Mobile Technology
119.2K views | +1 today
Follow
Mobile Technology
Oportunidades de negocio y nuevas maneras de hacer - Business opportunities and new ways of doing things
Your new post is loading...
Your new post is loading...
Scooped by Jesús Hernández
Scoop.it!

7 Strategies That Are Transforming Mobile Apps | Marketing Technology Blog

7 Strategies That Are Transforming Mobile Apps | Marketing Technology Blog | Mobile Technology | Scoop.it

Just as every company is now a publisher (or should be) if they wish to have an effective digital strategy, I believe the next phase of growth will be that marketing departments of every company need to be involved in the development of mobile and/or tablet applications. If that doesn’t sound like a reality – I’ll provide an example.

We recently designed and developed a mobile application for engineers to use to make a plethora of different conversions for calculations they need to make daily. The company we built it for is a surface technology company. Does the application sell? No! That’s not the point – the point is to have the company’s name top of mind as engineers are working day to day. Greater brand awareness and click to contact calls to action enable them to take the next step. Immediately upon release, over 300 users in their industry downloaded the application and are utilizing it daily. It is a huge acquisition and retention win with a minimal investment.

more...
LaurentHinard's curator insight, February 23, 2015 8:43 AM

Last features and trends on Mobile 

Martine Coutu's curator insight, February 23, 2015 11:56 AM

Le département de marketing au centre du développement des applications mobiles. Comme les deux doigts de la main.

Hyker Security's curator insight, February 27, 2015 3:30 AM

Security and privacy will be critical in 2015. Otherwise, we will see a great backlash. Non-trust worthy apps mean non-trust worthy brands that people will abandon.

Rescooped by Jesús Hernández from digital marketing strategy
Scoop.it!

Apps, apps, apps: Who's winning and what's working on Google Play and iOS

Apps, apps, apps: Who's winning and what's working on Google Play and iOS | Mobile Technology | Scoop.it
App Annie released its May apps index this morning-- all apps minus games -- and the giants are doing well: Microsoft, Google, Apple, and Facebook are well-represented on the top publisher lists. B...

Via malek
more...
malek's curator insight, June 26, 2013 5:23 PM

Searching by country we have an issue, while the iOS app store is led by U.S. publishers (seven out of the top 10), Google Play is split evenly between the U.S. and other nations — five out of 10 are American publishers.

Scooped by Jesús Hernández
Scoop.it!

5 tips for building apps for Baby Boomers

5 tips for building apps for Baby Boomers | Mobile Technology | Scoop.it

Younger generations are the first to embrace new technologies, but Baby Boomers drive the real revenue. Here's how to develop apps that won't be trashed by this generation.

more...
corneja's curator insight, February 22, 2013 4:33 PM

"the more Boomers have to type, scroll, or zoom within an app, the less they will use it." The post explains how should be a Boomer friendly app.

Rescooped by Jesús Hernández from Public Relations & Social Marketing Insight
Scoop.it!

32% Of All Online Purchases Are Made With A Mobile Device

32% Of All Online Purchases Are Made With A Mobile Device | Mobile Technology | Scoop.it

No one can deny the rapid rate in which Mobile Commerce is growing.


A recent report from comScore showed that online retail spending had grown by 14% last year, while total consumer retail spending had only grown by single digits. At the moment, most online spending is still happening over desktop and laptop computers, but that is expected to change, and soon, according to recent data from the U.S. Census and other sources.


Mobile Online Spending is the Way of the Future.People might still be using their computers to buy online, but they won’t be for much longer. According to Digiday, commerce is one of the industries that will be most affected by growing mobile platforms. According to a forecast by Goldman Sachs, global e-commerce is expected to grow to $638 billion by 2018. Goldman also asserts that it will be tablets rather than smart phones that will be the primary source of online spending....


Via Jeff Domansky
more...
aanve's curator insight, April 18, 2014 10:49 PM

www.aanve.com

 

Ali Anani's curator insight, April 19, 2014 1:59 AM

Rapid change is disrupting the familiar purchasing habits

rodrick rajive lal's curator insight, April 20, 2014 11:56 PM

I guess few would deny how shopping has become more of an online activity with the mobile phone helping to make the experience more virtual!

Rescooped by Jesús Hernández from Mobile Application Solutions
Scoop.it!

Mobile Apps Security: Protecting Mobile Devices from Attack

Mobile Apps Security: Protecting Mobile Devices from Attack | Mobile Technology | Scoop.it

Researchers from two German Universities have examined 13,500 popular free apps downloaded from Google’s Play Market and have found that 1,074 (8.0%) have sensitive information such as log-in credentials and personal information/files that are vulnerable to attack.

Apps such as those from American Express, Diners Club, Paypal, bank accounts, Facebook, Twitter, Google, Yahoo, Microsoft Live ID, Box, WordPress, remote control servers, arbitrary email accounts, and IBM have been singled out as being vulnerable.

Mobile apps have emerged as a new cyber-crime attack vector for phishing and malware; we saw the same scenario with web browsers.

 

Read More: http://www.alegix.com/mobile-apps-security-protecting-mobile-devices-from-attack/

 

 


Via Igniva Solutions
more...
michael@orion-sas.co.uk's curator insight, September 23, 2016 5:34 AM
Applications by definition are hackable. Mobile phones are the weakest link in any organisation's or individual's cyber defence.

Applications demand permissions that the owner is often unaware of. For example, your contact list, cameraa voice recorder, emails etc. Why are they allowed to request such draconian permissions from the owner?

Sensitive information, personal data are sought by cyber criminals to sell on the dark web.

Cyber gangs set traps for organisations then sift through all the information they obtain to do with what they will.