Your SlideShare is downloading. ×
0
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Amf Ventures   Survey Results
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Amf Ventures Survey Results

2,918

Published on

survey results from a study of over 400 experts

survey results from a study of over 400 experts

Published in: Business, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,918
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
70
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. <ul><li>In January 2008, AMF Ventures conducted a survey of more than 400 members of the international Mobile and Wireless industry in order to delve deeper into the technical environment of mobile devices, the policies and behaviours around them, and the impact that this has on the further development of the industry as a whole. </li></ul><ul><li>It is clear that a greater degree of control and clarity is required for both mobile device owners (the users) and developers of products and services for mobile. Many respondents indicated that they wished to have a greater amount of information available to them with regards to the performance factors of the mobile phone – such as memory, battery, network connectivity, screen size, CPU and software support. This includes a much wider and deeper range of detection capabilities, as well as a much greater degree of transparency and control with regards to the applications on the mobile phone. </li></ul><ul><li>Fragmented device APIs are seen to be a significant difficulty which hinders application development and deployment. Proprietary APIs are also seen to be a threat to the wider acceptance of the browser as the main application execution environment. </li></ul><ul><li>With regards to the browser, there is still a large divide in the industry as to whether it is currently the main application execution environment on the mobile phone, but most do see it heading that way in the next two or three years. However, those involved in Open Source development disagree that the browser will dominate now or in the near future. </li></ul><ul><li>In order for the browser environment to be a success, the respondents to the survey strongly agreed that a standards-based interface will be required, that hyperlink access must be supported (along with a range of mark-up languages and scripting standards), and that the browser must be able to receive asynchronous ‘push’ data. </li></ul>
  • 2. AMF Ventures provides professional consulting services that will enable your enterprise to build returns within the constraints of 1.0 and be ready to exploit opportunities created by 2.0 thinking and beyond….
  • 3. Our deliverables assist you in the move from separation, isolation and solitude to relationship, engagement and conversation.
  • 4. Handset Survey Results Many thanks to Margaret Gold of Gold Mobile Innovation for the creation of this analysis
  • 5. <ul><li>The survey ran from the 7 th to the 28 th of January, 2008 </li></ul><ul><li>There were 427 respondents, of whom: </li></ul><ul><ul><li>45% described their main job function as Marketing / Commercial </li></ul></ul><ul><ul><li>38.6% described their main job function as Technical, and </li></ul></ul><ul><ul><li>16.4% indicated an other job function </li></ul></ul><ul><li>Industry Breakdown: </li></ul><ul><li>Software Application Developer 27.6% </li></ul><ul><li>Consultant 25.1% </li></ul><ul><li>Other 19.7% </li></ul><ul><li>Telecom Operator 11% </li></ul><ul><li>Infrastructure 5.4% </li></ul><ul><li>OS Developer 4.7% </li></ul><ul><li>Handset Manufacturer 3.5% </li></ul><ul><li>Semiconductor Manufacturer 2.1% </li></ul><ul><li>Handset Hardware Components 0.9% </li></ul><ul><li>Country Breakdown: </li></ul><ul><li>United Kingdom** 46.8% </li></ul><ul><li>United States 21.5% </li></ul><ul><li>Israel 3.7% </li></ul><ul><li>India 3% </li></ul><ul><li>France 2.1% </li></ul><ul><li>Italy 2.1% </li></ul><ul><li>Finland 1.9% </li></ul><ul><li>Ireland 1.6% </li></ul><ul><li>(**N.B. the survey listed both UK &amp; GB, both included here) </li></ul>
  • 6. How important is it for an application, or a user, to be able to request Quality of Service? The majority of respondents believe that it is important or very important for the application, or a user, to be able to request Quality of Service.
  • 7. How important is IMS (IP Multimedia Subsystems architecture) to bring about better mobile data services? The importance of the IMS to bring about better mobile data services is seen to be important to moderately important.
  • 8. How important is it to communicate to the network the use/type of IP data, to allow for differential charging? The majority of respondents believe that it is important to communicate to the network the use/type of IP data, to allow for differential charging.
  • 9. How important is it to identify the applications that seek access to the network? The majority of respondents believe that it is important or very important to identify the applications that seek access to the network.
  • 10. How important is the need for a ‘connection manager’ function in the handset to be able to control and monitor network access? Most respondents believe that it is important to moderately important for a ‘connection manager’ function in the handset to be able to control and monitor network access.
  • 11. How important is it for the following to be able to stop installation, disable or force the removal of applications? Network Operator User Handset Manufacturer The majority of respondents believe that it is much more important for the user to be able to stop installation, disable or force the removal of applications, than the Network Operator (moderately important) or the Handset Manufacturer (of little importance).
  • 12. How important is it for the Network Operator to be able to stop installation, disable or force the removal of applications? Marketing / Commercial Technical The “Technical” respondents were more likely to find it only moderately important that the Network Operator is able to stop installation, disable or force the removal of applications.
  • 13. How important is application policing in the following forms? Signed White-listed Black-listed The Survey results indicate that it is more important for application policing to be achieved via Signing and Black-listing, then by White-listing.
  • 14. Marketing / Commercial How important is application policing in the form of Whitelisting? Technical The “Marketing / Commercial” respondents were more likely to find Whitelisting an important form of application policing. A similar difference exists with respect to Blacklisting.
  • 15. How important is the role of revocation by a relevant authority (eg network operator)? The majority of respondents believe that the role of revocation by a relevant authority, such as the network operator, is important to moderately important. “Technical” respondents were more likely to find this only moderately important.
  • 16. For revocation, should the user be: The majority of respondents believe that the user should be suggested to allow revocation, i.e. that the user should have a choice.
  • 17. Are you aware of UICC capabilities (other than the SIM)? Most respondents are not aware of the UICC capabilities (other than the SIM), and of those who did, only a very small number are actively developing them.
  • 18. How important is it to have access to the following SIM / UICC capabilities? High Speed Interface Smart Card Web Server Near Field Communications The Survey results indicate that a High Speed Interface is the most important SIM/UICC capability to have access to, but that a Smart Card Web Server and Near Field Communications are also important.
  • 19. Marketing / Commercial Technical The Technical respondents were more likely to find it very important that there be access to the Smart Card Web Server. A similar difference exists with respect to the importance of Near Field Communication. This is the largest difference between Technical and Marketing / Commercial How important is it to have access to the Smart Card Web Server?
  • 20. A number of other SIM / UICC capabilities were indicated, which are considered to be important or very important by those who specified them. N.B. Only 55 respondents answered this question, primarily in a “Technical” function How important is it to have access to other SIM / UICC capabilities ?
  • 21. What other SIM / UICC capabilities is it important to have access to? <ul><li>Smart Card secure file usage (DRM, M-cash, etc) </li></ul><ul><li>JSR177 </li></ul><ul><li>Large phonebook (1000 contacts) </li></ul><ul><li>Telematics applications </li></ul><ul><li>Special user authorisation e.g. biometric database </li></ul><ul><li>NAGRAVISION integration </li></ul><ul><li>access secure element </li></ul><ul><li>multi identity, multi profile, multi network attach </li></ul><ul><li>common protocol across CDMA and GSM </li></ul><ul><li>security (key generation etc.) </li></ul><ul><li>ability to use the USIM as a signing authority in secure communications </li></ul><ul><li>Improved encryption </li></ul><ul><li>Locking content to a SIM </li></ul><ul><li>GPS </li></ul><ul><li>Authentication tokens </li></ul><ul><li>MobileTV ESG + customisation </li></ul><ul><li>cryptographic functions within the SIM need to be exposed to enable internet-centric authentication (e.g. OpenID) </li></ul><ul><li>GBA </li></ul><ul><li>Backwards compatability / 2G </li></ul><ul><li>Local Access </li></ul>
  • 22. How much is application development and deployment today made difficult by: “ Technical” respondents found both slightly less difficult. Lack of SIM / UICC interface standards? Fragmented device APIs? The respondents considered Fragmented device APIs to be a much greater difficulty than lack of SIM / UICC interface standards with regards to application development and deployment.
  • 23. The browser is today the main application execution environment for the handset. There is an even divide between those who agree and disagree on whether the browser is the main application execution environment for the handset.
  • 24. The browser is today the main application execution environment for the handset. Although there is no significant difference in opinion based on main job function or country, OS Developers predominantly disagree and Telecom Operators &amp; Consultants are more inclined to agree that the browser is the main development environment. OS Developers Telecom Operators
  • 25. The browser will be the main application execution environment for the handset in the near future (in the next 1-3 years) Most respondents agree that the the browser will be the main application execution environment for the handset in the near future (although the 8 OS Developers continue to disagree)
  • 26. To become the main application execution environment, the mobile browser will need a standards-based interface to access handset resident functions and data: telephony, messaging, contacts, local storage, SIM/UICC etc. The majority of respondents agree or strongly agree that a standards-based interface will be necessary for the mobile browser to become the main application execution environment.
  • 27. The browser must support hyperlink access to the main network services (eg voice call, SMS) which are working in a secure environment. The respondents overwhelmingly agree or strongly agree that the browser must support hyperlink access to the main network services which are working in a secure environment. (Slightly more “Marketing / Commercial” respondents were undecided.)
  • 28. The browser must support hyperlink access to other applications which may be running in another non-secure execution environment. The respondents largely agree that the browser must support hyperlink access to other applications which may be running in another non-secure environment.
  • 29. A successful mobile handset browser will need to support a range of mark-up languages and scripting standards. The respondents overwhelmingly agree or strongly agree that the successful mobile handself browser will need to support a range of mark-up languages and scripting standards.
  • 30. The large growth and use of proprietary (ie non-standard) APIs for mobile handset browsers threatens the wider acceptance of browsers as the main application execution environment. The majority of respondents agree or strongly agree that the use of proprietary APIs threatens the wider acceptance of browsers as the main application execution environment.
  • 31. OMA dynamic content delivery (DCD) has a key role to play as a mobile handset browser enabler. Although more than half of the respondents are undecided, most of the remaining half agree that OMA DCD has a key role to play as a mobile handset browser enabler. ( Slightly more “Marketing / Commercial” respondents were undecided.)
  • 32. The mobile handset browser must be able to receive asynchronous ‘push’ data. The majority of respondents agree or strongly agree that the handset browser must be able to receive asynchronous ‘push’ data. (Slightly more “Marketing / Commercial” respondents were more likely to strongly agree.)
  • 33. How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers: The size of screen/number of pixels The media codecs supported by the handset Both the detection of the size of screen / number of pixels and the media codecs supported by the handset are considered by the vast majority of the respondents to be very important or important.
  • 34. How important is it for a relevant application to be able to detect the capability of each of the following hardware enablers: The radio capabilities of the handset The Bluetooth profiles supported by the handset Respondents find it less important, but nonetheless important, that the radio capabilites and the Bluetooth profiles supported by the handset can be detected. (“Technical” respondents found radio capabilities &amp; Bluetooth more important than “Marketing / Commercial” respondents.)
  • 35. How important is it for a relevant application to be able to detect the capability of other hardware enablers? A large number of other relevant hardware enablers were indicated, which are considered to be very important by the respondents who specified them. N.B. Only 70 respondents answered this question, primarily “Technical”
  • 36. What other hardware enablers is it important (VI, I, MI) for a relevant application to be able to detect the capability of? <ul><li>Generic list of all functions (x4) </li></ul><ul><li>The actual device, make, model (x4) </li></ul><ul><li>CPU Speed (x4), Processor </li></ul><ul><li>Available memory (x11), local storage, cache , slot </li></ul><ul><li>Input mechanisms &amp; interface capabilities (x8) , keypad layout, keyboard </li></ul><ul><li>Location awareness: GPS ( x 10) or AGPS </li></ul><ul><li>Connection speed (x2), latency, bandwidth (x4) </li></ul><ul><li>WiFi (x3) (presence &amp; state), Wimax (x1) </li></ul><ul><li>Connection capabilities, availability, coverage (x3) </li></ul><ul><li>WLAN (x3), SIP (x2) </li></ul><ul><li>Dual mode wifi enabling by SIP / Skype stacks. multiple radio frequency fractal antennas (Wimax - UMTS compatibility) </li></ul><ul><li>Camera (x6) </li></ul><ul><li>Battery (x2), so application can slow down or go in to low power consumption mode </li></ul><ul><li>Sound, audio capabilities (x3) </li></ul><ul><li>Screen size, screen layout (portrait vs. landscape), number and location of screens (x3) </li></ul><ul><li>Browser capabilities, type (x2) </li></ul><ul><li>Network, carrier (x2) </li></ul><ul><li>SIM capabilities, SIM/USIM multiple identities and profiles (x2) </li></ul><ul><li>Versions of various standard APIs, ( OpenGL ES, OpenMAX, OpenVG, EGL version) (x2) </li></ul><ul><li>Peripherals (embedded, connected, paired) capabilities </li></ul><ul><li>Detection of file types supported by the handset at an early stage in the network handshake. Nothing more frustrating then getting half way through an app to find the handset does not support the next script field and the whole thing needs to be abandoned. Or worse the handset needs to reboot. </li></ul><ul><li>User priorities on latency and billing implications </li></ul><ul><li>UI appearance of platform for seamless integration </li></ul><ul><li>Supported application types </li></ul><ul><li>Current voice levels </li></ul>
  • 37. What other hardware enablers is it important (VI, I, MI) for a relevant application to be able to detect the capability of? <ul><li>Flash 3.0, Flash support (x2) </li></ul><ul><li>SVG Viewer - similar content display mechanisms, and the ability to invoke them </li></ul><ul><li>secure and virtualized environments (sanboxing) for all application layers (symbyan, Java etc) to avoid messing up the HW management stack </li></ul><ul><li>Colours </li></ul><ul><li>hardware acceleration for codecs </li></ul><ul><li>GPU version. </li></ul><ul><li>Availability of 3D acceleration </li></ul><ul><li>how long is a piece of string? </li></ul><ul><li>Silly question - it depends completely on the specific purpose of the application </li></ul><ul><li>Motion, Contacts access - it needs to be a in standard way to limit the fragmentation </li></ul><ul><li>JSR support </li></ul><ul><li>Supported scripts (e.g. Javascript) </li></ul><ul><li>Media Player capabilities (e.g. frames/sec, DRM handling, etc.) </li></ul><ul><li>Conflicts with multiple radios and profiles </li></ul><ul><li>pointing device </li></ul><ul><li>Software version running on the handset </li></ul><ul><li>version of J2ME </li></ul><ul><li>NFC capability </li></ul><ul><li>security profiles, m-payment, etc </li></ul><ul><li>the text capabilities of the device (both language, and fonts) </li></ul><ul><li>Files and media access on the handset </li></ul>
  • 38. How important is it for a relevant application to be able to detect the capability of each of the following software enablers: The respondents find it very important that the capabilities of the browser can be detected, and important to very important that the capabilities of the IMS subsystem can be detected. The capabilities of the browser The capabilities of the IMS subsystem
  • 39. How important is it for a relevant application to be able to detect the capability of each of the following software enablers: Most respondents find it important that the capabilities of other 3 rd party software, and the details of the relevant certificates present on the device can be detected. (“Technical” respondents were more likely to find certificates of little importance.) The capabilities of any other 3rd party software capabilities that have been added to the handset Details of the relevant certificates present on the device
  • 40. How important is it for a relevant application to be able to detect the capability of other software enablers? N.B. Only 37 respondents answered this question A number of other relevant software enablers were indicated, which are considered to be very important, moderately important or important by the respondents who specified them.
  • 41. What other software enablers is it important (VI,I,MI) for a relevant application to be able to detect the capability of? <ul><li>Other delivery systems such as OSGi </li></ul><ul><li>need to focus on RF issues , convergence means that if you do not take care of this it will be extremely difficult to add DVB-H/S or any oter service needing miultiple radios turned on (PERSONAL EXPERIENCE WITH H3G, TIM and VODAFONE) </li></ul><ul><li>Ability to store default signature for SMS messages and easily insert when required </li></ul><ul><li>The ability to handle secure communications correctly </li></ul><ul><li>device software, SIM software and SIM/USIM multiple identities and profiles </li></ul><ul><li>whether a user is subscribed to a data plan </li></ul><ul><li>User-defined competency or level/desire to customize. </li></ul><ul><li>OS and its version </li></ul><ul><li>where is this leading..?? </li></ul><ul><li>Too many to mention them all. </li></ul><ul><li>Thousands of properties... but probably only 10-20 for each type of application. (For web designers to get excited about the medium, they&apos;ll demand pixel perfect rendering, for example) </li></ul><ul><li>manufacture or SP provide details </li></ul><ul><li>Handset type </li></ul><ul><li>Again, silly question - depends on the application </li></ul><ul><li>the hardware profile, including SMS, GPS, camera, video and audio recording, storage, and attitude </li></ul><ul><li>Location based capabilities PIM and File capabilities 2D and 3D graphics capabilities Multimedia playback </li></ul><ul><li>appli managing phone call &amp; data communication </li></ul><ul><li>If handset is locked or not to a MNO </li></ul><ul><li>Device capabilities </li></ul>
  • 42. How important is it for a relevant application to be able to detect the capability of other applications? Uniquely identify each application Identify the capabilities of the application Identify the dependencies of the application Most respondents believe that it is equally important to moderately important for a relevant application to uniquely identify other applications, their capabilities and their dependencies.
  • 43. Marketing / Commercial Technical The “Technical” respondents were more likely to find it very important, but also only moderately important that a relevant application can identify the dependencies of other applications. How important is it is it for a relevant application to be able to identify the dependencies of other applications?
  • 44. How important is it for a relevant application to be able to detect the capability of other applications: N.B. Only 37 respondents answered this question, primarily “Technical” A number of other relevant software enablers were indicated, and the respondents who specified other capabilities largely considered them to be very important, moderately important or important.
  • 45. What other application capabilities is it important (VI,I,MI) for a relevant application to be able to detect the capability of in other applications? <ul><li>Identify opportunities to connect to other application, identify opportunities to trade data </li></ul><ul><li>To measure availability and capacity of resources in a single/multi application scenario. </li></ul><ul><li>Must asses the risk level and thus running privilege level for each component. Maybe not like SELinux but these are no longer just phones but PAYMENT SYSTEMS. SEPA requires this security ! </li></ul><ul><li>SIM/USIM multiple identities and profiles </li></ul><ul><li>The question is very specific to the intended application/s. I can certainly see that there may be great value in running several interactive widgets defined by the user. </li></ul><ul><li>It all depends on whether the applications can talk to each other. If they can&apos;t, who cares? </li></ul><ul><li>Perhaps a web services discovery model on the handset? </li></ul><ul><li>Standardized application types (i.e. application identifiers from the IMS world) will only stifle application innovation. More emphasis needs to be made on vertical standards (like HAL) than horizontal to move the industry forward </li></ul><ul><li>The memory space taken up by other applications </li></ul><ul><li>Applies to the built-in apps also (like dialer, phonebook etc). See JSR 211 </li></ul><ul><li>Interfaces available to said application </li></ul><ul><li>I see these abilities as being relevant to a single manager application but not to other applications. </li></ul><ul><li>The creator of the application, and a standards identifier code </li></ul><ul><li>Security is a potential problem here, would need to ensure that the application cannot affect another separate app. </li></ul><ul><li>Avoid conflicting usage of sound system. </li></ul>
  • 46. How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine whether the handset is open or closed, is being used in landscape or portrait mode, and whether an external device is connected or removed. (“Technical” respondents were more likely to find all three very important.) Whether the handset is open or closed Whether the handset is being used/held in landscape or portrait mode When an external device is connected or removed
  • 47. How important is it for a relevant application to be able to determine transient features: Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine when a new enabler or application added, what the battery status is, and what the available processing power is. (“Technical” respondents found processing power more important than “Marketing / Commercial” respondents.) When a new enabler or application is added Battery status Available processing power
  • 48. How important is it for a relevant application to be able to determine other transient features? N.B. Only 46 respondents answered this question A number of other transient features were indicated, which were considered to be very important or important by those who specified them.
  • 49. What other transient features is it important (VI,I,MI) for a relevant application to be able to determine? <ul><li>Available memory, memory status (x7), ability to allocated minimum memory availability but without blocking such availability to one singly application, Dynamic memory </li></ul><ul><li>Network strength, signal strength, speed (x4) </li></ul><ul><li>Storage (x3), Non-volatile storage </li></ul><ul><li>Current bearer, available bearers (x2) </li></ul><ul><li>Roaming status (x3) Roaming vs home use (drives the rate); rate of travel, e.g., stationary or mobile use (drives speed of network interaction). </li></ul><ul><li>The handset is in use or idle (phone call or other), when the user just terminated some action </li></ul><ul><li>WLAN status </li></ul><ul><li>Encryption, security and extra SMART card capabilities </li></ul><ul><li>Location </li></ul><ul><li>CPU&apos;s (or VM stacks) capacity Device storage (storages !) capacity &amp; speed Systems malfunctions </li></ul><ul><li>SIM/USIM multiple identities and profiles </li></ul><ul><li>Compatibility of the browser to standard </li></ul><ul><li>It is key to know the current radio interface (GSM, UMTS, WLAN, etc) as this can make a difference on how an application uses the network. </li></ul><ul><li>Also key to know if there is an extant PDP context (data connection) because this may mean you cannot add another connection (eg GPRS class 11 or less devices iirc) </li></ul><ul><li>Ability to know if the device is about to roam from one radio interface to another (cell rated, or your moving) so that if you are streaming or gaming, you can adjust the experience accordingly. </li></ul><ul><li>Recognition of gestures on touchscreen devices </li></ul>
  • 50. What other transient features is it important (VI,I,MI) for a relevant application to be able to determine? <ul><li>proximity or change in available networks (from NFC, RFID &amp; bluetooth to Wifi &amp; macro) </li></ul><ul><li>Available resources </li></ul><ul><li>Availability of persistent storage </li></ul><ul><li>Whether a voice call is in progress </li></ul><ul><li>Special needs requirements (e.g. telecoil, assisted readers). Integration with calendaring data Integration with presence/location related data Integration with gyroscopic data </li></ul><ul><li>Whether another application is using the same resources. E.g. Bluetooth, Wi-Fi... </li></ul><ul><li>monitor network availability and bandwidth and possible consequent associated costs. </li></ul><ul><li>user priorities re battery and processing power </li></ul><ul><li>GPU performance / features </li></ul><ul><li>For all these questions it&apos;s too difficult to generalize really - different things are important/relevant to different apps. Of course in general, more information is better than less information. </li></ul><ul><li>what &apos;relevant application&apos; are we answering questions about.. would make deciding easier </li></ul>* Very important, important or moderately important
  • 51. How important is it to allow management of handset features over the network (eg remote disabling/enabling of a feature)? The majority of respondents believe that it is very important or important to allow management of handset features over the network.
  • 52. Network Related Conclusions <ul><li>The majority believe that it is important or very important for the application, or a user, to be able to request Quality of Service. </li></ul><ul><li>The majority believe that it is important or very important to communicate to the network the use/type of IP data, to allow for differential charging. </li></ul><ul><li>The majority believe that it is important or very important to identify the applications that seek access to the network. </li></ul><ul><li>Most respondents believe that it is important or moderately important for a ‘connection manager’ function in the handset to be able to control and monitor network access. </li></ul><ul><li>The majority believe that it is much more important for the user to be able to stop installation, disable or force the removal of applications, than the Network Operator (moderately important) or the Handset Manufacturer (of little importance). </li></ul><ul><li>The majority of respondents believe that it is very important or important to allow management of handset features over the network. </li></ul>
  • 53. Policing Related Conclusions <ul><li>The Survey results indicate that it is more important for application policing to be achieved via Signing and Black-listing, then by White-listing. </li></ul><ul><li>The majority believe that the role of revocation by a relevant authority, such as the network operator, is important or moderately important. </li></ul><ul><li>The majority believe that the user should be suggested to allow revocation, i.e. that the user should have a choice. </li></ul>
  • 54. UICC &amp; Sim Related Conclusions <ul><li>Most respondents are not aware of the UICC capabilities (other than the SIM), and of those who did, only a very small number are actively developing them. </li></ul><ul><li>The Survey results indicate that a High Speed Interface is the most important SIM/UICC capability to have access to, but that a Smart Card Web Server and Near Field Communications are also important. </li></ul><ul><li>The respondents considered Fragmented device APIs to be a much greater difficulty than lack of SIM / UICC interface standards with regards to application development and deployment. </li></ul>
  • 55. Browser Related Conclusions <ul><li>There is an even divide between those who agree and disagree on whether the browser is the main application execution environment for the handset. </li></ul><ul><li>Most respondents agree that the browser will be the main application execution environment for the handset in the near future (although the 8 OS Developers continue to disagree) </li></ul><ul><li>The majority of respondents agree or strongly agree that a standards-based interface will be necessary for the mobile browser to become the main application execution environment. </li></ul><ul><li>The respondents overwhelmingly agree or strongly agree that the browser must support hyperlink access to the main network services which are working in a secure environment. </li></ul><ul><li>The respondents find it very important that the capabilities of the browser can be detected, and important to very important that the capabilities of the IMS subsystem can be detected. </li></ul>
  • 56. Browser Related Conclusions (2) <ul><li>The respondents largely agree that the browser must support hyperlink access to other applications which may be running in another non-secure environment. </li></ul><ul><li>The respondents overwhelmingly agree or strongly agree that the successful mobile handset browser will need to support a range of mark-up languages and scripting standards. </li></ul><ul><li>The majority of respondents agree or strongly agree that the use of proprietary APIs threatens the wider acceptance of the browser as the main application execution environment. </li></ul><ul><li>Although more than half of the respondents are undecided, most of the remaining half agree that OMA DCD has a key role to play as a mobile handset browser enabler. </li></ul><ul><li>The majority of respondents agree or strongly agree that the handset browser must be able to receive asynchronous ‘push’ data. </li></ul>
  • 57. Detection Related Conclusions <ul><li>Both the detection of the size of screen / number of pixels and the media codecs supported by the handset are considered by the vast majority of the respondents to be very important or important. </li></ul><ul><li>Respondents find it less important, but nonetheless important, that the radio capabilities and the Bluetooth profiles supported by the handset can be detected. </li></ul><ul><li>A large number of other relevant hardware enablers were indicated, which are considered to be very important by the respondents who specified them. </li></ul><ul><li>Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine whether the handset is open or closed, is being used in landscape or portrait mode, and whether an external device is connected or removed. </li></ul><ul><li>Most respondents believe that it is roughly equally important or very important for a relevant application to be able to determine when a new enabler or application added, what the battery status is, and what the available processing power is. </li></ul>
  • 58. Technical / Marketing Bias <ul><li>The “Technical” respondents were more likely to find it only moderately important that the Network Operator is able to stop installation, disable or force the removal of applications. </li></ul><ul><li>The “Marketing / Commercial” respondents were more likely to find Whitelisting an important form of application policing. A similar difference exists with respect to Blacklisting. </li></ul><ul><li>“ Technical” respondents were more likely to believe that the role of revocation by a relevant authority, such as the network operator, is only moderately important – whereas most respondents believed it to be important. </li></ul><ul><li>The Technical respondents were more likely to find it very important that there be access to the Smart Card Web Server. A similar difference exists with respect to the importance of Near Field Communication. </li></ul><ul><li>Although there is no significant difference in opinion based on main job function or country, OS Developers predominantly disagree and Telecom Operators &amp; Consultants are more inclined to agree that the browser is the main development environment. </li></ul><ul><li>When looking at whether the browser will be the main application execution environment for the handset in the near future , the 8 OS Developers continue to disagree although the majority of respondents in fact agree. </li></ul>
  • 59. Technical / Marketing Bias (2) <ul><li>Slightly more “Marketing / Commercial” respondents were undecided as to whether the browser must support hyperlink access to the main network services which are working in a secure environment. </li></ul><ul><li>Slightly more “Marketing / Commercial” respondents were undecided about whether the OMA DCD has a key role to play as a mobile handset browser enabler. </li></ul><ul><li>“ Marketing / Commercial” respondents were more likely to strongly agree that the handset browser must be able to receive asynchronous ‘push’ data. </li></ul><ul><li>“ Technical” respondents found it more important than “Marketing / Commercial” respondents that the radio capabilities and the Bluetooth profiles supported by the handset can be detected. </li></ul><ul><li>“ Technical” respondents were more likely to find it very important for a relevant application to be able to determine whether the handset is open or closed, is being used in landscape or portrait mode, and whether an external device is connected or removed. </li></ul>
  • 60. AMF Ventures organises a range of public forums where the cross-pollination of idea from debate allows professional, in different sectors of the digital value chain, to formulate and refine strategy. A key part of our service is adding value to a strategy away day or internal conferences. AMF Ventures’ team members are experts in presenting, chairing and leading debate. Where needed, we complement our internal expertise by drawing on a wide range of professionals from our extensive network. Public Forum Seminars &amp; Debate AMF Ventures arranges private events bringing together executives and experts to discuss and debate key industry trends. These sessions provide senior management with the opportunity to grow their personal networks and to hear from those who are radical thinking in the industry. Executive who value opinion free from internal bias, appreciate our regular ‘one–on-one’ sessions and team briefings. These sessions are a focussed way for decision makers to spot trends on the horizon. Connecting Executive Briefings AMF Ventures provides knowledge-based services on the developments and implications of operating in a converged 2.0 world. AMF Ventures works for Technology, Media and Telecommunications companies who are considering a global readership and are discovering how to derive value from next generation networks and devices. Our Products Knowledge
  • 61. With few exceptions, exit planning is perhaps the most difficult period for any CEO. Research shows that many owner/ managers fail to successfully achieve the transition successfully - and do not receive their expected value. AMF Ventures understands the boundaries and expectations and is able to advise and implement an exit. AMF Venture has wide experience in the sourcing of key partners to support the strategic vision. We understand how to establish a workable structure, negotiate terms, repair and rebuild broken agreements, and conduct partner diligence to provide a matching of culture and delivery capability. Exit planning Partnerships Positioning in a dynamic market is complex. AMF Ventures is able to bring tools and experience that will boost your strategy team. We identify partners and competitors inside and outside of your sector. We deliver risk management scenarios taking a wide-ranging view of competition, technology and market evolution. Classic consulting and advisory support. We engage with your organisation to create wealth from idea conception to exit. Our experts will work along side you, within your framework, to deliver a strategy that creates shareholder value. Competitive landscape Business strategy AMF Ventures has a proven and stable team of experts available for short or long term work. Our core team is supported by a network of partners and independent associates. Our Products Strategy
  • 62. Debating technologies and standards with AMF Ventures’ experts, is a practical means of helping to determine the risks and benefits associated with technology choice. AMF Ventures has helped debate the benefits of:- i. platforms and API’s with operators; ii. software with system designers; iii. handset OS with manufactures, and; iv. SDK’s with developers. Technology decisions Turning initial traction into sustainable market momentum requires a balance between tactical and strategic activities. Sales teams that focus only on short-term, tactical revenue opportunities do not lay the sales foundation for longer-term program. Conversely, teams that focus on strategic programmes at the expense of tactical revenue fail to deliver sufficient results soon enough to justify further investment. AMF Ventures can help find the right balance between short-term tactical needs and the longer-term strategic requirements by delivering sales opportunities and sales management. AMF Ventures can delivers a team who will provide hands on delivery, tactical assistance, project management or planning support. We are able to supplement our interim management team from our professional associate network to deliver skilled individuals on a short or long term basis. Tactical revenue Team Support Our team can help you address strategic and tactical implementation projects. Our team is based in London, with partner companies in Germany, France, Spain, Italy, Holland, Japan and USA. Our Products Implementation
  • 63. Diligence requires a deep understanding of the business and the role the business fulfils in the value chain. AMF Ventures is able to act for:- i. an investor seeking to place capital; ii. a purchaser looking to acquire assets or a going concern, and; iii. a seller who wishes to dispose of a business or profit and loss account. Diligence The impact of the decisions made from a financial model is immense. Potential investors, founders and management all see the model from different perspectives and with different motivations. AMF Ventures is able to build or validate a detailed financial model, challenge or confirm the assumptions in the model and provide a judgement about the strength of the approach and scenario sensitivity. AMF Ventures provides an independent external viewpoint and helps develop an investment model. We also provide realistic budgeting and a monthly management reporting tools suited to your business. AMF Ventures is able to provide opinion on company structure and the different types and sources of funding. We are able to advise on clauses, terms and implications, whether a shareholders’ agreement. Financial modelling Structure If the team is critical, and funding is essential, then getting the right structure is crucial. Managing the expectations is the indispensable role AMF Ventures brings to the funding and structuring process. Our Products Funding

×