Van Rooij E.,Lookout Inc.
Circulation Research | Year: 2011
Originally identified as moderate biological modifiers, microRNAs have recently emerged as powerful regulators of diverse cellular processes with especially important roles in disease and tissue remodeling. The rapid pace of studies on microRNA regulation and function necessitates the development of suitable techniques for measuring and modulating microRNAs in different model systems. This review summarizes experimental strategies for microRNA research and highlights the strengths and weaknesses of different approaches. The development of more specific and sensitive assays will further illuminate the biology behind microRNAs and will advance opportunities to safely pursue them as therapeutic modalities. © 2011 American Heart Association, Inc.
Lookout Inc. | Date: 2015-01-30
A system and method identifies mobile applications that are likely to have an adverse effect on a mobile network if accessed by mobile communication devices. In an implementation, a server monitors behavioral data relating to a mobile application and applies a model to determine if the application is likely to have an adverse effect on a mobile network when accessed by a plurality of mobile devices. A mobile device, computer device, or server, may monitor behavioral data, apply a model to the data, and create a disposition. They may aggregate behavioral data or disposition information from multiple devices. They may transmit or make available the disposition information to a subscriber through a web interface, API, email, or other mechanism. After identifying that an application may have an adverse effect, they may enact corrective actions, such as generating device or network configuration data.
Lookout Inc. | Date: 2015-04-21
An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.
Lookout Inc. | Date: 2015-06-29
A user of electronic devices is provided with a method for providing a compatible version of an application to an electronic device. According to an embodiment, a compatible version of an application in a source electronic device can be installed by a target electronic device. When an application is selected, the source device collects cloning data associated with the selected application. Once the cloning data is collected, the source device transmits the cloning data, at least a portion of which is received by the target electronic device. The target electronic device then utilizes the portion of the cloning data to install a compatible version of the application onto the target electronic device.
Lookout Inc. | Date: 2014-03-12
The security and convenience of a mobile communication device is enhanced based on a separate key device. If the key device is near the mobile communication device, the mobile communication device may be automatically unlocked without the user having to input an unlock code. The mobile communication device may be automatically unlocked into a first mode having a first level of functionality. If the user inputs a correct unlock code, the mobile communication device may be unlocked into a second mode having a second level of functionality, greater than the first level of functionality.