SlideShare a Scribd company logo
1 of 63
[object Object],[object Object],[object Object],[object Object],[object Object]
AMF Ventures  provides professional consulting  services  that  will  enable  your enterprise to build returns within the constraints of   1.0 and be ready to exploit opportunities  created by   2.0 thinking and beyond….
Our deliverables assist you in the move from separation, isolation and solitude   to  relationship, engagement and conversation.
Handset Survey Results Many thanks to Margaret Gold of Gold Mobile  Innovation for the creation of this analysis
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How important is it for an application, or a user, to be able to request Quality of Service? The majority of respondents believe that it is important or very important for the application, or a user, to be able to request Quality of Service.
How important is IMS (IP Multimedia Subsystems architecture) to bring about better mobile data services?  The importance of the IMS to bring about better mobile data services is seen to be important to moderately important.
How important is it to communicate to the network the use/type of IP data, to allow for differential charging? The majority of respondents believe that it is important to communicate to the network the use/type of IP data, to allow for differential charging.
How important is it to identify the applications that seek access to the network? The majority of respondents believe that it is important or very important to identify the applications that seek access to the network.
How important is the need for a ‘connection manager’ function in the handset to be able to control and monitor network access? Most respondents believe that it is important to moderately important for a ‘connection manager’ function in the handset to be able to control and monitor network access.
How important is it for the following to be able to stop installation, disable or force the removal of applications? Network Operator User Handset Manufacturer The majority of respondents believe that it is much more important for the user to be able to stop installation, disable or force the removal of applications, than the Network Operator (moderately important) or the Handset Manufacturer (of little importance).
How important is it for the Network Operator to be able to stop installation, disable or force the removal of applications? Marketing / Commercial Technical The “Technical” respondents were more likely to find it only moderately important that the Network Operator is able to stop installation, disable or force the removal of applications.
How important is application policing in the following forms? Signed White-listed Black-listed The Survey results indicate that it is more important for application policing to be achieved via Signing and Black-listing, then by White-listing.
Marketing / Commercial How important is application policing in the form of Whitelisting? Technical The “Marketing / Commercial” respondents were more likely to find Whitelisting an important form of application policing. A similar difference exists with respect to Blacklisting.
How important is the role of revocation by a relevant authority (eg network operator)? The majority of respondents believe that the role of revocation by a relevant authority, such as the network operator, is important to moderately important. “Technical” respondents were more likely to find this only moderately important.
For revocation, should the user be: The majority of respondents believe that the user should be suggested to allow revocation, i.e. that the user should have a choice.
Are you aware of UICC capabilities (other than the SIM)?  Most respondents are not aware of the UICC capabilities (other than the SIM), and of those who did, only a very small number are actively developing them.
How important is it to have access to the following SIM / UICC capabilities? High Speed Interface Smart Card Web Server Near Field Communications The Survey results indicate that a High Speed Interface is the most important SIM/UICC capability to have access to, but that a Smart Card Web Server and Near Field Communications are also important.
Marketing / Commercial Technical The Technical respondents were more likely to find it very important that there be access to the Smart Card Web Server. A similar difference exists with respect to the importance of Near Field Communication. This is the largest difference between Technical and Marketing / Commercial How important is it to have access to the Smart Card Web Server?
A number of other SIM / UICC capabilities were indicated, which are considered to be important or very important by those who specified them. N.B.  Only 55 respondents answered this question, primarily in a “Technical” function How important is it to have access to other SIM / UICC capabilities ?
What other SIM / UICC capabilities is it important to have access to? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How much is application development and deployment today made difficult by:  “ Technical” respondents found both slightly less difficult. Lack of SIM / UICC interface standards? Fragmented device APIs? The respondents considered Fragmented device APIs to be a much greater difficulty than lack of SIM / UICC interface standards with regards to application development and deployment.
The browser is today the main application execution environment for the handset.  There is an even divide between those who agree and disagree on whether the browser is the main application execution environment for the handset.
The browser is today the main application execution environment for the handset.  Although there is no significant difference in opinion based on main job function or country, OS Developers predominantly disagree and Telecom Operators & Consultants are more inclined to agree that the browser is the main development environment.  OS Developers Telecom Operators
The browser will be the main application execution environment for the handset in the near future (in the next 1-3 years) Most respondents agree that the the browser will be the main application execution environment for the handset in the near future (although the 8 OS Developers continue to disagree)
To become the main application execution environment, the mobile browser will need a standards-based interface to access handset resident functions and data: telephony, messaging, contacts, local storage, SIM/UICC etc. The majority of respondents agree or strongly agree that a standards-based interface will be necessary for the mobile browser to become the main application execution environment.
The browser must support hyperlink access to the main network services (eg voice call, SMS) which are working in a secure environment. The respondents overwhelmingly agree or strongly agree that the browser must support hyperlink access to the main network services which are working in a secure environment. (Slightly more “Marketing / Commercial” respondents were undecided.)
The browser must support hyperlink access to other applications which may be running in another non-secure execution environment.  The respondents largely agree that the browser must support hyperlink access to other applications which may be running in another non-secure environment.
A successful mobile handset browser will need to support a range of mark-up languages and scripting standards.  The respondents overwhelmingly agree or strongly agree that the successful mobile handself browser will need to support a range of mark-up languages and scripting standards.
The large growth and use of proprietary (ie non-standard) APIs for mobile handset browsers threatens the wider acceptance of browsers as the main application execution environment. The majority of respondents agree or strongly agree that the use of proprietary APIs threatens the wider acceptance of browsers as the main application execution environment.
OMA dynamic content delivery (DCD) has a key role to play as a mobile handset  browser enabler. Although more than half of the respondents are undecided, most of the remaining half agree that OMA DCD has a key role to play as a mobile handset browser enabler.  ( Slightly more “Marketing / Commercial” respondents were undecided.)
The mobile handset browser must be able to receive asynchronous ‘push’ data.  The majority of respondents agree or strongly agree that the handset browser must be able to receive asynchronous ‘push’ data. (Slightly more “Marketing / Commercial” respondents were more likely to strongly agree.)
How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers:  The size of screen/number of pixels The media codecs supported by the handset Both the detection of the size of screen / number of pixels and the media codecs supported by the handset are considered by the vast majority of the respondents to be very important or important.
How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers:  The radio capabilities of the handset The Bluetooth profiles supported by the handset Respondents find it less important, but nonetheless important, that the radio capabilites and the Bluetooth profiles supported by the handset can be detected. (“Technical” respondents found radio capabilities & Bluetooth more important than “Marketing / Commercial” respondents.)
How important is it for a relevant application to be able to detect the capability of other hardware enablers? A large number of other relevant hardware enablers were indicated, which are considered to be very important by the respondents who specified them.  N.B.  Only 70 respondents answered this question, primarily “Technical”
What other hardware enablers is it important (VI, I, MI) for a relevant application to be able to detect the capability of? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What other hardware enablers is it important (VI, I, MI) for a relevant application to be able to detect the capability of? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How important is it for a relevant application to be able to detect the capability of each of the following software enablers:  The respondents find it very important that the capabilities of the browser can be detected, and important to very important that the capabilities of the IMS subsystem can be detected.  The capabilities of the browser   The capabilities of the IMS subsystem
How important is it for a relevant application to be able to detect the capability of each of the following software enablers:  Most respondents find it important that the capabilities of other 3 rd  party software, and the details of the relevant certificates present on the device can be detected. (“Technical” respondents were more likely to find certificates of little importance.) The capabilities of any other 3rd party software capabilities that have been added to the handset Details of the relevant certificates present on the device
How important is it for a relevant application to be able to detect the capability of other software enablers? N.B.  Only 37 respondents answered this question A number of other relevant software enablers were indicated, which are considered to be very important, moderately important or important by the respondents who specified them.
What other software enablers is it important (VI,I,MI) for a relevant application to be able to detect the capability of? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How important is it for a relevant application to be able to detect the capability of other applications?  Uniquely identify each application Identify the capabilities of the application Identify the dependencies of the application  Most respondents believe that it is equally important to moderately important for a relevant application to uniquely identify other applications, their capabilities and their dependencies.
Marketing / Commercial Technical The “Technical” respondents were more likely to find it very important, but also only moderately important that a relevant application can identify the dependencies of other applications. How important is it is it for a relevant application to be able to identify the dependencies of other applications?
How important is it for a relevant application to be able to detect the capability of other applications:  N.B.  Only 37 respondents answered this question, primarily “Technical” A number of other relevant software enablers were indicated, and the respondents who specified other capabilities largely considered them to be  very important, moderately important or important.
What other application capabilities is it important (VI,I,MI) for a relevant application to be able to detect the capability of in other applications? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine whether the handset is open or closed, is being used in landscape or portrait mode, and whether an external device is connected or removed. (“Technical” respondents were more likely to find all three very important.) Whether the handset is open or closed Whether the handset is being used/held in landscape or portrait mode When an external device is connected or removed
How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine when a new enabler or application added, what the battery status is, and what the available processing power is. (“Technical” respondents found processing power more important than “Marketing / Commercial” respondents.) When a new enabler or application is added  Battery status Available processing power
How important is it for a relevant application to be able to determine other transient features? N.B.  Only 46 respondents answered this question A number of other transient features were indicated, which were considered to be very important or important by those who specified them.
What other transient features is it important (VI,I,MI) for a relevant application to be able to determine? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What other transient features is it important (VI,I,MI) for a relevant application to be able to determine? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Very important, important or moderately important
How important is it to allow management of handset features over the network (eg remote disabling/enabling of a feature)? The majority of respondents believe that it is very important or important to allow management of handset features over the network.
Network Related Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policing Related Conclusions ,[object Object],[object Object],[object Object]
UICC & Sim Related Conclusions ,[object Object],[object Object],[object Object]
Browser Related Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Browser Related Conclusions (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Detection Related Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Technical / Marketing Bias ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical / Marketing Bias (2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
AMF Ventures organises a range of public forums where the cross-pollination of idea from debate allows professional, in different sectors of the digital value chain, to formulate and refine strategy.  A key part of our service is adding value to a strategy away day or internal conferences. AMF Ventures’ team members are experts in presenting, chairing and leading debate.  Where needed, we complement our internal expertise by drawing on a wide range of professionals from our extensive network. Public Forum Seminars & Debate AMF Ventures arranges private events bringing together executives and experts to discuss and debate key industry trends. These sessions provide senior management with the opportunity to grow their personal networks and to hear from those who are radical thinking in the industry. Executive who value opinion free from internal bias, appreciate our regular ‘one–on-one’ sessions and team briefings.  These sessions are a focussed way for  decision makers to spot trends on the horizon. Connecting Executive   Briefings AMF Ventures provides knowledge-based services on the developments and implications of operating in a converged 2.0 world. AMF Ventures works for Technology, Media and Telecommunications companies who are considering a global readership and are discovering how to derive value from next generation networks and devices. Our Products  Knowledge
With few exceptions, exit planning is perhaps the most difficult period for any CEO. Research shows that many owner/ managers fail to successfully achieve the transition successfully - and do not receive their expected value.  AMF Ventures understands the boundaries and expectations and is able to advise and implement an exit. AMF Venture has wide experience in the sourcing of key partners to support the strategic vision.  We understand how to establish a workable structure, negotiate terms, repair and rebuild broken agreements, and conduct partner diligence to provide a matching of culture and delivery capability.  Exit planning Partnerships Positioning in a dynamic market is complex. AMF Ventures is able to bring tools and experience that will boost your strategy team.  We identify partners and competitors inside and outside of your sector. We deliver risk management scenarios taking a wide-ranging view of competition, technology and market evolution. Classic consulting and advisory support.  We engage with your organisation to create wealth from idea conception to exit. Our experts will work along side you, within your framework, to deliver a strategy that creates shareholder value. Competitive landscape Business strategy AMF Ventures has a proven and stable team of experts available for short or long term work.  Our core team is supported by a network of partners and independent associates.  Our Products Strategy
Debating technologies and standards with AMF Ventures’ experts, is a practical means of helping to determine the risks and benefits associated with technology choice.  AMF Ventures has helped debate the benefits of:- i. platforms and API’s with operators; ii. software with system designers; iii. handset OS with manufactures, and;  iv. SDK’s with developers.  Technology decisions Turning initial traction into sustainable market momentum requires a balance between tactical and strategic activities. Sales teams that focus only on short-term, tactical revenue opportunities do not lay the sales foundation for longer-term program. Conversely, teams that focus on strategic programmes at the expense of tactical revenue fail to deliver sufficient results soon enough to justify further investment.  AMF Ventures can help find the right balance between short-term tactical needs and the longer-term strategic requirements by delivering sales opportunities and sales management. AMF Ventures can delivers a team who will provide hands on delivery, tactical assistance, project management or planning support. We are able to supplement our interim management team from our professional associate network to deliver skilled individuals on a short or long term basis. Tactical revenue Team Support Our team can help you address strategic and tactical implementation projects.  Our team is based in London, with partner companies in Germany, France, Spain, Italy, Holland, Japan and USA. Our Products Implementation
Diligence requires a deep understanding of the business and the role the business fulfils in the value chain.  AMF Ventures is able to act for:- i. an investor seeking to place capital; ii. a purchaser looking to acquire assets or a going concern, and; iii. a seller who wishes to dispose of a business or profit and loss account. Diligence The impact of the decisions made from a financial model is immense.  Potential investors, founders and management all see the model from different perspectives and with different motivations.  AMF Ventures is able to build or validate a detailed financial model, challenge or confirm the assumptions in the model and provide a judgement about the strength of the approach and scenario sensitivity.  AMF Ventures provides an independent external viewpoint and helps develop an investment model. We also provide realistic budgeting and a monthly management reporting tools suited to your business. AMF Ventures is able to provide opinion on company structure and the different types and sources of funding. We are able to advise on clauses, terms and implications, whether a shareholders’ agreement. Financial modelling Structure If the team is critical, and funding is essential, then getting the right structure is crucial. Managing the expectations is the indispensable role AMF Ventures brings to the funding and structuring process. Our Products Funding

More Related Content

What's hot

The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organizationChris Pepin
 
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...sadi ranson
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Beyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesBeyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesDave Olsen
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseAnyPresence
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
Ab113 Complied[1]
Ab113 Complied[1]Ab113 Complied[1]
Ab113 Complied[1]Darren Yuen
 
Facial Recognition Technology Market Research Report
Facial Recognition Technology Market Research ReportFacial Recognition Technology Market Research Report
Facial Recognition Technology Market Research ReportVIA Embedded
 
Ericsson ConsumerLab: Smartphone Usage Experience Report
Ericsson ConsumerLab: Smartphone Usage Experience ReportEricsson ConsumerLab: Smartphone Usage Experience Report
Ericsson ConsumerLab: Smartphone Usage Experience ReportEricsson
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphonesAlexander Decker
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessKloudData Inc
 

What's hot (20)

CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...
Verizon's Iobi Enterprise Lets Businesses Link Voice And Messaging Services T...
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Beyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & ServicesBeyond the iPhone: Delivering Mobile Content & Services
Beyond the iPhone: Delivering Mobile Content & Services
 
Mobility and the Real-Time Enterprise
Mobility and the Real-Time EnterpriseMobility and the Real-Time Enterprise
Mobility and the Real-Time Enterprise
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Ab113 Complied[1]
Ab113 Complied[1]Ab113 Complied[1]
Ab113 Complied[1]
 
Facial Recognition Technology Market Research Report
Facial Recognition Technology Market Research ReportFacial Recognition Technology Market Research Report
Facial Recognition Technology Market Research Report
 
Ericsson ConsumerLab: Smartphone Usage Experience Report
Ericsson ConsumerLab: Smartphone Usage Experience ReportEricsson ConsumerLab: Smartphone Usage Experience Report
Ericsson ConsumerLab: Smartphone Usage Experience Report
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
Three main pain points from today’s smartphones
Three main pain points from today’s smartphonesThree main pain points from today’s smartphones
Three main pain points from today’s smartphones
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
State Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile ReadinessState Enterprise Advantages and Disadvantages | Mobile Readiness
State Enterprise Advantages and Disadvantages | Mobile Readiness
 
Cti av3
Cti av3Cti av3
Cti av3
 

Viewers also liked

Fundamentals of sdh
Fundamentals of sdhFundamentals of sdh
Fundamentals of sdhsreejithkt
 
Theories and Concepts of town planning
Theories and Concepts of town planningTheories and Concepts of town planning
Theories and Concepts of town planningSrishti Mehta
 
Urban planning presentation 01
Urban planning presentation 01Urban planning presentation 01
Urban planning presentation 01Halima A. Othman
 
Introduction to town planning
Introduction to town planningIntroduction to town planning
Introduction to town planningctlachu
 
Planning concepts
Planning conceptsPlanning concepts
Planning conceptsctlachu
 
Land use planning
Land use planningLand use planning
Land use planningTin Lagman
 
Urban Planning theories and models
Urban Planning theories and modelsUrban Planning theories and models
Urban Planning theories and modelsGeofrey Yator
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal WritingTony
 

Viewers also liked (13)

Publishing Houses
Publishing HousesPublishing Houses
Publishing Houses
 
New venture analysis
New venture analysisNew venture analysis
New venture analysis
 
PrasadRealties
PrasadRealtiesPrasadRealties
PrasadRealties
 
CONNECTKaro 2015 - Land Management For Smart Cities - Gujarat
CONNECTKaro 2015 - Land Management For Smart Cities - GujaratCONNECTKaro 2015 - Land Management For Smart Cities - Gujarat
CONNECTKaro 2015 - Land Management For Smart Cities - Gujarat
 
Fundamentals of sdh
Fundamentals of sdhFundamentals of sdh
Fundamentals of sdh
 
Theories and Concepts of town planning
Theories and Concepts of town planningTheories and Concepts of town planning
Theories and Concepts of town planning
 
Urban planning presentation 01
Urban planning presentation 01Urban planning presentation 01
Urban planning presentation 01
 
Introduction to town planning
Introduction to town planningIntroduction to town planning
Introduction to town planning
 
Planning concepts
Planning conceptsPlanning concepts
Planning concepts
 
Land use planning
Land use planningLand use planning
Land use planning
 
Project proposal
Project proposalProject proposal
Project proposal
 
Urban Planning theories and models
Urban Planning theories and modelsUrban Planning theories and models
Urban Planning theories and models
 
10 Project Proposal Writing
10 Project Proposal Writing10 Project Proposal Writing
10 Project Proposal Writing
 

Similar to Amf Ventures Survey Results

State of 4G Apps Development 2014: Trends, Challenges, Solutions
State of 4G Apps Development 2014: Trends, Challenges, Solutions State of 4G Apps Development 2014: Trends, Challenges, Solutions
State of 4G Apps Development 2014: Trends, Challenges, Solutions Intersog
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)Motorola Solutions
 
Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...JTOX
 
How to maximize mobile website & app ROI
How to maximize mobile website & app ROIHow to maximize mobile website & app ROI
How to maximize mobile website & app ROICompuware APM
 
A Brief Study on Usability Principles of Mobile Commerce
A Brief Study on Usability Principles of Mobile CommerceA Brief Study on Usability Principles of Mobile Commerce
A Brief Study on Usability Principles of Mobile Commerceijceronline
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry AnalysisRAJEEV RANJAN
 
Whitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationWhitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationBroadSoft
 
Economic Value Validation by ESG
Economic Value Validation by ESGEconomic Value Validation by ESG
Economic Value Validation by ESGAerohive Networks
 
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...Aerohive Networks
 
Economic Value Validation: Aerohive's Controller-less Wireless Architecture
Economic Value Validation: Aerohive's Controller-less Wireless Architecture Economic Value Validation: Aerohive's Controller-less Wireless Architecture
Economic Value Validation: Aerohive's Controller-less Wireless Architecture Aerohive Networks
 
Blackberry - Scenario Analysis
Blackberry - Scenario AnalysisBlackberry - Scenario Analysis
Blackberry - Scenario AnalysisMurali Erraguntala
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Hepto Software Company
 
The Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer BehaviorThe Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer BehaviorJames Burnes
 
Adopting enterprise mobility using Smartphones
Adopting enterprise mobility using SmartphonesAdopting enterprise mobility using Smartphones
Adopting enterprise mobility using SmartphonesLalatendu Das
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 

Similar to Amf Ventures Survey Results (20)

State of 4G Apps Development 2014: Trends, Challenges, Solutions
State of 4G Apps Development 2014: Trends, Challenges, Solutions State of 4G Apps Development 2014: Trends, Challenges, Solutions
State of 4G Apps Development 2014: Trends, Challenges, Solutions
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...Increasing effectiveness, efficiency & mobility of field employees with wirel...
Increasing effectiveness, efficiency & mobility of field employees with wirel...
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Roadmap 1 12-02
Roadmap 1 12-02Roadmap 1 12-02
Roadmap 1 12-02
 
How to maximize mobile website & app ROI
How to maximize mobile website & app ROIHow to maximize mobile website & app ROI
How to maximize mobile website & app ROI
 
Mobile-Applications-Testing
Mobile-Applications-TestingMobile-Applications-Testing
Mobile-Applications-Testing
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
A Brief Study on Usability Principles of Mobile Commerce
A Brief Study on Usability Principles of Mobile CommerceA Brief Study on Usability Principles of Mobile Commerce
A Brief Study on Usability Principles of Mobile Commerce
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry Analysis
 
Whitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to MonetizationWhitepaper: From LTE Network Launch to Monetization
Whitepaper: From LTE Network Launch to Monetization
 
Economic Value Validation by ESG
Economic Value Validation by ESGEconomic Value Validation by ESG
Economic Value Validation by ESG
 
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
Economic Value Validation: Aerohive Controller-less Wireless Architecture, by...
 
Economic Value Validation: Aerohive's Controller-less Wireless Architecture
Economic Value Validation: Aerohive's Controller-less Wireless Architecture Economic Value Validation: Aerohive's Controller-less Wireless Architecture
Economic Value Validation: Aerohive's Controller-less Wireless Architecture
 
Blackberry - Scenario Analysis
Blackberry - Scenario AnalysisBlackberry - Scenario Analysis
Blackberry - Scenario Analysis
 
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
Top Mobile App Trends Changing Technology and Evolution of Customer's Expecta...
 
The Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer BehaviorThe Mobile Shift: How Mobile is Changing Consumer Behavior
The Mobile Shift: How Mobile is Changing Consumer Behavior
 
Adopting enterprise mobility using Smartphones
Adopting enterprise mobility using SmartphonesAdopting enterprise mobility using Smartphones
Adopting enterprise mobility using Smartphones
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 

More from Tony Fish

The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent Tony Fish
 
Big Data.... and digital footprint
Big Data.... and digital footprintBig Data.... and digital footprint
Big Data.... and digital footprintTony Fish
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish
 
Loyalty world
Loyalty world Loyalty world
Loyalty world Tony Fish
 
managing entrepreneurial teams
managing entrepreneurial teamsmanaging entrepreneurial teams
managing entrepreneurial teamsTony Fish
 
Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Tony Fish
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital youTony Fish
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital AgeTony Fish
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?Tony Fish
 
New rules for living in a digital age
New rules for living in a digital ageNew rules for living in a digital age
New rules for living in a digital ageTony Fish
 
Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeTony Fish
 
Mobile, Mobile, Data
Mobile, Mobile, DataMobile, Mobile, Data
Mobile, Mobile, DataTony Fish
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Tony Fish
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?Tony Fish
 
Tony Fish Canto Slideshare
Tony Fish Canto   SlideshareTony Fish Canto   Slideshare
Tony Fish Canto SlideshareTony Fish
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital FootprintTony Fish
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009Tony Fish
 

More from Tony Fish (20)

Uniliever
UnilieverUniliever
Uniliever
 
The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent The future of Content management when the mobile Broadcasts Intent
The future of Content management when the mobile Broadcasts Intent
 
Big Data
Big Data Big Data
Big Data
 
Big Data.... and digital footprint
Big Data.... and digital footprintBig Data.... and digital footprint
Big Data.... and digital footprint
 
Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12Tony Fish Digital ID Shoreditch #ds12
Tony Fish Digital ID Shoreditch #ds12
 
Loyalty world
Loyalty world Loyalty world
Loyalty world
 
managing entrepreneurial teams
managing entrepreneurial teamsmanaging entrepreneurial teams
managing entrepreneurial teams
 
Managing Entrepreneurial Teams
Managing Entrepreneurial Teams Managing Entrepreneurial Teams
Managing Entrepreneurial Teams
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
Who is the digital you
Who is the digital youWho is the digital you
Who is the digital you
 
33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age33 New Social Rules for Living in a Digital Age
33 New Social Rules for Living in a Digital Age
 
Who is the digital you?
Who is the digital you?Who is the digital you?
Who is the digital you?
 
New rules for living in a digital age
New rules for living in a digital ageNew rules for living in a digital age
New rules for living in a digital age
 
Uniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLifeUniqueness of mobile - Nokia mLife
Uniqueness of mobile - Nokia mLife
 
Mobile, Mobile, Data
Mobile, Mobile, DataMobile, Mobile, Data
Mobile, Mobile, Data
 
Monitising mobile (data and infomation)
Monitising mobile (data and infomation)Monitising mobile (data and infomation)
Monitising mobile (data and infomation)
 
What is a digital footprint?
What is a digital footprint?What is a digital footprint?
What is a digital footprint?
 
Tony Fish Canto Slideshare
Tony Fish Canto   SlideshareTony Fish Canto   Slideshare
Tony Fish Canto Slideshare
 
My Digital Footprint
My Digital FootprintMy Digital Footprint
My Digital Footprint
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009
 

Recently uploaded

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 

Recently uploaded (20)

Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 

Amf Ventures Survey Results

  • 1.
  • 2. AMF Ventures provides professional consulting services that will enable your enterprise to build returns within the constraints of 1.0 and be ready to exploit opportunities created by 2.0 thinking and beyond….
  • 3. Our deliverables assist you in the move from separation, isolation and solitude to relationship, engagement and conversation.
  • 4. Handset Survey Results Many thanks to Margaret Gold of Gold Mobile Innovation for the creation of this analysis
  • 5.
  • 6. How important is it for an application, or a user, to be able to request Quality of Service? The majority of respondents believe that it is important or very important for the application, or a user, to be able to request Quality of Service.
  • 7. How important is IMS (IP Multimedia Subsystems architecture) to bring about better mobile data services? The importance of the IMS to bring about better mobile data services is seen to be important to moderately important.
  • 8. How important is it to communicate to the network the use/type of IP data, to allow for differential charging? The majority of respondents believe that it is important to communicate to the network the use/type of IP data, to allow for differential charging.
  • 9. How important is it to identify the applications that seek access to the network? The majority of respondents believe that it is important or very important to identify the applications that seek access to the network.
  • 10. How important is the need for a ‘connection manager’ function in the handset to be able to control and monitor network access? Most respondents believe that it is important to moderately important for a ‘connection manager’ function in the handset to be able to control and monitor network access.
  • 11. How important is it for the following to be able to stop installation, disable or force the removal of applications? Network Operator User Handset Manufacturer The majority of respondents believe that it is much more important for the user to be able to stop installation, disable or force the removal of applications, than the Network Operator (moderately important) or the Handset Manufacturer (of little importance).
  • 12. How important is it for the Network Operator to be able to stop installation, disable or force the removal of applications? Marketing / Commercial Technical The “Technical” respondents were more likely to find it only moderately important that the Network Operator is able to stop installation, disable or force the removal of applications.
  • 13. How important is application policing in the following forms? Signed White-listed Black-listed The Survey results indicate that it is more important for application policing to be achieved via Signing and Black-listing, then by White-listing.
  • 14. Marketing / Commercial How important is application policing in the form of Whitelisting? Technical The “Marketing / Commercial” respondents were more likely to find Whitelisting an important form of application policing. A similar difference exists with respect to Blacklisting.
  • 15. How important is the role of revocation by a relevant authority (eg network operator)? The majority of respondents believe that the role of revocation by a relevant authority, such as the network operator, is important to moderately important. “Technical” respondents were more likely to find this only moderately important.
  • 16. For revocation, should the user be: The majority of respondents believe that the user should be suggested to allow revocation, i.e. that the user should have a choice.
  • 17. Are you aware of UICC capabilities (other than the SIM)? Most respondents are not aware of the UICC capabilities (other than the SIM), and of those who did, only a very small number are actively developing them.
  • 18. How important is it to have access to the following SIM / UICC capabilities? High Speed Interface Smart Card Web Server Near Field Communications The Survey results indicate that a High Speed Interface is the most important SIM/UICC capability to have access to, but that a Smart Card Web Server and Near Field Communications are also important.
  • 19. Marketing / Commercial Technical The Technical respondents were more likely to find it very important that there be access to the Smart Card Web Server. A similar difference exists with respect to the importance of Near Field Communication. This is the largest difference between Technical and Marketing / Commercial How important is it to have access to the Smart Card Web Server?
  • 20. A number of other SIM / UICC capabilities were indicated, which are considered to be important or very important by those who specified them. N.B. Only 55 respondents answered this question, primarily in a “Technical” function How important is it to have access to other SIM / UICC capabilities ?
  • 21.
  • 22. How much is application development and deployment today made difficult by: “ Technical” respondents found both slightly less difficult. Lack of SIM / UICC interface standards? Fragmented device APIs? The respondents considered Fragmented device APIs to be a much greater difficulty than lack of SIM / UICC interface standards with regards to application development and deployment.
  • 23. The browser is today the main application execution environment for the handset. There is an even divide between those who agree and disagree on whether the browser is the main application execution environment for the handset.
  • 24. The browser is today the main application execution environment for the handset. Although there is no significant difference in opinion based on main job function or country, OS Developers predominantly disagree and Telecom Operators & Consultants are more inclined to agree that the browser is the main development environment. OS Developers Telecom Operators
  • 25. The browser will be the main application execution environment for the handset in the near future (in the next 1-3 years) Most respondents agree that the the browser will be the main application execution environment for the handset in the near future (although the 8 OS Developers continue to disagree)
  • 26. To become the main application execution environment, the mobile browser will need a standards-based interface to access handset resident functions and data: telephony, messaging, contacts, local storage, SIM/UICC etc. The majority of respondents agree or strongly agree that a standards-based interface will be necessary for the mobile browser to become the main application execution environment.
  • 27. The browser must support hyperlink access to the main network services (eg voice call, SMS) which are working in a secure environment. The respondents overwhelmingly agree or strongly agree that the browser must support hyperlink access to the main network services which are working in a secure environment. (Slightly more “Marketing / Commercial” respondents were undecided.)
  • 28. The browser must support hyperlink access to other applications which may be running in another non-secure execution environment. The respondents largely agree that the browser must support hyperlink access to other applications which may be running in another non-secure environment.
  • 29. A successful mobile handset browser will need to support a range of mark-up languages and scripting standards. The respondents overwhelmingly agree or strongly agree that the successful mobile handself browser will need to support a range of mark-up languages and scripting standards.
  • 30. The large growth and use of proprietary (ie non-standard) APIs for mobile handset browsers threatens the wider acceptance of browsers as the main application execution environment. The majority of respondents agree or strongly agree that the use of proprietary APIs threatens the wider acceptance of browsers as the main application execution environment.
  • 31. OMA dynamic content delivery (DCD) has a key role to play as a mobile handset browser enabler. Although more than half of the respondents are undecided, most of the remaining half agree that OMA DCD has a key role to play as a mobile handset browser enabler. ( Slightly more “Marketing / Commercial” respondents were undecided.)
  • 32. The mobile handset browser must be able to receive asynchronous ‘push’ data. The majority of respondents agree or strongly agree that the handset browser must be able to receive asynchronous ‘push’ data. (Slightly more “Marketing / Commercial” respondents were more likely to strongly agree.)
  • 33. How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers: The size of screen/number of pixels The media codecs supported by the handset Both the detection of the size of screen / number of pixels and the media codecs supported by the handset are considered by the vast majority of the respondents to be very important or important.
  • 34. How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers: The radio capabilities of the handset The Bluetooth profiles supported by the handset Respondents find it less important, but nonetheless important, that the radio capabilites and the Bluetooth profiles supported by the handset can be detected. (“Technical” respondents found radio capabilities & Bluetooth more important than “Marketing / Commercial” respondents.)
  • 35. How important is it for a relevant application to be able to detect the capability of other hardware enablers? A large number of other relevant hardware enablers were indicated, which are considered to be very important by the respondents who specified them. N.B. Only 70 respondents answered this question, primarily “Technical”
  • 36.
  • 37.
  • 38. How important is it for a relevant application to be able to detect the capability of each of the following software enablers: The respondents find it very important that the capabilities of the browser can be detected, and important to very important that the capabilities of the IMS subsystem can be detected. The capabilities of the browser The capabilities of the IMS subsystem
  • 39. How important is it for a relevant application to be able to detect the capability of each of the following software enablers: Most respondents find it important that the capabilities of other 3 rd party software, and the details of the relevant certificates present on the device can be detected. (“Technical” respondents were more likely to find certificates of little importance.) The capabilities of any other 3rd party software capabilities that have been added to the handset Details of the relevant certificates present on the device
  • 40. How important is it for a relevant application to be able to detect the capability of other software enablers? N.B. Only 37 respondents answered this question A number of other relevant software enablers were indicated, which are considered to be very important, moderately important or important by the respondents who specified them.
  • 41.
  • 42. How important is it for a relevant application to be able to detect the capability of other applications? Uniquely identify each application Identify the capabilities of the application Identify the dependencies of the application Most respondents believe that it is equally important to moderately important for a relevant application to uniquely identify other applications, their capabilities and their dependencies.
  • 43. Marketing / Commercial Technical The “Technical” respondents were more likely to find it very important, but also only moderately important that a relevant application can identify the dependencies of other applications. How important is it is it for a relevant application to be able to identify the dependencies of other applications?
  • 44. How important is it for a relevant application to be able to detect the capability of other applications: N.B. Only 37 respondents answered this question, primarily “Technical” A number of other relevant software enablers were indicated, and the respondents who specified other capabilities largely considered them to be very important, moderately important or important.
  • 45.
  • 46. How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine whether the handset is open or closed, is being used in landscape or portrait mode, and whether an external device is connected or removed. (“Technical” respondents were more likely to find all three very important.) Whether the handset is open or closed Whether the handset is being used/held in landscape or portrait mode When an external device is connected or removed
  • 47. How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine when a new enabler or application added, what the battery status is, and what the available processing power is. (“Technical” respondents found processing power more important than “Marketing / Commercial” respondents.) When a new enabler or application is added Battery status Available processing power
  • 48. How important is it for a relevant application to be able to determine other transient features? N.B. Only 46 respondents answered this question A number of other transient features were indicated, which were considered to be very important or important by those who specified them.
  • 49.
  • 50.
  • 51. How important is it to allow management of handset features over the network (eg remote disabling/enabling of a feature)? The majority of respondents believe that it is very important or important to allow management of handset features over the network.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. AMF Ventures organises a range of public forums where the cross-pollination of idea from debate allows professional, in different sectors of the digital value chain, to formulate and refine strategy. A key part of our service is adding value to a strategy away day or internal conferences. AMF Ventures’ team members are experts in presenting, chairing and leading debate. Where needed, we complement our internal expertise by drawing on a wide range of professionals from our extensive network. Public Forum Seminars & Debate AMF Ventures arranges private events bringing together executives and experts to discuss and debate key industry trends. These sessions provide senior management with the opportunity to grow their personal networks and to hear from those who are radical thinking in the industry. Executive who value opinion free from internal bias, appreciate our regular ‘one–on-one’ sessions and team briefings. These sessions are a focussed way for decision makers to spot trends on the horizon. Connecting Executive Briefings AMF Ventures provides knowledge-based services on the developments and implications of operating in a converged 2.0 world. AMF Ventures works for Technology, Media and Telecommunications companies who are considering a global readership and are discovering how to derive value from next generation networks and devices. Our Products Knowledge
  • 61. With few exceptions, exit planning is perhaps the most difficult period for any CEO. Research shows that many owner/ managers fail to successfully achieve the transition successfully - and do not receive their expected value. AMF Ventures understands the boundaries and expectations and is able to advise and implement an exit. AMF Venture has wide experience in the sourcing of key partners to support the strategic vision. We understand how to establish a workable structure, negotiate terms, repair and rebuild broken agreements, and conduct partner diligence to provide a matching of culture and delivery capability. Exit planning Partnerships Positioning in a dynamic market is complex. AMF Ventures is able to bring tools and experience that will boost your strategy team. We identify partners and competitors inside and outside of your sector. We deliver risk management scenarios taking a wide-ranging view of competition, technology and market evolution. Classic consulting and advisory support. We engage with your organisation to create wealth from idea conception to exit. Our experts will work along side you, within your framework, to deliver a strategy that creates shareholder value. Competitive landscape Business strategy AMF Ventures has a proven and stable team of experts available for short or long term work. Our core team is supported by a network of partners and independent associates. Our Products Strategy
  • 62. Debating technologies and standards with AMF Ventures’ experts, is a practical means of helping to determine the risks and benefits associated with technology choice. AMF Ventures has helped debate the benefits of:- i. platforms and API’s with operators; ii. software with system designers; iii. handset OS with manufactures, and; iv. SDK’s with developers. Technology decisions Turning initial traction into sustainable market momentum requires a balance between tactical and strategic activities. Sales teams that focus only on short-term, tactical revenue opportunities do not lay the sales foundation for longer-term program. Conversely, teams that focus on strategic programmes at the expense of tactical revenue fail to deliver sufficient results soon enough to justify further investment. AMF Ventures can help find the right balance between short-term tactical needs and the longer-term strategic requirements by delivering sales opportunities and sales management. AMF Ventures can delivers a team who will provide hands on delivery, tactical assistance, project management or planning support. We are able to supplement our interim management team from our professional associate network to deliver skilled individuals on a short or long term basis. Tactical revenue Team Support Our team can help you address strategic and tactical implementation projects. Our team is based in London, with partner companies in Germany, France, Spain, Italy, Holland, Japan and USA. Our Products Implementation
  • 63. Diligence requires a deep understanding of the business and the role the business fulfils in the value chain. AMF Ventures is able to act for:- i. an investor seeking to place capital; ii. a purchaser looking to acquire assets or a going concern, and; iii. a seller who wishes to dispose of a business or profit and loss account. Diligence The impact of the decisions made from a financial model is immense. Potential investors, founders and management all see the model from different perspectives and with different motivations. AMF Ventures is able to build or validate a detailed financial model, challenge or confirm the assumptions in the model and provide a judgement about the strength of the approach and scenario sensitivity. AMF Ventures provides an independent external viewpoint and helps develop an investment model. We also provide realistic budgeting and a monthly management reporting tools suited to your business. AMF Ventures is able to provide opinion on company structure and the different types and sources of funding. We are able to advise on clauses, terms and implications, whether a shareholders’ agreement. Financial modelling Structure If the team is critical, and funding is essential, then getting the right structure is crucial. Managing the expectations is the indispensable role AMF Ventures brings to the funding and structuring process. Our Products Funding