Cell Phones
Digital Cameras
Contacto Us
Contacto Logo
Computer News

Free App Lets You Instantly Create Free
Conference Calls Anywhere on Earth

SAN FRANCISCO, California.- Socialdial, Inc. announced the release of CrowdCall, a new, free mobile app for both iPhone and Android that lets you instantly create free conference or group calls with up to 20 people anywhere on earth. Users simply select the people they want to include in their conference from their contacts list, touch the call button and everyone on the list is called and connected to a group call. You can include anyone in your contact list in the call, they don't need to have the app to participate. The free app can be downloaded at

"We wanted to make it easy for anyone to create a conference or group call right from their iPhone or Android phone," said Randy Adams, CEO of Socialdial, Inc. "It's great to connect with friends, family or business associates in a group call, but it has always been complicated and expensive to set up a call, especially from your phone. We are changing all that with CrowdCall, the easiest, free way to stay in touch. No dial-in numbers, no PIN codes to remember, just touch one button and everybody gets connected."

Instead of creating a dial-in number and PIN codes, CrowdCall simply calls everyone on the conference list when the user presses the call button. Participants receive a call from the user and simply answer and press the "1" key and are instantly connected to the conference. CrowdCall is ideal for families spread out across the world, especially for those with loved ones in military service abroad. CrowdCall is also great for connecting with your friends at any social event or to invite them over for a party. And of course CrowdCall is great for businesses interested in setting up a quick ad hoc conference call at a moments notice.

Socialdial offers CrowdCall free to everyone on iPhone and Android and is available in the Apple App Store and Android Market. The only cost incurred in using CrowdCall is a local call from the user to the CrowdCall server which simply uses local minutes on your phone plan.


Custom Search

Your Email:

Comments :


Home - Desktops - Laptops - Internet - Cell Phones - Digital Cameras

Printers - Scanners - Contact Us - Privacy -



Selecting the Right Laptops

Everyone wants the best for their money spent and a laptop purchase is not an exception. Laptops are very useful to people, as everyone is inclined towards leading a comfortable life. Hence, many prefer a laptop to a desktop computer due to the fact that laptops are easily portable and mobile. It makes the work faster and easier. The benefits got from the laptops are not restricted to businessmen, but can be availed by mothers working from home, research scholars, ordinary employees and students.

Email Marketing 101: 5 Important Rules To Follow

Email marketing is a powerful technology that can bring in sales and improve your online presence. Unfortunately, it also leaves lots of room for abuse. In order to avoid getting marked as a spammer and exiled to the bulk email file, follow these five important rules when crafting and sending an email marketing campaign:

Ten Ways to Write Great Blog Posts That Get Attention

Millions of blogs fight for readership online (over 75 million by some counts), with thousands more being created every day. Making yours stand above the rest may seem like a daunting task, but here are ten suggestions for making your blog posts stand out from the crowd.

Satellite Internet Compared to Dial-up

Internet connectivity across the country has been growing at a brisk pace and the FCC has taken steps to ensure that the Internet reaches the interiors of America. The different technologies used to provide Internet connections to customers include dial-up, broadband, cable modem, and DSL.

Internet Attack Methods

The U.S. Government’s National Information Assurance Glossary defines Information Security as: Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.

Computer Viruses

In information security , computer virus is a manmade program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. From behavior computer virus in a way is a similar biological virus which pervasions by inserting itself into living cells. Cell by cell and all organisms (computer) is ridden virus cells.
Without computer viruses there are separated two other types of malicious computer programs - viruses.