Wednesday, April 3, 2013

Operating System


These protected APIs include:

Camera functions
Location data (GPS)
Bluetooth functions
Telephony functions
SMS/MMS functions
Network/data connections

These resources are only accessible through the operating system. To make use of the protected APIs on the device, an application must define the capabilities it needs in its manifest. When preparing to install an application, the system displays a dialog to the user that indicates the permissions requested and asks whether to continue the installation. If the user continues with the installation, the system accepts that the user has granted all of the requested permissions. The user can not grant or deny individual permissions -- the user must grant or deny all of the requested permissions as a block.

Once granted, the permissions are applied to the application as long as it is installed. To avoid user confusion, the system does not notify the user again of the permissions granted to the application, and applications that are included in the core operating system or bundled by an OEM do not request permissions from the user. Permissions are removed if an application is uninstalled, so a subsequent re-installation will again result in display of permissions.

Within the device settings, users are able to view permissions for applications they have previously installed. Users can also turn off some functionality globally when they choose, such as disabling GPS, radio, or wi-fi.

In the event that an application attempts to use a protected feature which has not been declared in the application's manifest, the permission failure will typically result in a security exception being thrown back to the application. Protected API permission checks are enforced at the lowest possible level to prevent circumvention. An example of the user messaging when an application is installed while requesting access to protected APIs is shown in Figure 2.

The system default permissions are described at https://developer.android.com/reference/android/Manifest.permission.html. Applications may declare their own permissions for other applications to use. Such permissions are not listed in the above location.

When defining a permission a protectionLevel attribute tells the system how the user is to be informed of applications requiring the permission, or who is allowed to hold a permission. Details on creating and using application specific permissions are described at https://developer.android.com/guide/topics/security/security.html.

There are some device capabilities, such as the ability to send SMS broadcast intents, that are not available to third-party applications, but that may be used by applications pre-installed by the OEM. These permissions use the signatureOrSystem permission.

How Users Understand Third-Party Applications
Android strives to make it clear to users when they are interacting with third-party applications and inform the user of the capabilities those applications have. Prior to installation of any application, the user is shown a clear message about the different permissions the application is requesting. After install, the user is not prompted again to confirm any permissions.

There are many reasons to show permissions immediately prior to installation time. This is when user is actively reviewing information about the application, developer, and functionality to determine whether it matches their needs and expectations. It is also important that they have not yet established a mental or financial commitment to the app, and can easily compare the application to other alternative applications.

Some other platforms use a different approach to user notification, requesting permission at the start of each session or while applications are in use. The vision of Android is to have users switching seamlessly between applications at will. Providing confirmations each time would slow down the user and prevent Android from delivering a great user experience. Having the user review permissions at install time gives the user the option to not install the application if they feel uncomfortable.

Also, many user interface studies have shown that over-prompting the user causes the user to start saying "OK" to any dialog that is shown. One of Android's security goals is to effectively convey important security information to the user, which cannot be done using dialogs that the user will be trained to ignore. By presenting the important information once, and only when it is important, the user is more likely to think about what they are agreeing to.

Some platforms choose not to show any information at all about application functionality. That approach prevents users from easily understanding and discussing application capabilities. While it is not possible for all users to always make fully informed decisions, the Android permissions model makes information about applications easily accessible to a wide range of users. For example, unexpected permissions requests can prompt more sophisticated users to ask critical questions about application functionality and share their concerns in places such as Google Play where they are visible to all users.

Sensitive Data Input Devices


Android devices frequently provide sensitive data input devices that allow applications to interact with the surrounding environment, such as camera, microphone or GPS. For a third-party application to access these devices, it must first be explicitly provided access by the user through the use of Android OS Permissions. Upon installation, the installer will prompt the user requesting permission to the sensor by name.

If an application wants to know the user's location, the application requires a permission to access the user's location. Upon installation, the installer will prompt the user asking if the application can access the user's location. At any time, if the user does not want any application to access their location, then the user can run the "Settings" application, go to "Location & Security", and uncheck the "Use wireless networks" and "Enable GPS satellites". This will disable location based services for all applications on the user's device.

Device Metadata


Android also strives to restrict access to data that is not intrinsically sensitive, but may indirectly reveal characteristics about the user, user preferences, and the manner in which they use a device.

By default applications do not have access to operating system logs, browser history, phone number, or hardware / network identification information. If an application requests access to this information at install time, the installer will prompt the user asking if the application can access the information. If the user does not grant access, the application will not be installed.

Application Signing


Code signing allows developers to identify the author of the application and to update their application without creating complicated interfaces and permissions. Every application that is run on the Android platform must be signed by the developer. Applications that attempt to install without being signed will rejected by either Google Play or the package installer on the Android device.

On Google Play, application signing bridges the trust Google has with the developer and the trust the developer has with their application. Developers know their application is provided, unmodified to the Android device; and developers can be held accountable for behavior of their application.

On Android, application signing is the first step to placing an application in its Application Sandbox. The signed application certificate defines which user id is associated with which application; different applications run under different user IDs. Application signing ensures that one application cannot access any other application except through well-defined IPC.

When an application (APK file) is installed onto an Android device, the Package Manager verifies that the APK has been properly signed with the certificate included in that APK. If the certificate (or, more accurately, the public key in the certificate) matches the key used to sign any other APK on the device, the new APK has the option to specify in the manifest that it will share a UID with the other similarly-signed APKs.

Applications can be signed by a third-party (OEM, operator, alternative market) or self-signed. Android provides code signing using self-signed certificates that developers can generate without external assistance or permission. Applications do not have to be signed by a central authority. Android currently does not perform CA verification for application certificates.

Applications are also able to declare security permissions at the Signature protection level, restricting access only to applications signed with the same key while maintaining distinct UIDs and Application Sandboxes. A closer relationship with a shared Application Sandbox is allowed via the shared UID feature where two or more applications signed with same developer key can declare a shared UID in their manifest.

Digital Rights Management




 
The Android platform provides an extensible DRM framework that lets applications manage rights-protected content according to the license constraints that are associated with the content. The DRM framework supports many DRM schemes; which DRM schemes a device supports is left to the device manufacturer.

The Android DRM framework is implemented in two architectural layers (see figure below):

A DRM framework API, which is exposed to applications through the Android application framework and runs through the Dalvik VM for standard applications.

A native code DRM manager, which implements the DRM framework and exposes an interface for DRM plug-ins (agents) to handle rights management and decryption for various DRM schemes

Friday, February 1, 2013

VISA GIFT CARD

Looking for a great gift idea? Introducing the SECU Visa Gift Card - the perfect gift for anyone on your list no matter what the occasion - birthday, wedding, anniversary, holiday or graduation! The versatility of the SECU Visa Gift Card allows your loved ones to make purchases nearly anywhere Visa cards are accepted. So why waste time trying to figure out their favorite restaurant or store? With an SECU Visa Gift Card, the possibilities are endless! 

The Gift Cards are available in all SECU branches. Gift Cards can be purchased in amounts ranging from $20 to $500 at a cost of just $1 per card! You can also order your Gift Cards online through Member Access. Simply sign in, select the Services tab, click on the Gift Cards link and follow the easy instructions. The fee for issuance and handling of each card purchase online is $2.50. 

So how do these cards work? Although an SECU Visa Gift Card is not a credit card, you use it similar to one. A Personal Identification Number (PIN) is not tied to the card, so choose "credit" when making purchases and the amount will be deducted from the card. It's pretty simple! Cardholders can even check their gift card balance and transaction history by calling the number on the back of the card. 

Visit My Account today to register your Gift Card! Registering your Gift Card allows you to view transaction information and balance. It is important to register your Gift Card in case it is lost, stolen or if you have an unauthorized transaction. Please refer to the Visa Gift Card Terms and Conditions for more information. 

How to Manage Tickets, Gift Cards, and More with Passbook


Passbook is a brand new app in iOS 6 that makes managing your event tickets, gift cards, coupons, loyalty cards, and more super easy. Here's how it works in iOS 6.

How to Add, View, and Use Passes


When you update to iOS 6, you'll see a new icon on your home screen for Passbook. Tap on that to open your list of passes. When you first start, you won't have any, but you'll be able to head to the App Store and buy some if you so desire. If you come upon anything that's compatible with Passbook—say, in mobile Safari—you'll be prompted to add it to Passbook right then and there.
Each card in Passbook is designed to show you all the information you could need at any point in time. Airline tickets have your flight number, your gate, the departure time, and more. Gift cards show your current balance, coupons show the expiration date, and nearly all passes have a scannable bar code so you don't need to worry about bringing along your paper tickets. To delete a card, just press the info button in the lower right-hand corner, and tap the trash can icon.

Get Notifications for Passes As You Need Them
When you bring up a pass, you can tap the info button in the lower right-hand corner to edit its preferences. Each card has two settings: First is Automatic Updates, which allows Passbook to update your gift card balance, airline gate changes, and other information. The second preference is Show On Lock Screen, which will give you notifications when it's time to use that card. If it's an airline or event ticket, for example, it'll send you a notification based on the time, and if it's a gift card or coupon, it'll send you a notification based on your location (i.e., if you walk into a Starbucks, it'll notify you that you have a Starbucks gift card). You can edit Passbook's notification settings under Settings > Notifications, as you can with any other app. Some passes may even integrate with the Reminders and Calendar apps as well.

What Services Support Passbook?

As of this morning, Passbook currently supports Fandango, Live Nation, Lufthansa, MLB.com At Bat, Sephora to Go, Ticketmaster, and Walgreens. We've have seen a number of other companies in demonstrations of Passbook, leading us to believe they'll soon be partners as well—particularly Delta, Starwood Hotels, Starbucks, Apple Stores, and more. To see more, just open up Passbook and hit the "App Store" button to see what's available!

How Do Gift Certificates Work?


Buying Gift Certificates

  • How does the recipient receive a gift certificate I purchase for them?
    When buying a gift certificate, you will be given the option to print the gift certificate and deliver it to the recipient yourself, or to have the gift certificate automatically emailed to the recipient. (If you choose to have us email the gift certificate, you can indicate whether it should be emailed immediately upon purchase, or you can enter a future date if you want it sent later (e.g., if you want it sent on someone's birthday, etc.)
  • What is on the gift certificate?
    Whether you print or email the gift certificate, it will include a detailed description of the activity, which you can customize to include your name, the recipient's name, and/or a personal message from you to them. (You also have the option to leave off any of these three pieces of information.)
  • Will the recipient see how much I spent on their gift certificate?
    No. The gift certificate will only display the number of tickets you purchased; it will NOT display the dollar amount you paid. The recipient will be able to redeem the gift certificate for the activity and tickets you selected, even if the ticket price increases in the future.

Using Gift Certificates

  • What do I need to do to redeem my gift certificate?
    To use a gift certificate, you simply need to redeem it for a specific date and time, so that you have guaranteed tickets to attend that date and time.
  • Can I redeem my gift certificate online? Over the phone?
    Yes, whichever is easier for you – gift certificates can be redeemed online or over the phone. To reedeem online, simply go to the activity's page on Zerve's website, select the desired date and time, and click the ‘Redeem’ link.
  • What will I receive when I redeem my gift certificate?
    Once the gift certificate is redeemed, you will receive an e-ticket for the date and time selected, which is required to be able to attend the activity, and which will include the exact meeting location.
  • Can value be put back on my gift certificate if I redeem it and then don't show up?
    No. After a gift certificate is redeemed for tickets, its value is permanently reduced, and it cannot be used again if you do not show up for the time selected.
  • What if I want more or fewer tickets than my gift certificate contains?
    If you redeem a gift certificate partially, so that only some of the tickets are redeemed, your gift certificate will have a remainder value which you can use at a later time. If you choose to buy more tickets than are available on your gift certificate, you will need to pay for the balance using a credit card.

How do Gift Cards technically work?



This is with respect to the magnetic strip on the back, the security code, and the transaction of funds happening in the background.

Technically work or work technically?

Depends on the software system driving the platform.  There are many variants to the answer but I can give you a rough idea of how it works.  

The mag stripe contains magnetically recorded account data.  Just like credit and debit cards.  There are different tracks of data, generally track1, 2, 3.  Each has a standard message format layout and is sometimes dependent on the industry or geographical deployment.  A lot of the gift cards are similar because their card programs are being driven by companies like Black Hawk and such.

A lot of closed loop gift card programs (non-bugged with Visa/MC/Amex logos) don't implement the security code.  If it is a bugged card (visa, mc, amex, etc..) then the 3 digit code is just the standard CSC code.  That number is generated with an algorithm when they generate the batch of card numbers and mount them into their platform.

Transaction of funds can run the gamut.  I assume you already understand the transaction processing flows.  I have seen systems where the balance of funds sit with the business/merchant and other systems where it sits with the processor.  Generally, if the card can only be used at one business/merchant then the funds should stay with them and it sits as a liability on their books dependent on their Nation/State laws relative to gift cards and other forms of stored value.  If it is a multi-merchant business (pooled or open loop) then usually the money sits with the card program or the processor and not the merchants.  I have seen rare cases in pooled and open loop systems where the merchants individually retain the loaded funds and the processor does net-settlement between all participants at EOD.  I find that last model a bit risky and it is like trying to create V/MC all over again.

As an experiment go buy a cheap USB mag stripe reader and swipe your credit, debit and gift cards directly into a text editor like notepad.  The encoded data will be dumped in plain text for you to view.    

If you want to have even more fun you can get your hands on a card encoder and you can write the mag stripe data from any of your cards onto blank white card stock.  In fact, you can do this with many credit cards.  I have done it dozens of times.  It can be a particularly amusing and interesting social experiment to go shopping with a blank white credit card or a gift card.  Sales clerks tend to get a bit flustered but when the authorization prints out there isn't much they can do.  Occasionally I have been refused service and have to pull out the original card.

If you have any more questions, msg me.  I wrote our gift card issuing/acquiring platform.  Drives the standard issue plastic mag strip gift card applications and other derivatives.

Gift Certificates

Gift card is substitute for currency, which cannot be used as a legal tender and are often a form of prepayment at a particular business or a store.
Gift Cards are essentially the same as Gift Certificates except that the cards automate the checkout and accounting processes. Cards usually have a barcode or magnetic strip, which can be processed through a standard electronic POS terminal or credit card machine.
Cards do not have any value until they are sold, at which time the cashier enters the amount that the customer wishes to put on the card. This amount is not stored on the card, but is instead noted in the stores orcredit/gift card processor's database and cross-linked to the card ID.
*Example of transactions.
Gift Card purchase
  • 1. A customer comes up to a cashier and asks to buy a Gift Card.
  • 2. The cashier enters the amount of the Gift Card into a POS terminal or credit card terminal, swipes the gift card for activation and selects an appropriate function key.
  • 3. The POS terminal or credit card terminal sends the command to the store's database over the internet to the credit/gift card processor's server to activate the card for the purchased value amount. The purchased value of the card is stored on a database at the store or a database that is located on the processor's site.
  • 4. If no problems are detected the processor sends a command back to the POS terminal or the credit card terminal that the transaction is approved and it is ready for payment.
  • 5. The customer pays cash or with a credit card for the purchase of the Gift Card.
  • 1. A customer buys merchandise and presents a Gift Card as a payment.
  • 2. The cashier selects an appropriate function key at the credit card terminal or POS terminal and swipes the gift card.
  • 3. The credit card terminal or POS terminal sends the command to the store's database or over the internet to the credit/gift card processor's database to redeem the gift card.
  • 4. If no problems are detected the processor sends command back to the POS terminal or credit card terminal that the transaction is approved as payment. The value of the card is reduced at the database.
  • 5. If the value on the Gift Card is more then the amount of purchase then the POS terminal or credit card terminal will print the remaining balance on a receipt and completes the transaction.
  • 6. If the value on the Gift Card is less than the amount of purchase then the POS terminal or credit card terminal will prompt the balance due. The customer may pay the balance due with cash or a credit card.

Freelancing Mistakes


Freelancing Mistakes You Don’t Need To Make

WE RARELY LIKE TO ADMIT OUR MISTAKES, BUT IF WE FAIL TO ADMIT THEM AND LEARN FROM THEM THEN THEY’RE LIKELY TO BE REPEATED. IN THIS ARTICLE I WANT TO ADMIT SOME OF MY MISTAKES TO YOU, AND SHARE MY EXPERIENCE SO THAT YOU CAN AVOID MAKING THEM.

My journey has taken me from the highs of doing what I love every day to the lows of chasing monthly payments and then back again. To say that my journey has followed the typical freelance roller coaster would be an understatement.

Making mistakes along the way is a big part of freelancing, though, and I’m sure many of you can relate when I say that these failures and mistakes help to make your business successful and teach you a lot along the way. if you like to learn more CLICK HERE.

Today I want to share four that I’ve personally had to learn to avoid, and it is my hope that in sharing these you can avoid them yourself without having to go through them first.

MBA Without Bachelor


Twitter's Buzzing With Complaints Over Botched 1-800-Flowers Mother's Day Deliveries

Looks like 1-800-Flowers* didn't learn much from the beating it took on Twitter and Facebook for botching countless Valentines' Day deliveries earlier this year.

We spotted dozens of furious tweets and Facebook postings from frustrated Mother's Days customers over the last 24 hours, from complaints about erroneous cards to moms still waiting for bouquets to arrive.
The company is pretty transparent when it comes to complaints (plenty of others block consumer postings altogether), enlisting a trio of social media responders to intromit messages with promises to follow up. But this time around they called on a new tactic for crowd control: Cash.


Customers were offered $25 1-800-Flowers gift cards as compensation for failed deliveries, along with promises they'd be delivered by Tuesday, the 15th. If you like to learn more CLICK HERE. 

But the offer didn't appease people who spent many times that on arrangements – and expected them to arrive Sunday.

*UPDATE: Per spokesperson Yanique Woodall, the company will redeliver or refund purchases as well.
"This year’s Mother’s Day, as with all peak holiday seasons, we are able to help the vast majority of our customers deliver a smile for the holiday period," Woodall said. "In addition, we believe in the use of social media; therefore, our customers will use Facebook and Twitter to contact us. As always, our goal is to help our customers express themselves perfectly to the important people in their lives.”
Check out more complaints below:

Tuesday, January 29, 2013

My Top 5 Biggest Freelancing Mistakes

It is often said we learn more from mistakes than successes. Sometimes it is nice to learn from another persons goofs rather than your own!

Every freelancer will have their own stories to tell, here are mine. I hope you find them useful and maybe you will share your own in the comments.

1. Under-pricing

Most of us will have done this at some point, many of us still do. Money is a difficult subject for a lot of people. While I am better at talking about money now than I was, I still find it an uncomfortable topic. Problem is, while you might not find it easy it is absolutely critical.
You have a right to earn a fair price for your work, and doubly so when you are good at your job and have excellent experience. How do you know if you are underpricing? If you do good work but you never lose a bid then your prices are too low.

Also be careful about charging by the hour when you don’t have to. When you charge by the hour you are actually penalizing yourself for getting faster at your work! Also some jobs require considerable experience and expertise while taking little time to execute. As the old carpenter said when his customer complained at the price for fixing a creaky floor board, “That’s $1 for the nail, $999 for knowing where to put it”.

2. Over-committing

No one client has the right to monopolize your time, even if they do think they are paying well. When one client takes all your time that is a boss and you have a job, not a client and freelancer relationship. Remember as well as the job at hand you need time to market and network to bring in future work. Allowing one customer to dictate my hours was the worst mistake I ever made as when that contract was over I had nothing to fall back on. You ideally want to have four or five overlapping contracts plus some breathing room so the loss of one doesn’t set you back too far.

 

3. Failing to sell

After money I am guessing the next worst part of freelancing for most people is the thought of selling yourself and your services. Fact is though many times a client will know they want your help but will not know exactly what they want. Selling need not be about snake oil and ripping people off. If you can truly help someone out then offer your services in a way they will respond to. Make it all about them, their needs, what they will get out of it. Most importantly, listen more than you talk.

4. Always saying ‘yes’

Fear can cause us to do many stupid things. It took a lot before I started turning down requests. Some were easier than others. Requests to work for free still come but I am better at saying no now, turning work down is still tough but I can do it. You have to remember that a bad deal or bad client can damage you far more than the loss of the work. Be prepared to not agree to everything that comes your way and know that you can be nice and friendly without agreeing all the time!

5. Not following up

Past, happy clients can be your biggest source of new work, both with repeat business and referrals. Always get at least a testimonial when they say how happy they are. Even better if you can get them to recommend you. It doesn’t hurt to ask! Also it can be nice to send birthday cards, etc. You never know.
Like the rest of us, I am still learning about this freelancing lark, but having a great deal of fun doing it, mistakes and all. What lessons have you learned the hard way? Please do share in the comments.
Chris G.
******
Chris Garrett is a freelance blogger and internet marketing consultant from the UK. You can follow Chris on his blog where he shares his experiences, insights, and writes a ton of useful posts about blogging, freelancing, new media, networking and marketing.
Related posts:
  1. What Are Your Biggest Challenges In Your Freelance Career?

About the author: Chris Garrett is a freelance blogger and internet marketing consultant from the UK. You can follow Chris on his blog where he shares his experiences, insights, and writes a ton of useful posts about blogging, freelancing, new media, networking and marketing.

Four Freelancing Mistakes You Don’t Need To Make

We rarely like to admit our mistakes, but if we fail to admit them and learn from them then they’re likely to be repeated. In this article I want to admit some of my mistakes to you, and share my experience so that you can avoid making them.

My journey has taken me from the highs of doing what I love every day to the lows of chasing monthly payments and then back again. To say that my journey has followed the typical freelance rollercoaster would be an understatement.
Making mistakes along the way is a big part of freelancing, though, and I’m sure many of you can relate when I say that these failures and mistakes help to make your business successful and teach you a lot along the way.
Today I want to share four that I’ve personally had to learn to avoid, and it is my hope that in sharing these you can avoid them yourself without having to go through them first.

Mistake #1 — Giving Away Too Much Information

In many areas of freelancing there is the potential to give away too much information. On my path, as an internet marketer, I started out by telling clients exactly what I would do to increase their search engine rankings or get them more social media traffic.
There was a slight dilemma with this situation. Some clients loved the approach, understood that I knew what I was talking about, and requested more of my services. Others, however, took my outline and implemented it themselves or hired someone cheaper to follow it as best as they could. In the end, I decided to give prospects a similar outline, but included far less of the details I had previously been handing out.
If you overstretch to land the client, you might end up giving them all they needed in the first place. This could include sample logos, website templates, scripts, or anything else you’re creating. Definitely give them a taste of what you’re about, but don’t give too much before you land the deal.

Mistake #2 — Leaving Jobs Until the Last Minute

I was 17 when I first started freelancing and, just like I did with my school and college work, I ended up leaving a lot of my jobs until the last possible minute. It’s not that I disliked what I did (unlike college and school work) but more that I didn’t need to do things yet so I didn’t see why I should.
Eventually, of course, this caught up with me. The first place I ran into a problem was when I wanted to go to a party or do something else that happened to be at the end of the month. The second place was when I received extra work from other clients where they offered to pay double to have the work done quickly. If you have the free time to do your work, get on with it. As I’m sure you know, or will quickly find out, it’s far better to have things out of the way than to waste your free time and have a huge backlog to work through later.

Mistake #3 — Wasting Time on Unproductive Work

Just like I would waste my spare time and leave things until the end of the month, I would often spend time working on business activities that just didn’t help my bottom line. I realize now, as I type this, that I’m not painting the best picture of myself (I did change – honest).
I first started doing this because my initial marketing plan was simply to be everywhere at all times. I wanted to cover as much of the relevant web space as possible to try and land new clients. Only later did I realize a lot of these marketing ‘opportunities’ gave me little chance to land my ideal client.
I find it’s a good idea to record every action you take on a typical day (just once) and then review it. You’ll soon find what is working for you and what isn’t.

Mistake #4 — Acting Like Someone I Wasn’t

When I first started out, I never thought anyone would want to hire a 17-year old who was working from their bedroom. Therefore, I kept my age private and I put on what I can only describe as a front. For some reason, I acted and communicated with clients as if I was working in a large corporation.
Of course, I never lied to prospects and said this, but that is the way I was coming across. This front hindered me far more than it helped. It put a wall between myself and the client and we couldn’t really connect. Yet, as soon as I started communicating through my natural voice and in my usual way, I started creating great connections and building my network.
Strong connections are crucial to gaining trust and closing the deal, and pretending to be someone I wasn’t hurt those connections.
Open for Discussion: Let’s be honest, we’ve all made mistakes. What things have you done ‘wrong’ along the way on your freelancing journey? I would love to hear them, and I’m sure your experiences will help other freelancers.

 

 

Industrial Designer Freelance (TEMP)

Gilmore Group - New York, NY
Position Summary: A fast growing multidiscipline design consultancy is seeking an industrial designer to add as a team member. Responsible for initiating and developing designs from concepts through production that addresses brand objectives and production concerns in interior environments, experiential branding, transportation, product and packaging.
Formal Education: Professional degree in one of the following:
  • Industrial Design
Professional Requirements:
  • 1+ years experience
  • Work on large & small projects with strong people skills
  • Detail oriented, well organized
  • Good communicator
  • Strong presentation abilities
  • Ability to sketch ideas
Software & Platform Proficiency:
  • CAD drafting (AutoCAD preferred)
  • 3D Modeling Capability (Alias or 3D Studio preferred,
Solidworks a plus)
  • Microsoft Project
  • PhotoShop
  • Illustrator
  • Microsoft Office (PowerPoint a plus)
Please review all application instructions before applying.

We love making a difference.

For many writers the desire to put pen to paper comes from a deep and strong desire within. For Thomas Hauck, it first came out of necessity – although the passion to write was always there as well. You see, Thomas began freelance writing and editing on Elance after being laid off from his full-time job (as the local economy took a turn for the worse).

Fortunately Thomas has always had a knack for storytelling, and in the past four years he has continued to grow his business as a success ghost writer and editor. He’s now able to shake the bad local economy and remain self-employed, being his own boss and setting his own hours. Through Elance he’s also able to meet and work with clients all over the world, another dream-come-true for Thomas. if you like to learn more CLICK HERE.

Freelancer, Freelance Worker

A freelancer, freelance worker, or freelance is somebody who is self-employed and is not committed to a particular employer long term. These workers are often represented by a company or an agency that resells their labor and that of others to its clients with or without project management and labor contributed by its regular employees. Others are completely independent. "Independent contractor" would be the term used in a higher register of English.
Fields where freelancing is common include: music, journalism, publishing, screenwriting, film-making, acting, photojournalism, cosmetics, fragrances, editing, photography, event planning, event management, copy editing, proofreading, indexing, copy writing, computer programming, web design, graphic design, website development, consulting, tour guiding, video editing, video production and translating and illustrating.
Freelance practice varies greatly. Some require clients to sign written contracts, while others may perform work based on verbal agreements, perhaps enforceable through the very nature of the work. Some freelancers may provide written estimates of work and request deposits from clients.
Payment for freelance work also varies greatly. Freelancers may charge by the day, hour, a piece rate, or on a per-project basis. Instead of a flat rate or fee, some freelancers have adopted a value-based pricing method based on the perceived value of the results to the client. By custom, payment arrangements may be upfront, percentage upfront, or upon completion. For more complex projects, a contract may set a payment schedule based on milestones or outcomes.
In writing and other artistic fields, "freelance" and its derivative terms are often reserved for workers who create works on their own initiative, then look for someone to publish them. They typically keep the copyright to their works and sell the rights to publishers in time-limited contracts. In contrast, intellectual property created under a work for hire situation according to the publishers' or other customers' specifications are referred to as "independent contractors" and similar terms. They have no copyright to the works, which are written as works made for hire, a category of intellectual property defined in US copyright law Section 101, Copyright Act of 1976 (17 USC §101). This is the opposite of the situation with a regular employee, the relationship between a freelancer and an employer being that between two business equals, the protections of the intellectual property rights that naturally vest in the creator of the work are considered to have been sold in toto in the work for hire agreement.

Freelance Editor

We are looking for an ambitious freelance acting editor with solid editing experience and fresh ideas for a quarterly contract-publishing magazine that is distributed internationally. Our client is based in Africa and of the highest level.

The magazine is published in English and French. Candidates must be fluent in both languages and have broad journalistic experience of news and in-depth feature writing (notably: business, politics, tourism and culture). Experience of managing the editorial and design process and working with external contributors is essential. Good organisational skills and resourcefulness are pre-requisites, as is the ability to manage the translation process. Knowledge of InDesign and competent photography skills preferred.

Experience of working in developing countries is a plus. Must be able to travel to Africa for field research prior to each publication and to arrange and conduct meetings with government officials and business leaders in both languages. Must have good diplomacy skills for client liaison, the ability to work well in a team with the magazine’s editorial and design staff, and to collaborate closely with its publisher and senior editor.

Most work will be home-based, with visits to the office as required. Attractive remuneration package. References required.


Freelance Advertising Print Project Managers

I am looking for advertising Print Production Project Managers for a 2 month freelance role in Central London.
MUST have experience in the following -
PM experience with heavy advertising traffic experience
Managing fulfilment of media schedules from receipt of media plan through to delivery
Experience managing localisation of print assets through the studio
Use of online campaign management tools - to book in and traffic work through
hands on experience in delivering assets to media schedules
any online campaign management tool to book in and traffic work through.

Salary - £100-200/day depending on experience
For more information please get in touch - jonny.sawyer@ecomrecruitment.com

Digital Marketing Executive (Freelance)

DIGITAL MARKETING EXECUTIVE (FREELANCE)

A leading Web Content Management Agency is currently recruiting for a Freelance Digital Marketing Executive to join their fast paced London office whilst they recruit for the permanent hire.

As the Digital Marketing Executive you will be responsible for the website, writing press releases as well as updating external content such as news, blogs, white papers and case studies.

In addition to the above, you will seek and implement innovative methods to leverage social media channels such as Twitter, Facebook, Linkedin etc.

DIGITAL MARKETING EXECUTIVE (FREELANCE) ESSENTIAL CRITERIA

*Experienced in content creation in a Technological / Digital environment
*Experience working on Social Media Channels (Facebook, Twitter, Linkedin etc)
*MUST BE AVAILABLE AT SHORT NOTICE (1 week notice maximum)

If you are available at short notice and are interested in the role please call Matt Berney on 0207 258 2364 or email at matt@ecomrecruitment.com