Go to the content

FGR*

Full screen

FGR* Blog

April 3, 2011 21:00 , by Unknown - | No one following this article yet.

VIDEOHIVE BROADCAST NEWS PACKAGE

June 17, 2016 11:46, by FGR* Blog

Broadcast News Package Videohive – Free After Effects Templates

After Effects Version CS5, CS5.5, CS6, CC, CC 2014 | 1920×1080 | No Plugin | 290 Mb

 

www.nitroflare.com/view/04939DA9438DF21/12046247-broadcast-news-package.rar

 


Source link

Mafia III Looked Better Than Ever At E3

June 17, 2016 11:43, by FGR* Blog

Mafia III’s story is told via a really cool documentary-style narrative, and during my E3 visit, I got a chance to tour Hanger 13’s re-envisioned city of New Orleans, the crime-drenched city of New Bordeaux.

Main hero Lincoln Clay, an ex-Vietnam war vet who is betrayed by the Italian mob and ends up on a quest to see their criminal empire burn.

Hanger 13’s rendition of New Bordeaux feels like a character itself. My tour through the city starts in the bayou as we work our way through the French Ward. Each of the 10 districts have their own ecology. The bayou is a scenic swampland that feels sticky and hot. Amidst these foul waters the mafia runs guns and produces moonshine.

Further north is the district of Frisco Field, a collection of well-manicured lawns and stately fields. Here, the Italian mob has partnered with corrupt official at the local university to produce PCP. However, the heart of the city is the French Ward, which feels like a constant party that never stops. This districts is run by a fat man named Uncle Lou, who uses the district to deliver smack and high-class call girls to anyone with money.

Lincoln’s mission to take Lou down can play out in a number of ways. He can hurt the criminal giant by interrogate pimps for information, burning down drug boats, robbing his orgies, killing his smack dealers, and capturing and controlling his brothel and drug den. You won’t have to do all of these things, but as you do these activities they begin to hurt Uncle Lou’s operation, which eventually forces Lou to hold a fundraiser on a riverboat.

The riverboat fundraiser is Lincoln’s chance to take Lou down, and the mission we saw played out like a highly polished cover shooter. Lincoln used stealth to get the drop on a few of Lou’s men, before tossing them over into alligator-infested waters, then took out several more with a shotgun and some well-placed molotovs.

Lincoln finally makes it to the top of the ship to confront Lou, but an explosion sends both of them out of the boat and into a river. Lou is hurt and firing blindly into the forest as he runs for safety. Unfortunately, Lincoln is only armed with his army knife, so he stealthily sneaks around behind Lou and presses the blade to the drug lord’s throat. Lou offers Lincoln money, but Lincoln is more interested in using Lou to send a message. Unfortunately for Lou, he doesn’t have to be alive to deliver that message.

Mafia III looked better than ever in our E3 demo, and I can’t wait to finish Lincoln’s crusade against the Italian mob when the game releases on October 7. For more on Mafia III, be sure to check out our month of cover coverage.


Source link

How Does the FBI Watch List Work? And Could It Have Prevented Orlando?

June 17, 2016 11:41, by FGR* Blog

Of all the details investigators have uncovered about Orlando terrorist Omar Mateen, perhaps the most infuriating is the fact that he spent 10 months on a government watch list, yet had no trouble buying an assault rifle and a handgun.

Authorities placed Mateen on a watch list in May 2013 after coworkers at the Florida courthouse where he was a security guard told authorities he boasted of connections to al Qaeda and other terrorists organizations. He remained on the list for 10 months, and FBI Director James Comey told reporters this week that during that time the agency placed Mateen under surveillance and had confidential sources meet with him.

But the feds removed Mateen from the list in March 2014, after concluding that he had no significant links to terrorism beyond attending the same mosque as an American suicide bomber who died in Syria. “We don’t keep people under investigation indefinitely,” Comey said, adding that he doesn’t see anything that his agents should have done differently.

Comey didn’t identify the list Mateen was on, but an unnamed official told the Daily Beast that he was in two databases, the Terrorist Identities Datamart Environment database and the Terrorist Screening Database, more commonly called the terrorist watch list.

Here’s a look at what the lists are and how someone gets their name on one.

What is the Terrorist Watch List?

The Terrorist Screening Database was created in 2003 by order of a Homeland Security Presidential Directive. The database includes the names and aliases of anyone known to be, or reasonably suspected of being, involved in terrorism or assisting terrorists through financial aid or other ways. The federal Terrorist Screening Center maintains the database, and an array of government agencies nominate people to it through the National Counter Terrorism Center.

Some of the information in the database originates with the Terrorist Identities Datamart Environment, also called TIDE. That list contains classified data collected by intelligence agencies and militaries worldwide, but anything passed on to the terrorist watch list is first scrubbed of classified info. In 2013, TIDE had 1.1 million names in it.

The State Department checks all visa applicants against the watch list. The TSA’s No-Fly list and Selectee List, which identifies people who warrant additional screening and scrutiny at airports and border crossings, are also derived from the watch list. But it is most often used by law enforcement agencies at all levels to check the identity of anyone arrested, detained for questioning, or stopped for a traffic violation. The FBI calls it “one of the most effective counterterrorism tools for the US government.”

Entries in the database are coded according to threat level to provide law enforcement with instructions on what to do when they encounter a suspected terrorist who is on the list. According to a 2005 inspector general report (.pdf), of some 110,000 records in the database that the IG reviewed, 75 percent of them were given handling code 4, considered the lowest level, and 22 percent were given handling code 3. Only 318 records had handling codes 1 or 2. A description of what each level means is redacted in the publicly released version of the document, but a note indicates that people are usually given code 4 when they are either just an associate of a suspected terrorist and therefore may not pose a threat or if there is too little information known about the individual to categorize them at a higher level.

Appearing in the database doesn’t mean you’ll be arrested, denied a visa, or barred from entering the country. But it does mean your whereabouts and any other information gleaned from, say, a traffic stop, will be added to the file and scrutinized by authorities.

What’s the Criteria for Getting on the Watch List?

According to a 2013 watch list guideline produced by the Terrorist Screening Center and obtained by The Intercept, engaging in terrorism or having a direct connection to a terrorist organization is not necessary for inclusion on the list. Parents, spouses, siblings, children and “associates” of a suspected terrorist can appear on the list without any suspicion of terrorist involvement. “Irrefutable evidence” of terrorist activity and connections is also not necessary, the document states. Reasonable suspicion is sufficient, though this isn’t clearly defined.

“These lists are horribly imprecise,” a former federal prosecutor, who asked to remain anonymous, told WIRED. “They are based on rumor and innuendo, and it’s incredibly easy to get on the list and incredibly difficult to get off the list. There’s no due process for getting off the list.”

The guidelines also reveal that the Assistant to the President for Homeland Security and Counterterrorism can temporarily authorize placing entire “categories” of people on to the No-Fly and Selectee lists based on “credible intelligence” that indicates a certain category of individuals may be used to conduct an act of terrorism.

“Instead of a watch list limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” Hina Shamsi, head of the ACLU’s National Security Project, told The Intercept. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.”

What Is the No-Fly List?

This narrower list, derived from the terrorist watch list, includes people who haven’t done anything to warrant being arrested, yet the government deems too dangerous to allow onto commercial aircraft. Mateen reportedly did not appear on this list. The list included 2,500 individuals when Homeland Security chief Michael Chertoff released the tally for the first time in 2008. Six years later, Christopher Piehota, director of the Terrorist Screening Center, told a House subcommittee it had 64,000 names on it. That sounds like a lot, but the list includes dead people and multiple versions of names.

The No-Fly list is also notorious for ensnaring the innocent whose names resemble those of suspected terrorists. Senator Ted Kennedy, for example, was repeatedly prevented from boarding planes because his name matched that of someone on the list.

What Kind of ‘Terrorist Activity’ Gets You on the Terrorist Watch List?

Obvious things like using or possessing weapons of mass destruction will land you on the terrorist watch list. So will committing violence at an international airport, or engaging in arson or other types of destruction of government property if it’s done to intimidate, coerce, or influence people or government policy. But computer hacking can also get you included if it damages a computer used for interstate or foreign commerce or ones that are used by a financial institution or the government, if the hack was intended to influence people or policy.

Just as there are those on the list who shouldn’t be, so too are there people who don’t make it onto the list who should. Umar Farouk Abdul Mutallab, the so-called “underwear bomber” who attempted to detonate explosives aboard a flight from Europe in 2009, wasn’t on the terrorist or No-Fly lists, even though his father alerted the US embassy in Nigeria to his radicalization. He did appear in the TIDE database, but because that information is classified, it didn’t make it to the No-Fly list or the Amsterdam airport where he boarded his flight.

A 2007 inspector general’s audit of the terrorist watch list found that in 15 percent of terrorism cases the inspector’s office reviewed, the FBI failed to add suspects in the cases to the list. 

Can Someone on the List Buy a Gun from a Federally Licensed Seller?

Appearing on the terrorist watch list wouldn’t necessarily prevent someone from purchasing a gun; it simply means law enforcement is alerted if you apply to purchase a weapon. So even if he’d been included on the list at the time he bought his weapons, Mateen would still have had no trouble purchasing his Sig Sauer MCX rifle and Glock 17 handgun.

There are ten criteria, however, that do prevent people, whether they’re on the terrorist watch list or not, from buying firearms from a licensed seller. They include a felony conviction, being an undocumented immigrant and being deemed mentally unstable by a court.

Government Accountability Office data recently released to California Democratic Senator Dianne Feinstein indicate that 2,477 people on the watch list attempted to buy a firearm between February 2004 (when authorities started checking gun sale purchases against the list) and the end of 2015. Of those, 2,265 of the transactions were allowed.

Feinstein proposed legislation last year to prevent known or suspected terrorists on the watch list from obtaining a gun license or buying a weapon from a licensed seller. The Senate rejected the proposal one day after the San Bernadino attack, but Feinstein said she hopes the Orlando massacre will give the bill new life. This week, Senate Democrats filibustered until Republicans agreed to consider such legislation.

But barring anyone on the list from buying a gun can create a different problem. “If you prevent people on the list from buying a weapon, then an attempt to buy the weapon can alert the person that they’re on the list,” the former prosecutor told WIRED. “So you’re aiding the terrorist [with that information].”

How Many People Are on the Terrorist Watch List?

The exact number is unclear because the list includes many aliases and variations of names, and officials often confuse the number of names that are on the list and the number of unique individuals that are on it. In 2011, for example, more than 1 million names appeared on the list, but just 400,000 of these represented unique individuals. In 2014, the Terrorist Screening Center’s Piehota told lawmakers the list included 800,000 names.

About 99 percent of names nominated to the list each year are accepted, and the number of nominations grows annually. In 2009, authorities nominated 227,932 known or suspected terrorists. In 2013, the number reached nearly 469,000.

Most of the people on the watch list are not US citizens; placing a citizen or permanent US resident on the list is supposed to require a higher standard, such information “from sources of known reliability or where there exists additional corroboration or context supporting reasonable suspicion,” according to the guidelines The Intercept obtained.

How Do You Get Off the Terrorist Watch List or No-Fly List?

This remains a source of great controversy. People on these lists rarely know how or why they landed there, and the process of removal can be convoluted. In 2007, the Department of Homeland Security created a redress program through which people can challenge their inclusion on the No-Fly list. It works well enough for anyone mistakenly added to the list, but provides little help to those whom the government says are on the list for legitimate reasons but won’t disclose the reasons.

The FBI will remove people from the terrorist watch list after closing an investigation that failed to uncover terrorist activity or connections. This is exactly what happened to Mateen, which has angered some officials. “The only way you should get off the list is if they no longer believe you’re a threat,” Senator Lindsey Graham said during a Capitol Hill briefing after the Orlando shooting. “It should have nothing to do with not being able to prove a crime.”

But the FBI was simply following procedure when it dropped Mateen from the watch list, after being criticized in the past for not promptly removing people when cases get closed. An inspector general’s report in 2007 found that the FBI failed to remove names in a timely manner in 72 percent of the cases the Bureau closed for lack of evidence. A 2009 audit found that the situation had not improved, prompting lawmakers like Vermont Democratic Senator Patrick Leahy to criticize the Bureau.

The bigger question then, is not why was Mateen removed from the list, but why did the FBI close its investigation of him prematurely? “To me, there was enough here to keep it in some sort of a status,” New York Republican Representative Peter King said during the Capitol Hill briefing this week.

But with so many suspects on the watch list, authorities must be judicious in choosing which ones to pursue. “Our work is very challenging,” Comey said this week. “We are looking for needles in a nationwide haystack. But we’re also called upon to figure out which pieces of hay might someday become needles.”

There is no specific criteria guiding when to close a case related to the terrorist watch list. “It’s a judgment call,” says the former prosecutor. “It depends on the seriousness of the allegations and the result of the investigation. It’s [a matter of whether an] investigator is convinced, more than anything else, that ‘We better keep looking at this guy.’”

In the case of Mateen, investigators surveilled him, looked into his background, and performed a “dangle,” the former prosecutor says. That’s when a confidential informant meets with a suspect. “They feel the guy out to try to figure out if he’s real or if he’s just all talk,” he says. They may do this by asking if he’s interested in purchasing weapons or materials to make a bomb. “They may try the dangle operation two or three times, and if he shows no genuine interest in activity, if he doesn’t take the bait, then they say after a period of time, we’ve got no reason to believe this person is something other than an angry young man … and they close the investigation.”

Still, a case is never truly closed. Authorities can re-open it if something piques their interest—like say, a suspect buying weapons. That would have been sufficient to get Mateen back on the FBI’s radar. But because he wasn’t on the watch list, the FBI didn’t know what he was up to. And that’s what lawmakers are saying they want to fix.

Go Back to Top. Skip To: Start of Article.


Source link

Demystifying Twitter Marketing (English Edition)

June 17, 2016 11:38, by FGR* Blog



Compre agora!


Social Media has done an excellent job in bringing the producer and consumer closer. The distance between the two is diminishing by the day.

From positive feedback to negative criticism, everything talked on the sphere of Web 2.0 today is closely watched.

Demystifying Twitter Marketing makes a clean breast of social media and explains how a business can take a full benefit from its presence. The book is more focused on using Twitter as a marketing medium.

The book contains views from an experienced marketers and business professionals. It also contains amazing successful business studies with focus on their key strategies.



Inovação disruptiva: rumo ao olho do furacão

June 17, 2016 10:17, by FGR* Blog


Em primeiro lugar, vamos definir o seguinte: este não é um artigo voltado apenas para as empresas inovadoras, disruptivas e tecnológicas. Esse é um artigo para todas as empresas, independente do tamanho que tenham ou do segmento de mercado em que atuem.

Uma pesquisa recente da escola de negócios suíça IMD em parceria com a Cisco chamada Digital Vortex: How Digital Disruption Is Redefining Industries traz uma leitura contemporânea bastante preocupante sobre a postura adotada por algumas organizações.

Para produzir o material, os pesquisadores ouviram quase mil líderes empresariais de 12 setores econômicos, de várias partes do mundo, e chegaram à conclusão de que quatro em cada dez organizações vão perder relevância e mercado nos próximos cinco anos! O fenômeno será causado pela já presente transformação digital.

A gravidade da situação aumenta a partir da identificação de uma característica comum em 43% dos CEOs: eles não percebem que a evolução já está acontecendo. Descrentes do potencial disruptivo dessa metamorfose, tendem a olhar para os concorrentes que estão ao seu lado e se enclausurar em uma falsa zona de conforto.

Como os outros players não demonstram sofrer esse impacto, não entendem as mudanças e adotam a estratégia do “esperar pra ver”. Apenas um quarto dos executivos pesquisados afirma ter uma postura pró-ativa diante desse cenário de adaptações e disposição para melhorar, garantindo a sobrevivência e a relevância do seu negócio.

Estamos num furacão de mudanças que até 2020 vai atingir de forma peculiar a cada um, os setores mais diversos da indústria, comércio e serviços em escala global. E a analogia à representação gráfica de um redemoinho faz todo o sentido: as áreas econômicas estão sendo puxadas da borda externa para o vórtice.

Os setores e tecnologia, mídia e entretenimento, varejo e serviços financeiros já foram tragados para o meio, porque sentiram no dia a dia dos negócios que é impossível resistir. Telecomunicações, educação, turismo e a indústria de bens de consumo já têm exemplos de processos que estão evoluindo.

Um case da área educacional é a contribuição que temos prestado a grandes centros universitários do país para ampliar a capacidade pedagógica, administrativa e digital através da integração de serviços na nuvem. Conseguimos facilitar o acesso de alunos e professores à informações a qualquer momento e de qualquer lugar e permitimos que os docentes sejam capacitados e aperfeiçoem seus conhecimentos por meio de soluções de educação à distância.

Na esteira da evolução vêm setores mais resistentes, por seus processos e peculiaridades, à convergência digital: saúde, gás e petróleo e indústria farmacêutica. Ainda que a disrupção nessas áreas pareça demorar mais pra chegar, ela já começou e não há como esperar por ela pra saber como agir. Não importa com qual força você se segure para não ser arrastado (ou entenda que o seu segmento é imune): dentro de pouco tempo, ou os ventos dos novos processos te arrastam ou você morre.

*Diego Brites Ramos é diretor da Teltec Solutions.


Fonte

ANALISTA DE TESTES PLENO

June 17, 2016 7:45, by FGR* Blog

ANALISTA DE TESTES PLENO

Softek
– Postado por temonteiro

| 17 jun 2016

Em qualquer lugar

Emprego


softtek-logo

Descrição da Vaga

Necessário:

Conhecimento de testes em Web, Mainframe, Desktop;

Experiência acima de 2-3 anos na área de testes (Setor Financeiro).

Atividades:

Planejamento e acompanhamento das atividades de testes;

Análise de documentos funcionais e técnicos (FSD e TSD);

Elaboração de plano de testes e roteiro de testes (nível integrado, sistema e aceite.);

Reunião com cliente para entendimento do escopo de projetos;

Acompanhar a execução dos testes pelas fábricas, garantindo que serão finalizados no prazo;

Fazer a gestão de defeitos, auxiliando na análise se os itens encontrados são ou não defeitos e acompanhamento do fluxo de todos os defeitos abertos, orquestrando a correção e o re-teste;

Realizar a gestão das ferramentas Testlink e Mantis, HPALM realizando o cadastro de projetos, vínculo de usuários, criação de suítes de testes, atribuição de casos de teste para execução, entre outras;

Identificar defeitos de software, determinando passos para reproduzi-los, e inseri-los no banco de dados de rastreamento de problemas, monitorando para encerramento.

Local de Trabalho: Fortaleza/CE.

Horário de Trabalho: Comercial.

Contratação: CLT Full + Benefícios.

Relacionado

Como aplicar

Interessados peço que encaminhem seus CV’s para recrutamentosofttek@yahoo.com.br colocando no campo Assunto o título da vaga “Analista de Testes Pleno” e a Pretensão Salarial no corpo do e-mail.

Relacionado

Job Categories: Free.
Job Types: Emprego.
Job Salaries: Não informado.
Vaga expira em 5 days


Você deve fazer login ou criar uma conta, a fim de enviar uma vaga


Fonte

Attack on Titan – Protect the Citizens Gameplay at E3 2016

June 17, 2016 7:40, by FGR* Blog


Attack on Titan – Protect the Citizens Gameplay at E3 2016

Protect the citizen’s group until they escape from Trost in 7 minutes of gameplay at E3 2016.

on
June 16, 2016

Did you enjoy this video?


Source link

EaD Online. Suportes e Leituras

June 17, 2016 7:38, by FGR* Blog



Compre agora!

R$ 39,00


Os artigos reunidos neste livro procuram discutir alguns aspectos importantes da EaD, especialmente no que diz respeito ao emprego de inovações tecnológicas. Neles são feitas analises sobre modelos e praticas educacionais – que, diga-se de passagem, quase sempre valem também para as atividades presenciais, em sala de aula ou fora dela. Este livro não foi produzido exclusivamente por pedagogos, o que é bom, pois a educação é um assunto multidisciplinar e não deve permanecer apenas nas mãos de educadores. Na EaD, esta diversidade é potencializada. Aqui estão textos de professores e pesquisadores de instituições de reconhecido valor no Brasil, vinculados a cursos de Design, Comunicação, Lingüística, Artes e Educação.



FoneLab 8.3

June 17, 2016 6:18, by FGR* Blog


Aiseesoft FoneLab is the most reliable iPhone/iPad/iPod data recovery software. It allows you to retrieve the deleted text files (contacts, text messages, call logs, notes, etc.), and lost media content (photos, music, videos, etc.) from iOS devices directly. Also it lets you restore iOS data from iCloud or iTunes backup. Completely compatible with iOS 9.3, it does a great job in backing up latest iPhone SE, iPhone 6s/6s Plus, iPad Pro and iPad mini 4 on your PC.

Aiseesoft provides 50% off coupon code: AISESUOD (apply to recommended and other products) for all GOTD users.


Source link



Bradesco e Visa lançam wearable que funciona como meio de pagamento

June 17, 2016 6:16, by FGR* Blog


A Visa e o Bradesco anunciaram nesta quinta-feira (16/06), em São Paulo, o lançamento de uma solução de pagamentos por aproximação, com tecnologia NFC (Near Field Communication), suportada por um dispositivo vestível. Durante os Jogos Olímpicos do Rio, a Pulseira Bradesco Visa estará em uso por 3 mil formadores de opinião e atletas da delegação olímpica brasileira, em uma espécie de piloto que definirá a disponibilidade ou não da solução para clientes Bradesco ainda este ano.

De silicone, à prova d’água, a pulseira poderá ser usada em mais de dois milhões de terminais POS equipados com leitores NFC disponíveis no Brasil. Entre eles, os 4 mil POS disponíveis nas arenas e lojas do complexo olímpico no Rio de Janeiro.

O funcionamento é similar ao de um cartão de débito, no qual é preciso carregar créditos. A diferença é que, para tornar as transações mais rápidas e simples, para pagamentos até 50 reais não será necessário o uso de senhas. Para concluir a compra basta aproximar a pulseira do POS.

Os pagamentos com a pulseira são protegidos pelos mesmos termos e condições aplicáveis aos cartões de débito. E no caso de roubo, é possível bloquear o dispositivo através do mesmo site onde os clientes podem acompanhar seu histórico de transação, visualizar o saldo disponível e recarregar créditos. Não há limites, mínimo ou máximo, para as recargas.

Flexível e resistente, o design da pulseira foi inspirado nas pistas de atletismo, de acordo com Martha Krawczyk, vice-presidente de marketing da Visa do Brasil, e acompanha tendências da moda werable.

Produzida em OEM pela Gemalto, a pulseira não será uma solução exclusiva do Bradesco no Brasil. “Todos os emissores Visa poderão fazer uso da plataforma”, comenta Percival Jatoba, vice-presidente de produtos da Visa Brasil. A expectativa é que novos modelos de pagamento usando o wearable surjam no país. “As APIs estão abertas, junto com outras 10 já disponíveis no site para desenvolvedores”, comenta o executivo. E para alegria das startups, a Visa se prepara para sediar em São Paulo, talvez ainda este ano, o seu quinto laboratório de inovação no mundo.

O piloto com o Bradesco foi motivado pelo fato de ambos serem patrocinadores dos Jogos Olímpicos do Rio de Janeiro. “Nada melhor que mostrar que somos inovadores disponibilizando um meio de pagamento moderno e prático durante os Jogos Olímpicos, onde a exposição é maior”, afirma Fábio Dragone, superintendente executivo de Marketing e head do Projeto Olímpico do Bradesco.”Nosso foco agora é garantir que os usuários tenham uma experiência inovadora e diferenciada, para então avaliarmos a implementação de uma solução de pagamento vestível em larga escala no país”, completa.

De acordo com os executivos da Visa e do Bradesco, 1/3 dos brasileiros é early adopter de tecnologias e desejam experiências que os façam ganhar tempo no seu dia a dia. E a meta das duas empresas é não só ter soluções sejam viáveis para o negócio e implementáveis pela tecnologia, como desejáveis pelos clientes.

Nessa mesma linha, Cesário Nakamura, diretor do Bradesco Cartões, lembra que o Bradesco anunciou semana atrás uma parceria som a Samsung para integrar o sistema de pagamentos móveis Samsung Pay, que funciona como uma carteira digital. Basta cadastrar cartões no celular e aproximar o aparelho das máquinas de pagamento para realizar uma compra. Para segurança, as informações ficam guardadas em um hardware especial embutido nos aparelhos e os dados bancários são substituídos por códigos criptografados usados nas transações digitais.

Recentemente também, a Bradesco Seguros iniciou os testes de sua Carteira Digital, para facilitar o acesso aos benefícios dos planos assinados, o que muitas vezes é dificultado pelo esquecimento dos cartões físicos por parte dos clientes.

As companhias não revelaram o investimento feito na solução, que na opinião dos executivos está entre as tendências em solução de pagamento. “Os dispositivos vestíveis serão complementares às soluções de pagamento móveis, às carteiras digitais e por aí vai”, comenta Nakamura.


Fonte