Pages

Sunday, March 31, 2013

Why FacePhone and FaceDroid will fail


The latest rumours to surface is Facebook releasing its own smartphone..  
According to various different reports Facebook will introduce its own version of Android running on a phone with a ton of Facebook features. HTC is on board with Facebook and most likely offer "FaceDroid" on its phones. Facebook is reportidly looking for other manufacturers to join. As for further technical specifications not much is known.


Is this the latest sign of innovation?  
Nope, all Android and iOS phones come with Facebook baked into it. Whether it is chat, call, photo, poke or "Like It" it is available. 
The last time Facebook tried to enter the Smartphone market (with HTC ChaCha) it was not an experience to remember. The smartphone developed and manufactured by HTC flopped badly.


The Facebook name or brand alone simply is not going to drive people to buy a device based on its brand (Unlike Apple), especially Facebooks' trackrecord with its users privacy is doing the company not any favors. 

I just don't see the "FacePhone" on "FaceDroid" being any different from any other current smartphone. Only if Facebook is able to offer something completely new and innovative their FacePhone has a chance to succeed, so a powerfull camera is not going to cut it. 

Let me know what you think

Sunday, March 24, 2013

Why IPhone will survive the S4, N4, Z10 and others to come


Mcommerce Explorer Blog
With the launch of the Samsung Galaxy S4, HTC One, LG Nexus 4 and Blackberry Z10 a war against Apple's IPhone 5 seems to be declared. But is it really? On the surface it might seem this way, but the real motivation could be seen in a different light. That is what I am going to discuss today.

MCommerce Explorer Blog
A review of recently released smartphones showed that the Samsung Galaxy S4 indeed seems to fullfil its promise followed by HTC One. 
The Blackberry Z10 has a relatively low score, but is basically on par with IPhone 5. 
Interestingly enough the Galaxy S3 marginally outperforms the IPhone 5 and the Z10. 




Does the IPhone have a future?
The IPhone 5 is far from dead. The results published in the review by Primatelabs need to be looked at with a bit of nuance. The IPhone 5 has been on the market since 6 going 7 months, therefore the comparison with the Galaxy S4, HTC One and LG Nexus 4 are not reflecting its actual capabilities.  The S4, One and Nexus 4 all operate on 4 core hardware whilste the 5 is operating on 2 cores (with an operating 2,5 times faster than the IPhone 4S). If you take the release date of the IPhone 5 and benchmark it with phones released in a simular period it suddenly jumps  in ranking to #2 behind the Samsung Galaxy S3. 

What has the Galaxy S4 to offer that the IPhone 5 has not?

Thursday, March 14, 2013

5 Reasons Why Chrome OS fusing with Android is Good!

My previous posts were mostly about security concern and the rise of wearable devices. 
In this post I discuss a "minor" staff change at Google and how it relates to the Android OS and why it can be seen as sign of strategic change in Google's approach

This week saw Google reveals its future mobile ambitions by replacing long serving Andy Rubin (head of Google Mobile Android Division since 2004) by Sundar Pinchai, who is currently head of Google Chrome's department and has been responsible for the browsers' meteoric rise in the last 4 years. 
In practice this means that Mr. Pinchai will be heading both Google Chrome and Google Apps. Losely translating this means that Chrome will is preparing for the moment that Android (Mobile Devices) and Chrome (PC/Desktop) will become one. 

1. What is Google aiming for? 

At current Google is not charging any of the companies deploying Andriod in Mobile Devices. Instead Google is earning on the applications that run on Andriod via its Play Store. Google is making money with the Advertising campaigns targeting Andriod.  By merging Andriod OS and Chrome OS Google creates a potentially massive new revenue base.


2. What did the "Chromebook Pixel" do? 

The release of Google's "Chromebook Pixel" laptop, which provides a superb browsing experience and native intergration with Google's Cloud Service, demonstrated its inability too rival both the Windows and MAC Operating Systems. Basically all that you expect from a cheap laptop
As reviews showed: it was not a greatly celebrated success and that is an understatement. But not to fear, Google is here. Turning a bad experience into a usefull one!

3. What makes Android so interesting?

Saturday, March 9, 2013

6 Smart Watches to keep your eye on!


MCommerce Explorer Blog
Analysts forecast that the market for wearable computing devices will near half a billionunits sales per annum within the next 5 years

Both link in well with their end-users and operate on sophisticated technology to operate and synchronize with your mobile devices. 

The future  has more in store for us, with the highly anticipated releases of Apple's 

I-Watch and Google's Project Glass. 
In this blog I want to do something else. Listed are 6 wearable (why do I want say portable) devices and I would like you to rate them! Simple, fun and not too exhausting. 
I am not affiliated to any of the producers of these products, so I don't make any money out of it. 
The best known wearable computing devices at the moment are:

1.Lark Watch: This device awakens sleepers quietly and gently. It measures and analyzes the user’s sleep, evaluates sleep patterns with assessments, and coaches users about how to improve their sleep experience based on their sleep type. 




2.WIMM Watch: WIMM One is the world’s first Android watch capable of running lots of custom apps, synchronizing with a user’s smartphone, and gathering the latest news and headlines from the web using its Wi-Fi connection. It has a small form factor, a color touch screen, Internet connectivity, and a custom app store. 




3.I’m Watch: The first smartwatch — has everything your smartphone has. The I’M Watch has a 1.55-inch touch screen, Bluetooth tethering, and a 4GB memory card. The graphical user interface is minimal, clean, user friendly, and iPhone (plus other smartphones) compatible. High-resolution display has water resistant surface and screen similar to the iPod nano.






Tuesday, March 5, 2013

Marketeers wake up! MMS/SMS campaign is the most effective way!

www.MCommerce-Explorer.com
image: besttextmarketing.com
Download PC Games Now @ OnePlay.com!
Most marketing people try to convince me that SMS marketing is dead, not done, to complicated, to many regulations. I don't agree.  
Where SMS Messaging is becoming pretty much the 1980's typewriter vs Commador 64, MMS offers exactly the same service only it is empowered by the Graphical User Interface on almost all mobile devices and increasing volumes of mobile user. This makes MMS perfect to market anything! It actually makes a marketeer's job easier! MMS enables you to add pictures and videos of products and services. 


A 2009 study on marketings techniques concluded that:
"Mobile text messaging, the same 160-character dispatches first popularized by nimble-fingered teenagers, may be the closest thing in the information-overloaded digital marketing world to a guaranteed read." 
Some simple stats prove the point:
1. 97% of all marketing messages are opened (email marketing dreams of that rate)
2. 83% of all marketing messages are opened within 60 minutes of receiving
3. 95% of opted into a text message opened and read within 3 minutes

I am no super marketeer, nor a wizz kid, but 95% is fantastic rate, if only 95% of my page hits would read my blog... I would be bathing in internet sunshine.



MMS is basically created the likes of Instagram and Pinterest, where would they be without graphics uploaded directly from mobile devices? 

When it comes to SMS and MMS marketing we all have experience with these dreaded messages making us think our phones are infected with "Mobile Herpes", but those are bad industry practices. In fact SMS/MMS Marketing is highly regulated (especially in the US). 
As long as you stay within the rules of the law MMS offers M-Commerce an unbelievable platform. 

Want to know more?  Go to this section of my blog to download it or get "The 2013 Guide to TXT messaging regulations & best practices" here by Mogreet 

Thanks for reading again, PLEASE LEAVE YOUR COMMENTS! I really like to hear what you have to say about it!

Monday, March 4, 2013

5 Basics Principles To Enter M-Commerce

If you have been reading my blog, you know of the fast learning curve I was and still am going through. From "E-Commerce Virgin" to M-Commerce Fan in 90 days. 
All jokes aside. I have now aquired my own webdomains, going through SEO, affiliate marketing (what a lot of garbage in that section), Analysis etc. 
Suddenly I realized that by doing so I almost overlooked my check-list of basics I put together a couple of weeks ago. 

Because you insist I'll share them with you


5 Basics to enter M-Commerce:

Saturday, March 2, 2013

StormFly: One to Watch or Not

In  a nutshell: StormFly is a super-fast storage device with an Open Source Operating System (bootable in most modern PC's and Macs and powered by our smart-boot technology) embedded in a cool wristband. Inserted into any computer and rebooted, the computer runs directly from the Operating System that is on StormFly, allowing you to take your Operating System and critical data with you wherever you go and use it in whatever PC or Mac is available.
The company recently launched a Kickstarter campaign hoping to raise $100,000 in crowd-funding to go from prototype to ship-worthy bracelet, and that goal was achieved.

You can watch the demonstration of the prototype here

What makes StormFly different from a USB stuck on a wristband? 
1. It is an encrypted storage device (USB 3.0) and operating system in one (PC/MAC)
2. It backs up automatically losing it would not be the end of the world
Even with the above stated it is not so much an innovative product, it will provide a unique feature to the mainstream public with it's encrypted, autobackup feature and it correctly targets the mainstream public.  
One other possible challenge it realized it has is the fact that StormFly is operating on a Linux Operating System. LOS will "take over" any MAC or PC hardware during the bootprocess. Technically whatever software a machine is running on. StormFly's challenge lays in the hardware, can it communicate with a wide range of different hardware (LAN, Graphic, Wifi, etc).
 Stormfly sets itself a target of usability of 90% of PC's and MAC's sold over the last three years and it recognizes the challenge to keep up with rapidly changing Software and Hardware developments
My opinion:
Stormfly is targeting a market of PC's and MAC's which is shrinking. Tablets sales are about to pass PC's and MAC's. Does StormFly expect to expand into those markets? If not, it could be a great add-on to Tablets and Smartphones, but unlike these devices Stormfly does not come with a screen..
All-in-All however much I like the buzz surrounding StormFly I am not sure it will be around for long. Given the rapid changing technology environment I have trouble seeing them in the future. 
Still great to see Kickstarter.com work its magic! 

10 Basic Security Steps for Smartphones and Tablets




My previous blog listed the 5 main Mobile security threats for 2013. In this blog I will provide you with 10 basic steps to assure your (new) smartphone or tablets meets the minimum security features. Some of these seem so simple and obvious, that I never paid attention them, makes sense right?! Some of the steps are human behaviour others relate to generic technical knowledge. 



1. Secure it: 
Many of us still don’t secure our devices, by not using a PIN or passcode. Simple, effective and at least it protects you from anyone who gets hold of it to access and use it. 

2. Create a Back Up:
Whether you lose your phone or it gets stolen we all know that it feels like you lost the most important thing in your life. It happened to me in Moscow. I had no backups and felt completely lost! Create a back up!

3. Note Your IMEI: 
IMEI is your unique 15-digit number that identifies your phone. You can find it beneath the battery or alongside a SIM card slot. The number provides Law Enforcement Agencies and sites like EBay.com a way to identify your phone (if it is put up for sale in an auction or brought into a Police station). The number will confirm your ownership! Note it down and store it somewhere safe too you!

4. Security software (Anti-Vius): 
We all know and most of us use Anti-Virus. Additionally such packages offer features like device tracking, remote lock and wipe, anti-phishing protection. Interested? CLICKHERE to go to the 2013 Top 10 Mobile Security Software review. Money well spend!! 

5. Tracking: 
Accurate to a number of metres, modern tracking software is included in the best mobile security offerings, but is also built in to certain mobile platforms. Windows Phone's 'Find My Phone' and iOS' 'Find My iPhone' options should always be activated on devices. It uses tracking software using the phone's built-in data connection. CLICK HERE for the TOP 10 TRACKING Mobile Software. Get Familiar with your phones' capabilities! 

6Verify Your Monthly Phone Bill: 
Make sure you verify your monthly statement, due to certain malware (read my previous blog) that will make use of your device. If you spot it any strange amounts on your statement immediately contact you service provider. It might take you a bit of time, but will save you money!

7. Smart Surfing: 
The most secure data connection you should use on a Mobile Device is provided by your Mobile Provider. Free WIFI-Hot Spots are pose an increased security risk, best is verify if the WIFI-Hotspot provides a secure channel. Be Aware but not affraid!

8. Be Aware of specific threats: 
Especially Andriod operated systems will be targeted in 2013 (as described in my previous blog, boy it gets boring), but if you own a mobile device operating on Windows or Apple's IOS the security risks are more or less the same as with an Android operated Mobile Device!!! Try to follow the latest developments for instance on twitter or via newsletters from your security or mobile provider!

9. Check BYOD Policies
If you use your device at work, over a company network, or for anything related to work, be sure to ask your IT department for any mobile use policies. It might be that your employer requires some control of the work data you have on your device, or may ask you to abide by certain practices. BYOD is basically a two-way relationship: it provides the employee and increased flexibility and mobility which benefits the employer. Verify how it impacts you as a user and how it impacts your employer or employees!

10. Treat your mobile device like you wallet, mind it carefully!
 Don't leave your device unattended whilst going to the bathroom or chatting to somebody at a conference! 

The 10 basic security steps for a new (or already operating) Mobile Device are shockingly easy, but how many of the above boxes can you tick as "Done"?

Link to this post: http://mcommerce-explorer.blogspot.com/2013/03/10-basic-security-steps-for-smartphones.html#links

Friday, March 1, 2013

Top 5 Mobile Security Threats 2013



Today I will expand further on Security threat for specifically mobile devices using Andriod's Operating System.

A quick refresher from my last blog where I discussed the most likely security threats for anybody using a mobile device (Smartphone or Tablet)
- Toll Fraud
- Ransomware
- Bring Your Own Devices (BYOD)
- "Drive-by Exploits"
- Mobile Payments via NFC

TOLL FRAUD:
(SMS Text)  Everybody with a mobile or smartphone receives txt message like "Text 3030 to get your daily weather forecast on your phone" you want it? You text back the number and you receive your daily weather forecast.
This is called PREMIUM SMS as in this figure >>>>>>






Toll Fraud occurs as displayed in the below graph. It is successfull and it happens to more and more users
1A customer downloads an app that sends out an SMS message to that same ringtone provider.
2. The ringtone provider sends the confirmation message, but instead of reaching the smartphone owner, the malware blocks and confirms the text message before the user ever knows.
3. The malware writers further jumps in between the wireless carrier and the ringtone provider, pretending to be an aggregator, and collects the money you just paid through your bill. 


Ransomware:

What is Ransomware? Ransomware traditionally would infect PC's (via a trojan) and demand a ransom to unlock.  For Hackers it is a proven business model on pc's and now has set its sights on Mobile Devices Users.