_img read more