Executive Summary <ul><li>Texting  has become the fastest growing and most prolific form of mobile communication </li></ul...
THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily...
Media Coverage
THE IMPORTANCE OF IMPERMANENCE Example #1:  Mark Zuckerberg To:  “A Friend” Subject:  Facebook Users What if, one day afte...
THE IMPORTANCE OF IMPERMANENCE E xample #2:  Erik Kade To:  Mark Norris VP, Sales Subject:  While in client meeting textin...
USE AT YOUR OWN RISK Example #1:  Kimberly Swann Where:  Facebook What:  Posted  'im so totally  bord!!!’ Result:  Loss of...
USE AT YOUR OWN RISK Example #2:  Stacy Snyder Where:  MySpace What:  Friend posted a picture of her at a party with the c...
USE AT YOUR OWN RISK Example #3:  Jesse Logan Where:  Text Message What:  Shared nude photos with her boyfriend via text. ...
THE TIGERTEXT VISION <ul><li>Sender determines  WHEN A MESSAGE EXPIRES </li></ul><ul><li>TigerTexts  CANNOT BE COPIED & FO...
C2C TRACTION <ul><li>HUNDREDS OF THOUSANDS OF DOWNLOADS  since the launch of the application in  March of 2010 </li></ul><...
PERSONAL COMMUNCATION NETWORK
Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control o...
Two Out of Three Consumers Look for a Portal to Manage Their Personal Data <ul><li>Imagine there was a portal where you co...
Who do you trust <ul><li>To what degree do you trust the following institutions concerning data protection and respecting ...
Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HI...
<ul><li>Security:   Concerns about  “privacy and security&quot;  are cited by 1/3rd of PCPs and 41% of specialists as the ...
<ul><li>All TIGERTEXT messages have a  finite life </li></ul><ul><ul><ul><li>-  Enterprise determines how long all message...
Reduces Business Risk RISK  =  Asset Value  x  Vulnerability  x  Threat  x  Probability <ul><li>TigerText reduces probabil...
The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external website...
Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th am...
 
Upcoming SlideShare
Loading in …5
×

Jeffrey Evans Presentation

671 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
671
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Pick consistent word for the industry See next executive summary slide for additional content ideas
  • Narry Note - we should discuss how to convey the Platform and Marketplace vision your latest UI demonstrates MMN is a downloadable app on any mobile device… Consumers will use this the way they use BBM but cross carrier and cross platform Businesses can also be on this network to communicate with their own customers - given the amount of app clutter today wouldn’t you rather be in a network that has consumer stickiness as apposed to one of hundreds of thousands of app fighting for attention We have built a private gateway that reduces costs and increases privacy and flexibility for all users of this network (consumers and businesses) Business can communicate with customers without fears of duplication and forwarding and with protection to sensitive data. We have to set the stage for the business - Explain the TigerText network. Explain the connection hub. After this slide - Next example is the dynamic use case. – COUPONING – What is the value for them. What is the reason that I want a coupon that disappears. Show some case studies. EXPLAIN THE NETWORK AND GATEWAY TO EXPLAIN WHY PEOPLE ARE ON THE GATEWAY…
  • These are great “Progress to Date” data points – you can mention them more than once as they are great!
  • Just like BBM you can communicate back and forth will all of your friends just like BBM. (Show slide with friend communication). As a business you are also in your customers network and they can receive communication from you and will not have to remember to go check the messages. They will be there for them when they want them. It reduces clutter. Business can be a part of the network – Network is a BBM on steroids… We have a threaded message – add a slide showing unified inbox and showing that all the messages com into one unified box where you can easily manage your messages and the messages do not get missed. Show them all coming into the one box. Similar to how Gmail threads messages.
  • Jeffrey Evans Presentation

    1. 2. Executive Summary <ul><li>Texting has become the fastest growing and most prolific form of mobile communication </li></ul><ul><li>Traditional Texting is inherently limited and void of any control </li></ul><ul><li>TigertText’s mission is to transform text communication forever </li></ul>
    2. 3. THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily. Instead they use text messaging and social media to communicate DIGITAL COMMUNICATION LIVES FOREVER SENDERS HAVE NO CONTROL People don’t think about the fact that the information lives forever… They don’t realize the effect that it can have on them… and their future.
    3. 4. Media Coverage
    4. 5. THE IMPORTANCE OF IMPERMANENCE Example #1: Mark Zuckerberg To: “A Friend” Subject: Facebook Users What if, one day after this message was sent, it was deleted from the receiver’s device, the sender’s device, and all servers in -between
    5. 6. THE IMPORTANCE OF IMPERMANENCE E xample #2: Erik Kade To: Mark Norris VP, Sales Subject: While in client meeting texting to determine what points to negotiate on. What if these messages were sent to delete on read so that 1 minute after they were opened the were deleted?
    6. 7. USE AT YOUR OWN RISK Example #1: Kimberly Swann Where: Facebook What: Posted 'im so totally bord!!!’ Result: Loss of job What if Kim communicated with her friends in a manner that would not allow others to see her messages?
    7. 8. USE AT YOUR OWN RISK Example #2: Stacy Snyder Where: MySpace What: Friend posted a picture of her at a party with the caption ‘Drunken Pirate’ Result: Denied Teaching Degree What if Stacy controlled what people did with pictures of her that she sent them?
    8. 9. USE AT YOUR OWN RISK Example #3: Jesse Logan Where: Text Message What: Shared nude photos with her boyfriend via text. Result: Suicide What if the picture she texted was not able to be forwarded and deleted itself after a set lifespan.
    9. 10. THE TIGERTEXT VISION <ul><li>Sender determines WHEN A MESSAGE EXPIRES </li></ul><ul><li>TigerTexts CANNOT BE COPIED & FORWARDED </li></ul><ul><li>Sender knows when messages have been RECEIVED AND OPENED ON THE RECIPIENT’S DEVICE </li></ul>DEVELOP THE FIRST SENDER-CONTROLLED MOBILE MESSAGING PLATFORM/NETWORK <ul><li>Messages can be sent with RICH MEDIA (pictures, video, voice, documents) </li></ul><ul><li>MESSAGE SIZE NOT LIMITED TO 160 CHARACTERS </li></ul><ul><li>Sender can BRAND MESSAGES </li></ul><ul><li>Sender can MASS BROADCAST MESSAGES </li></ul>All messages sent SECURELY and KEPT PRIVATE
    10. 11. C2C TRACTION <ul><li>HUNDREDS OF THOUSANDS OF DOWNLOADS since the launch of the application in March of 2010 </li></ul><ul><li>OVER 10% of the users OPEN the app 20+ TIMES A DAY </li></ul><ul><li>Messages sent has GROWN 25% in the last 4 MONTHS </li></ul><ul><ul><ul><li>OVER 2.5 MILLION MESSAGES SENT (as of 10/24/2010) </li></ul></ul></ul><ul><ul><ul><li>DOWNLOADED in more than 100 COUNTRIES </li></ul></ul></ul>BUILDING A STICKY BASE OF CORE USERS <ul><li>OVER 10% of the users OPEN the app 20+ TIMES A DAY </li></ul>
    11. 12. PERSONAL COMMUNCATION NETWORK
    12. 13. Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control over their personal data claim to be very selective about who they give personal to and why of respondents are afraid of personal data being sold to third parties 76% of respondents are concerned about privacy violations Study conducted by Nokia Siemens Data Protection and Respecting Privacy is a Global Concern
    13. 14. Two Out of Three Consumers Look for a Portal to Manage Their Personal Data <ul><li>Imagine there was a portal where you could manage and supervise all the permissions you had given to different parties regarding your personal data. Would this be an interesting option for you? </li></ul>4 6 22 42 27 69% 4 11 31 40 12 52% 4 15 27 42 16 16% 6 13 34 36 10 46% <ul><li>Do you think your provider could be a useful partner in helping to manage and protect the circulation of your personal data? </li></ul>Global result (n=9186) Mobile provider (n=9115) Internet provider (n=5147) Landline telephone provider (n=6721) 0% 20% 40% 60% 80% 100% Definitely not Probably not Neither yes or no Probably yes Definitely yes
    14. 15. Who do you trust <ul><li>To what degree do you trust the following institutions concerning data protection and respecting your privacy? </li></ul>Decreasing Credibility Global n=min 9,126
    15. 16. Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HIPAA compliant? Do you experience lapses in patient safety due to poor physician or nurse mobile communication?
    16. 17. <ul><li>Security:  Concerns about “privacy and security&quot; are cited by 1/3rd of PCPs and 41% of specialists as the top concern about adopting mobile health solutions </li></ul><ul><li>Coverage: 78% of Physicians experience difficulty in connecting or communicating with colleagues. </li></ul><ul><li>Communication: Physicians interviewed report they are overwhelmed  by the daily volume of communications received from colleagues, care team members, and patients </li></ul><ul><li>Efficiency: 40% of physicians surveyed said they could eliminate 11% to 30% of office visits through the use of mobile health technologies. </li></ul><ul><ul><li>Such shifts could rewrite physician supply and shortage forecasts for the next decade and beyond. </li></ul></ul>Physician Stats   Source: Spyglass Consulting Report July 2010 & PWC Nov 2010
    17. 18. <ul><li>All TIGERTEXT messages have a finite life </li></ul><ul><ul><ul><li>- Enterprise determines how long all messages live on platform </li></ul></ul></ul><ul><li>Messages are not forwardable or copyable </li></ul><ul><li>Healthcare Provider choose to delete all expired messages off Sender’s and Receiver’s mobile phones while archiving a copy for later retrieval </li></ul><ul><li>TIGERTEXT works across Blackberry, iPhone, Android and Windows operating systems </li></ul>Manage mobile messaging characteristics for first time TIGERTEXT messages are sent thru a private gateway which reduces costs while increases privacy, productivity and flexibility Create Your Own HIPAA Compliant Private Mobile Network The “HIPAATEXT” Solution
    18. 19. Reduces Business Risk RISK = Asset Value x Vulnerability x Threat x Probability <ul><li>TigerText reduces probability of privacy breach to near zero which reduces RISK </li></ul><ul><ul><li>Lower risk of data breach from full message trail not being available </li></ul></ul><ul><ul><li>No data retained thus privacy breach risk significantly reduced </li></ul></ul><ul><li>Text messaging capabilities achieve broader acceptance as valued and trusted business tool </li></ul>*2009 Annual Study: Ponemon Institute $204 per compromised customer record and $6.75 million per data breach SECURITY THROUGH PRIVACY Business Value 8 CA hospitals fined $800,000 due to recent Privacy Breaches (Nov. 2010)
    19. 20. The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
    20. 21. Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data. We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks.&quot;
    21. 22. Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.

    ×