Feeds

Tagging firm Yougetitback to open US office

Track your spectacles, PDA, wallet and keys

The Power of One eBook: Top reasons to choose HP BladeSystem

A Cork-based lost and found company, Yougetitback.com, is to open an office in San Francisco in the New Year as part of a significant expansion.

Launched in July 2006, Yougetitback.com provides a signature tagging system for personal items such as iPods, mobile phones and digital cameras as well as spectacles and house keys.

If an item is lost and subsequently found, the item can be traced back to its owner through the Yougetitback security tagging system. The company's website currently claims 100,000 users.

Yougetitback presently employs eight people in Cork but says it plans to increase this number to 20 by the end of 2007 as well as employing five people in the new San Francisco office. The majority of the jobs will be in the technical and sales areas.

The company is currently developing technology that will allow mobile phones and laptops to be tracked if they go missing. Tracking will begin as soon as the owner switches that function on in his or her account and will notify the company and the police as to its whereabouts.

Commenting on the expansion, managing director Frank Hannigan told ENN it was an exciting time for the company.

"It's a very exciting time for us. We have significant sales booked in for next year and it was imperative that we have an office on the ground in the US," he said. "By 2012 we will be protecting €100m in assets and making sales of not less than €50m," he predicted.

Hannigan pointed to worldwide research which suggests that most people will try to reunite lost goods with their owners if it is made easy enough for them to do so.

"People are not inclined to label items such as house and car keys in the likelihood of them being misused, which makes it hard for these to be traced. I think people are much more security conscious now and prefer to have somebody in the middle between them and the person who has found their assets," he added.

Copyright © 2006, ENN

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.