SlideShare uma empresa Scribd logo
1 de 10
WHERE DO PHONES
GET LOST?
Mobile Lost and Found Around the World
By Lookout, Inc
Lookout estimated that lost and
stolen phones cost U.S.
consumers $30 billion in 2012
Source: 2012 Mobile Lost and Found Report, Lookout, Inc. Lookout.com
It’s not a matter of whether you’ll
misplace your phone. It’s a matter of
when and where…
Which depends on where you live.
Lookout.com
What Are the Odds?
In the U.S., people lose a smartphone about
once a year.
Phones are more often lost at night. Two-thirds
of phone loss happens between the hours of 9
p.m. and 2 a.m. local time. One of the top
places to lose your phone at is a bar. (Hmmm,
we wonder how that happens…)
Lookout.com
Most Common Places to Lose Your
Phone in the U.S.
Coffee shops
Offices
Bars
Restaurants
Gas stations or garages
Lookout.com
Most Popular Places to Lose Your
Phone, East vs. West
• Historic site
• Restaurant
• Convenience store
• Park
• Ramen or noodle house
• Hotel
• Men’s store
• Office
• Electronics store
• Train Station
• Fast food restaurant
• Gas station or garage
• Grocery or supermarket
• Coffee Shop
• Video Store
• American restaurant
• Department store
• Automotive shop
• Pizza Place
• Deli or bodega
Tokyo Seattle
Lookout.com
It’s the Most Wonderful Time of the Year
(to Lose Your Phone)
More phones are lost during festivals and
celebrations. During Christmas, more than $11
million dollars worth of phones were lost.
During the week of Carnival (aka Mardi Gras),
more phones were lost around the world than
during your average parade-less, bead-less
week. Party-goers in Cologne lost 30% more
phones and in Paris, 72% more phones were
lost.
Lookout.com
Top U.S. Cities for Phone Loss
• Philadelphia
• Seattle
• Oakland
• Long Beach
• Newark
• Detroit
• Cleveland
• Baltimore
• New York
• Boston
Many of these cities are also in the
highest ranks of the FBI’s crime stats.
— @lookout
Make sure you can find
your phone if you lose it.
Download Lookout
Mobile Security.
Lookout.com
Keep in touch with Lookout
@lookout
/mylookout
blog.lookout.com
contact@lookout.com
WANT TO KNOW MORE
ABOUT LOST PHONES?
EVERYTHING IS OK

Mais conteúdo relacionado

Destaque

Lost & Found Ppt
Lost & Found PptLost & Found Ppt
Lost & Found Pptceon
 
Lost And Found
Lost And FoundLost And Found
Lost And FoundNancy Poh
 
Hk training-21- lost & found
Hk  training-21- lost & foundHk  training-21- lost & found
Hk training-21- lost & foundHari Nair
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductMonica Dhoundiyal
 
Appearance & grooming
Appearance & groomingAppearance & grooming
Appearance & groomingAman Sarao
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquetteRachel Weber
 
GROOMING PRESENTATION
GROOMING PRESENTATIONGROOMING PRESENTATION
GROOMING PRESENTATIONabhisekmehta
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationAndrew Schwartz
 
Grooming Presentation
Grooming PresentationGrooming Presentation
Grooming PresentationNikhil Mathur
 
Effective Customer Communication Skills
Effective Customer Communication SkillsEffective Customer Communication Skills
Effective Customer Communication SkillsFaakor Agyekum
 
Grooming & personal hygiene
Grooming & personal hygieneGrooming & personal hygiene
Grooming & personal hygieneHari Nair
 

Destaque (14)

Lost and Found
Lost and FoundLost and Found
Lost and Found
 
Lost & found
Lost & foundLost & found
Lost & found
 
Lost & Found Ppt
Lost & Found PptLost & Found Ppt
Lost & Found Ppt
 
Lost And Found
Lost And FoundLost And Found
Lost And Found
 
Hk training-21- lost & found
Hk  training-21- lost & foundHk  training-21- lost & found
Hk training-21- lost & found
 
Office Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conductOffice Etiquette: Basic rules of office conduct
Office Etiquette: Basic rules of office conduct
 
Appearance & grooming
Appearance & groomingAppearance & grooming
Appearance & grooming
 
Workplace etiquette
Workplace etiquetteWorkplace etiquette
Workplace etiquette
 
Workplace etiquette & manners
Workplace etiquette & mannersWorkplace etiquette & manners
Workplace etiquette & manners
 
GROOMING PRESENTATION
GROOMING PRESENTATIONGROOMING PRESENTATION
GROOMING PRESENTATION
 
Office Etiquette PowerPoint Presentation
Office Etiquette PowerPoint PresentationOffice Etiquette PowerPoint Presentation
Office Etiquette PowerPoint Presentation
 
Grooming Presentation
Grooming PresentationGrooming Presentation
Grooming Presentation
 
Effective Customer Communication Skills
Effective Customer Communication SkillsEffective Customer Communication Skills
Effective Customer Communication Skills
 
Grooming & personal hygiene
Grooming & personal hygieneGrooming & personal hygiene
Grooming & personal hygiene
 

Semelhante a Lost Phones

WiMO - Retailer Package
WiMO - Retailer PackageWiMO - Retailer Package
WiMO - Retailer PackageGoWiMO
 
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Virginia Lee
 
PYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS.com
 
Technology in the consumer world
Technology in the consumer worldTechnology in the consumer world
Technology in the consumer worldKarenMcBride13
 
Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Advice Interactive Group
 
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity TheftIDT911
 
ZOMM 2010 Update
ZOMM 2010 UpdateZOMM 2010 Update
ZOMM 2010 UpdateZ
 
Voice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleVoice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleStephanie Preyer
 
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14Nikki Wagner
 
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.12c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1Mary Sclabassi
 
Marketing business environment
Marketing business environmentMarketing business environment
Marketing business environmentsohrab mahmoodi
 
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannWinnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannBo Kauffmann
 
Mobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyMobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyBrad Andersohn
 
The market for smart wearables
The market for smart wearablesThe market for smart wearables
The market for smart wearablesNick Hunn
 

Semelhante a Lost Phones (20)

WiMO - Retailer Package
WiMO - Retailer PackageWiMO - Retailer Package
WiMO - Retailer Package
 
2005 thinking
2005 thinking2005 thinking
2005 thinking
 
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
Reinventing Global Retailing: How Retailers are Adding Excitement and Omnicha...
 
PYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening KeynotePYMNTS Summer School Karen Webster Opening Keynote
PYMNTS Summer School Karen Webster Opening Keynote
 
Technology in the consumer world
Technology in the consumer worldTechnology in the consumer world
Technology in the consumer world
 
Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016Mobile is the New Local: How to Compete presented at Big Design 2016
Mobile is the New Local: How to Compete presented at Big Design 2016
 
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
Magda Mo's Marketviews Newsletter for Toronto Real Estate: January 2013
 
This is not a joke wake up world
This is not a joke wake up worldThis is not a joke wake up world
This is not a joke wake up world
 
5 Worst States for Identity Theft
5 Worst States for Identity Theft5 Worst States for Identity Theft
5 Worst States for Identity Theft
 
ZOMM 2010 Update
ZOMM 2010 UpdateZOMM 2010 Update
ZOMM 2010 Update
 
Voice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and GoogleVoice optimisation: Tracking voice results on Alexa and Google
Voice optimisation: Tracking voice results on Alexa and Google
 
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
From Bricks to Clicks Mike Cohn Ring Speaker 3 10 14
 
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.12c1e92135a0121b3649da0c4d317f69fa4793ceb.1
2c1e92135a0121b3649da0c4d317f69fa4793ceb.1
 
Technology
TechnologyTechnology
Technology
 
Marketing business environment
Marketing business environmentMarketing business environment
Marketing business environment
 
Digital Media in 2012
Digital Media in 2012Digital Media in 2012
Digital Media in 2012
 
Digital trends (Episode 8)
Digital trends (Episode 8) Digital trends (Episode 8)
Digital trends (Episode 8)
 
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo KauffmannWinnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
Winnipeg Real Estate Newsletter June 2014 from Bo Kauffmann
 
Mobile Real Estate Business & Technology
Mobile Real Estate Business & TechnologyMobile Real Estate Business & Technology
Mobile Real Estate Business & Technology
 
The market for smart wearables
The market for smart wearablesThe market for smart wearables
The market for smart wearables
 

Mais de Lookout

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsLookout
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLookout
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go EvilLookout
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile DevelopmentLookout
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing PrivacyLookout
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring HackersLookout
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneLookout
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google AccountLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 

Mais de Lookout (20)

The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected CarsThe New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
 
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity PredictionsLooking Forward and Looking Back: Lookout's Cybersecurity Predictions
Looking Forward and Looking Back: Lookout's Cybersecurity Predictions
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
When Android Apps Go Evil
When Android Apps Go EvilWhen Android Apps Go Evil
When Android Apps Go Evil
 
Scaling Mobile Development
Scaling Mobile DevelopmentScaling Mobile Development
Scaling Mobile Development
 
Visualizing Privacy
Visualizing PrivacyVisualizing Privacy
Visualizing Privacy
 
Hiring Hackers
Hiring HackersHiring Hackers
Hiring Hackers
 
How to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhoneHow to (Safely) Cut the Cord With Your Old iPhone
How to (Safely) Cut the Cord With Your Old iPhone
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Lost Phones

  • 1. WHERE DO PHONES GET LOST? Mobile Lost and Found Around the World By Lookout, Inc
  • 2. Lookout estimated that lost and stolen phones cost U.S. consumers $30 billion in 2012 Source: 2012 Mobile Lost and Found Report, Lookout, Inc. Lookout.com
  • 3. It’s not a matter of whether you’ll misplace your phone. It’s a matter of when and where… Which depends on where you live. Lookout.com
  • 4. What Are the Odds? In the U.S., people lose a smartphone about once a year. Phones are more often lost at night. Two-thirds of phone loss happens between the hours of 9 p.m. and 2 a.m. local time. One of the top places to lose your phone at is a bar. (Hmmm, we wonder how that happens…) Lookout.com
  • 5. Most Common Places to Lose Your Phone in the U.S. Coffee shops Offices Bars Restaurants Gas stations or garages Lookout.com
  • 6. Most Popular Places to Lose Your Phone, East vs. West • Historic site • Restaurant • Convenience store • Park • Ramen or noodle house • Hotel • Men’s store • Office • Electronics store • Train Station • Fast food restaurant • Gas station or garage • Grocery or supermarket • Coffee Shop • Video Store • American restaurant • Department store • Automotive shop • Pizza Place • Deli or bodega Tokyo Seattle Lookout.com
  • 7. It’s the Most Wonderful Time of the Year (to Lose Your Phone) More phones are lost during festivals and celebrations. During Christmas, more than $11 million dollars worth of phones were lost. During the week of Carnival (aka Mardi Gras), more phones were lost around the world than during your average parade-less, bead-less week. Party-goers in Cologne lost 30% more phones and in Paris, 72% more phones were lost. Lookout.com
  • 8. Top U.S. Cities for Phone Loss • Philadelphia • Seattle • Oakland • Long Beach • Newark • Detroit • Cleveland • Baltimore • New York • Boston Many of these cities are also in the highest ranks of the FBI’s crime stats. — @lookout Make sure you can find your phone if you lose it. Download Lookout Mobile Security. Lookout.com
  • 9. Keep in touch with Lookout @lookout /mylookout blog.lookout.com contact@lookout.com WANT TO KNOW MORE ABOUT LOST PHONES?