SlideShare ist ein Scribd-Unternehmen logo
1 von 48
BUILDING A ROBUST
MOBILE EXPERIENCE IN
FINANCIAL SERVICES
LUDWIG SCHULZE, CEO, MISTRAL MOBILE
MOBILE PHONES NOW MATTER
...A LOT

2
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
EVERYONE HAS ONE
(ALMOST)
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

3
BUT NOT ’JUST ANOTHER CHANNEL’
A DIFFERENT ANIMAL ENTIRELY...
4

INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
ALWAYS WITH YOU

5
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
DEEPLY PERSONAL
UNLIKE PC-BASED WEB OR ATM
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

6
BUT MOBILE ALSO ENABLES
DISRUPTIVE COMPETITION,
MUCH LIKE WEB BEFORE IT
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

7
WITH 2B NEW MIDDLE CLASS BY 2020;
MOBILE PROVIDES MEANS TO SCALE
8
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
TO WIN IN FINANCIAL SERVICES
IS TO WIN IN MOBILE
9
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
THEREFORE, A ROBUST MOBILE
EXPERIENCE IS CRITICAL
10
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
UNFORTUNATELY,
MOBILE IS ALSO A BIT COMPLICATED

11
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
A HUGE VARIETY OF MOBILE PHONES,
EACH WITH UNIQUE CAPABILITIES

12
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
A HUGE VARIETY
OF MOBILE OPERATORS

13
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
SOME PHONES WITH
DATA / INTERNET ACCESS
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

14
SOME WITHOUT...
(BUT IT ALSO MAY DEPEND ON THE STREET,
WEATHER, NETWORK TRAFFIC...)

15
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
BUT ALL CONSUMERS HAVE HIGH
EXPECTATIONS FOR
PERSONALIZED, EFFICIENT SERVICE
16

INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
48% SAY MOBILE IS THE MOST
IMPORTANT FACTOR IN
CHOOSING A BANK
Source: AlixPartners Mobile Financial Services Tracking Sudy 2012
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

17
AS A RESULT, MOBILE INTERFACE IS
THE MOST PERSONAL LINK TO
YOUR CUSTOMERS

18
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
TEXT INTERFACE
WORKS ON ANY PHONE
19
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
GRAPHICAL EXPERIENCE COMES
WITH MORE ADVANCED PHONES

20
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
BUT BE CAUTIOUS TO ASSUME
YOUR CUSTOMER’S WEALTH BASED
ON THEIR PHONE’S CAPABILITIES
21

INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

© Mistral Mobile 2012

22
BEHIND THE USER INTERFACE,
IS THE HEAVY MACHINERY TO
CARRY THE TRANSACTIONS

23
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
WITH A MOBILE OPERATOR PARTNER?

24
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
AN ALPHABET SOUP OF OPTIONS:
(USSD, SMS, IVR, HTML, JAVA,...)

25
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
USSD
End-User
Reach

SIM Card

Static Apps
Requires
data

Mobile Operator
Independent
Updatable
(without user action)

Interface &
Branding
System
Load
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

26
A NEW SECURITY CHALLENGE
27
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
A MOVING TARGET OF
PRODUCT, REGULATION AND
OPERATING SYSTEMS

28
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
TOO OFTEN LEADING
TO UNSEEN COSTS
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013

29
FOR EXAMPLE, THE HIDDEN BURDEN
OF APPLICATION UPDATES
30
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
INCREASED TRANSACTION
PROCESSING POWER COSTS FOR
INEFFICIENT MOBILE SYSTEMS

31
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
CREATING A ROBUST MOBILE
EXPERIENCE HAS UNIQUE
OPPORTUNITIES & CHALLENGES

32
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
© Mistral Mobile 2012

33
Nokia exits
mobile financial services
market, former leaders
create Mistral
Mobile
Nokia enters mobile
financial services
market
Deep engagement
with industry

1.2 million users and
> 8,000 agents in
Nokia Money launched
< 9 months
in India;
joint-ventures under
development

2012

2011

2008

2010

2009

HISTORY OF MISTRAL MOBILE
34
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
MISTRAL MOBILE POWERS
FINANCIAL SERVICE PROVIDERS

TO REACH EVERYONE

35
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
MOBILE FINANCIAL SERVICES
ON ANY PHONE

© Mistral Mobile 2012

36
© Mistral Mobile 2012

37
© Mistral Mobile 2012

38
© Mistral Mobile 2012

39
© Mistral Mobile 2012

40
© Mistral Mobile 2012

41
© Mistral Mobile 2012

42
OUR SOLUTIONS
PROVIDE MOBILE
APPLICATIONS AND
MIDDLEWARE FOR
ANY TYPE OF
FINANCIAL SERVICE

MONEY MOBILITY
GATEWAY

FINANCIAL
SERVICE
PROVIDER
SYSTEMS

43
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
ENABLING
ANYONE WITH
ANY TYPE OF
MOBILE PHONE

MONEY MOBILITY
GATEWAY

44
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
DEVICES SUPPORTED BY MISTRAL

VOICE-BASED SOLUTIONS
SMS/IVR and full IVR

NATIVE ANDROID
APPLICATIONS

MIDP APPLICATIONS

NATIVE iOS
APPLICATIONS

All APPLICATIONS ARE NATIVE, NOT HTML5 GIVEN SECURITY REQUIREMENTS
45
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
MONEY MOBILITY GATEWAY
ADMINSTRATION

FEATURE #2:
…

FEATURE #3:
…

MONEY
MOBILITY
GATEWAY

FEATURE #1:
SEND MONEY

FEATURE #4:
…

USING BUILDING
BLOCKS WHICH
CAN BE CHANGED
TO INSTANTLY
PROVIDE LATEST
FEATURES FOR
EVERY USER
46
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
REDUCED OPERATING COSTS
Money Mobility SuiteTM Operating Cost Savings
Cost of
Updating &
Adding
Services

Typical Operating Cost

(Indicative)

Cost of
Customer
Support

Cost of
telecom
(vs. USSD)

Cost of
platform
(TPS
reduction)

Operating Cost with Money Mobility saving (indicative)

47
INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
VISIT US AT
BOOTH 4I04
WWW.MISTRALMOBILE.COM
INFO@MISTRALMOBILE.COM
TWITTER @MISTRALMOBILE

Weitere ähnliche Inhalte

Ähnlich wie Building a Robust Mobile Experience in Financial Services - Futurebank 2013 presentation

Africa's Fast Growing Mobile App-etite
Africa's Fast Growing Mobile App-etite Africa's Fast Growing Mobile App-etite
Africa's Fast Growing Mobile App-etite Laine Barnard
 
There's Only One Way to Market in Africa
There's Only One Way to Market in AfricaThere's Only One Way to Market in Africa
There's Only One Way to Market in AfricaLaine Barnard
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Open Money in the Networked Society
Open Money in the Networked SocietyOpen Money in the Networked Society
Open Money in the Networked SocietyEricsson M-Commerce
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Cyren, Inc
 
Government Mobility and Productivity - Presentation from Federal Mobile Compu...
Government Mobility and Productivity - Presentation from Federal Mobile Compu...Government Mobility and Productivity - Presentation from Federal Mobile Compu...
Government Mobility and Productivity - Presentation from Federal Mobile Compu...Market Connections, Inc.
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseCyren, Inc
 
How to Recruit Millennials by Going Mobile and Embracing Company Transparency
How to Recruit Millennials by Going Mobile and Embracing Company TransparencyHow to Recruit Millennials by Going Mobile and Embracing Company Transparency
How to Recruit Millennials by Going Mobile and Embracing Company TransparencyGlassdoor
 
Breaking the MFS Ceiling with an Innovative Implementation
Breaking the MFS Ceiling with an Innovative Implementation Breaking the MFS Ceiling with an Innovative Implementation
Breaking the MFS Ceiling with an Innovative Implementation BSP Media Group
 
The contactless mobile_report_2013_-_mwc13-slide_share
The contactless mobile_report_2013_-_mwc13-slide_shareThe contactless mobile_report_2013_-_mwc13-slide_share
The contactless mobile_report_2013_-_mwc13-slide_shareChristian Chabrerie
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionSelva Orejón
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamicsAir-Fi
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIGMohammad Khatib
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaThibault Cantegrel
 
2013 mobile industry_predictions_survey
2013 mobile industry_predictions_survey2013 mobile industry_predictions_survey
2013 mobile industry_predictions_surveyChetan Sharma
 
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013 Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013 Xuber
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionBasil Hashem
 

Ähnlich wie Building a Robust Mobile Experience in Financial Services - Futurebank 2013 presentation (20)

Africa's Fast Growing Mobile App-etite
Africa's Fast Growing Mobile App-etite Africa's Fast Growing Mobile App-etite
Africa's Fast Growing Mobile App-etite
 
There's Only One Way to Market in Africa
There's Only One Way to Market in AfricaThere's Only One Way to Market in Africa
There's Only One Way to Market in Africa
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Open Money in the Networked Society
Open Money in the Networked SocietyOpen Money in the Networked Society
Open Money in the Networked Society
 
DIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsmaDIA 2_01 mobile money_business_models_gsma
DIA 2_01 mobile money_business_models_gsma
 
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
Webinar: That's the Way the Network Perimeter Crumbles - Cybersecurity for th...
 
Government Mobility and Productivity - Presentation from Federal Mobile Compu...
Government Mobility and Productivity - Presentation from Federal Mobile Compu...Government Mobility and Productivity - Presentation from Federal Mobile Compu...
Government Mobility and Productivity - Presentation from Federal Mobile Compu...
 
Webinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for EnterpriseWebinar: CYREN WebSecurity for Enterprise
Webinar: CYREN WebSecurity for Enterprise
 
How to Recruit Millennials by Going Mobile and Embracing Company Transparency
How to Recruit Millennials by Going Mobile and Embracing Company TransparencyHow to Recruit Millennials by Going Mobile and Embracing Company Transparency
How to Recruit Millennials by Going Mobile and Embracing Company Transparency
 
Breaking the MFS Ceiling with an Innovative Implementation
Breaking the MFS Ceiling with an Innovative Implementation Breaking the MFS Ceiling with an Innovative Implementation
Breaking the MFS Ceiling with an Innovative Implementation
 
The contactless mobile_report_2013_-_mwc13-slide_share
The contactless mobile_report_2013_-_mwc13-slide_shareThe contactless mobile_report_2013_-_mwc13-slide_share
The contactless mobile_report_2013_-_mwc13-slide_share
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
Market dynamics
Market dynamicsMarket dynamics
Market dynamics
 
Banking and Mobile Identity
Banking and Mobile IdentityBanking and Mobile Identity
Banking and Mobile Identity
 
Internet of Things Software SIG
Internet of Things Software SIGInternet of Things Software SIG
Internet of Things Software SIG
 
Innovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsmaInnovation Summit 2015 - 08 - gsma
Innovation Summit 2015 - 08 - gsma
 
2013 mobile industry_predictions_survey
2013 mobile industry_predictions_survey2013 mobile industry_predictions_survey
2013 mobile industry_predictions_survey
 
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013 Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013
Xuber's Head of Product Strategy, John Racher, presents at #TINtech2013
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout Session
 
Mobile Insurance in Africa
Mobile Insurance in AfricaMobile Insurance in Africa
Mobile Insurance in Africa
 

Kürzlich hochgeladen

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Kürzlich hochgeladen (20)

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Building a Robust Mobile Experience in Financial Services - Futurebank 2013 presentation

  • 1. BUILDING A ROBUST MOBILE EXPERIENCE IN FINANCIAL SERVICES LUDWIG SCHULZE, CEO, MISTRAL MOBILE
  • 2. MOBILE PHONES NOW MATTER ...A LOT 2 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 3. EVERYONE HAS ONE (ALMOST) INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 3
  • 4. BUT NOT ’JUST ANOTHER CHANNEL’ A DIFFERENT ANIMAL ENTIRELY... 4 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 5. ALWAYS WITH YOU 5 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 6. DEEPLY PERSONAL UNLIKE PC-BASED WEB OR ATM INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 6
  • 7. BUT MOBILE ALSO ENABLES DISRUPTIVE COMPETITION, MUCH LIKE WEB BEFORE IT INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 7
  • 8. WITH 2B NEW MIDDLE CLASS BY 2020; MOBILE PROVIDES MEANS TO SCALE 8 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 9. TO WIN IN FINANCIAL SERVICES IS TO WIN IN MOBILE 9 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 10. THEREFORE, A ROBUST MOBILE EXPERIENCE IS CRITICAL 10 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 11. UNFORTUNATELY, MOBILE IS ALSO A BIT COMPLICATED 11 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 12. A HUGE VARIETY OF MOBILE PHONES, EACH WITH UNIQUE CAPABILITIES 12 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 13. A HUGE VARIETY OF MOBILE OPERATORS 13 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 14. SOME PHONES WITH DATA / INTERNET ACCESS INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 14
  • 15. SOME WITHOUT... (BUT IT ALSO MAY DEPEND ON THE STREET, WEATHER, NETWORK TRAFFIC...) 15 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 16. BUT ALL CONSUMERS HAVE HIGH EXPECTATIONS FOR PERSONALIZED, EFFICIENT SERVICE 16 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 17. 48% SAY MOBILE IS THE MOST IMPORTANT FACTOR IN CHOOSING A BANK Source: AlixPartners Mobile Financial Services Tracking Sudy 2012 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 17
  • 18. AS A RESULT, MOBILE INTERFACE IS THE MOST PERSONAL LINK TO YOUR CUSTOMERS 18 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 19. TEXT INTERFACE WORKS ON ANY PHONE 19 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 20. GRAPHICAL EXPERIENCE COMES WITH MORE ADVANCED PHONES 20 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 21. BUT BE CAUTIOUS TO ASSUME YOUR CUSTOMER’S WEALTH BASED ON THEIR PHONE’S CAPABILITIES 21 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 22. INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 © Mistral Mobile 2012 22
  • 23. BEHIND THE USER INTERFACE, IS THE HEAVY MACHINERY TO CARRY THE TRANSACTIONS 23 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 24. WITH A MOBILE OPERATOR PARTNER? 24 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 25. AN ALPHABET SOUP OF OPTIONS: (USSD, SMS, IVR, HTML, JAVA,...) 25 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 26. USSD End-User Reach SIM Card Static Apps Requires data Mobile Operator Independent Updatable (without user action) Interface & Branding System Load INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 26
  • 27. A NEW SECURITY CHALLENGE 27 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 28. A MOVING TARGET OF PRODUCT, REGULATION AND OPERATING SYSTEMS 28 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 29. TOO OFTEN LEADING TO UNSEEN COSTS INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013 29
  • 30. FOR EXAMPLE, THE HIDDEN BURDEN OF APPLICATION UPDATES 30 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 31. INCREASED TRANSACTION PROCESSING POWER COSTS FOR INEFFICIENT MOBILE SYSTEMS 31 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 32. CREATING A ROBUST MOBILE EXPERIENCE HAS UNIQUE OPPORTUNITIES & CHALLENGES 32 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 33. © Mistral Mobile 2012 33
  • 34. Nokia exits mobile financial services market, former leaders create Mistral Mobile Nokia enters mobile financial services market Deep engagement with industry 1.2 million users and > 8,000 agents in Nokia Money launched < 9 months in India; joint-ventures under development 2012 2011 2008 2010 2009 HISTORY OF MISTRAL MOBILE 34 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 35. MISTRAL MOBILE POWERS FINANCIAL SERVICE PROVIDERS TO REACH EVERYONE 35 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 36. MOBILE FINANCIAL SERVICES ON ANY PHONE © Mistral Mobile 2012 36
  • 37. © Mistral Mobile 2012 37
  • 38. © Mistral Mobile 2012 38
  • 39. © Mistral Mobile 2012 39
  • 40. © Mistral Mobile 2012 40
  • 41. © Mistral Mobile 2012 41
  • 42. © Mistral Mobile 2012 42
  • 43. OUR SOLUTIONS PROVIDE MOBILE APPLICATIONS AND MIDDLEWARE FOR ANY TYPE OF FINANCIAL SERVICE MONEY MOBILITY GATEWAY FINANCIAL SERVICE PROVIDER SYSTEMS 43 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 44. ENABLING ANYONE WITH ANY TYPE OF MOBILE PHONE MONEY MOBILITY GATEWAY 44 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 45. DEVICES SUPPORTED BY MISTRAL VOICE-BASED SOLUTIONS SMS/IVR and full IVR NATIVE ANDROID APPLICATIONS MIDP APPLICATIONS NATIVE iOS APPLICATIONS All APPLICATIONS ARE NATIVE, NOT HTML5 GIVEN SECURITY REQUIREMENTS 45 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 46. MONEY MOBILITY GATEWAY ADMINSTRATION FEATURE #2: … FEATURE #3: … MONEY MOBILITY GATEWAY FEATURE #1: SEND MONEY FEATURE #4: … USING BUILDING BLOCKS WHICH CAN BE CHANGED TO INSTANTLY PROVIDE LATEST FEATURES FOR EVERY USER 46 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 47. REDUCED OPERATING COSTS Money Mobility SuiteTM Operating Cost Savings Cost of Updating & Adding Services Typical Operating Cost (Indicative) Cost of Customer Support Cost of telecom (vs. USSD) Cost of platform (TPS reduction) Operating Cost with Money Mobility saving (indicative) 47 INFORMATION CONTAINED HEREIN IS CONFIDENTIAL AND MAY CONTAIN TRADE SECRETS. UNAUTHORIZED USE IS STRICTLY PROHIBITED. © MISTRAL MOBILE 2013
  • 48. VISIT US AT BOOTH 4I04 WWW.MISTRALMOBILE.COM INFO@MISTRALMOBILE.COM TWITTER @MISTRALMOBILE

Hinweis der Redaktion

  1. Worldwide mobile penetration is above 90%Few exceptions; Burma &lt;5%
  2. Who here is ready to hand over the mobile phone to their neighbor?How about your PC?How about using the same ATM?How about going to the same bank branch?
  3. WHO WILL OWN RETAIL BANKING IN FUTURE?
  4. People have lots of differen types of mobile phones with different capabilities. Some have smartphones (all Singaporeans do), some have low-end phones. Some have mobile data, some have not.
  5. People have lots of differen types of mobile phones with different capabilities. Some have smartphones (all Singaporeans do), some have low-end phones. Some have mobile data, some have not.
  6. for 48% it’s the prime factor, and especially high amongst the youth – and when considering switching a bank – robust mobile banking experience reduces customer switching considerataions by 50% (AlixPartners Mobile Financial Services Tracking Sudy 2012)The user interface which is in the hands of your customer is the most PERSONAL link between you and the customer besides the staff at your branch. So you want to make sure your customer feels appreciated. Which is going to be hard to achieve if you consider mobile being just an extension of online. Mobile provides capabilities which are not available online, such as personal contacts. People have emotional attachment to their mobiles, not with their PCs (and consider tablets being part of mobiles here)
  7. So you want to make sure your customer feels appreciated. Which is going to be hard to achieve if you consider mobile being just an extension of online. Mobile provides capabilities which are not available online, such as personal contacts. People have emotional attachment to their mobiles, not with their PCs (and consider tablets being part of mobiles here)
  8. Simple SMS, SMS/IVR, USSD and SIM toolkit based solutions for with any mobile phone, and hence allow servicing anyone throught these alternatives. All of these are text based, with SMS/IVR including a voice component to provide security not available with plain SMS solution. With USSD and SIM toolkit the role of the mobile operator is high as they control these access methods.
  9. Native applications and browser-based solutions then require mobile phone to have more advanced capabilities. Featurephones and smartphones do. Both these provide graphical experience to the user. Native applications are dependent on the operating system, or engine, of the phone whereas browser-based approach can be used with any phone having a browser. Browser-based approach, however, does not offer as high security as native applications and the user experience when using with a browser is much more compromised than with native applications.
  10. This phone costs $6K but doesn’t even support JAVA applications!If you want to support all your users with great user experience each of these needs a bit different treatment. Which is fine to begin with but gets interesting when you eventually need to update the stuff. More on that later.
  11. Your customer uses his phone, which in turn needs to talk to your transaction system. In the online work, this is handled with data traffic. In the mobile world, there is mobile data to do the same trick. The fat pipe. But not all of your customer may not have data connections (exclude Singapore – everyone does
  12. Strange bedfellow
  13. New applicationupdates are needed maybe 2-4 times per year to deliver new features, updates to existing features and what nots. If you think you don’t need to do it that often then likely you are falling out of the race amongst your competitors.
  14. But then each tx causes also traffic to the tx system – everytime a person checks their balance, it creates more load. And it costs money to have enough capacity at backend to handle the load. Should not the load be optimized only for financial tx which actually exchange value? Balance queries run typically about 3:1 against financial tx, so smart solution (ie balance maintained in app and updated everytime there is a financial tx, or notification from system) can reduce the backend load caused by mobile transaction requests by 2/3.
  15. But then each tx causes also traffic to the tx system – everytime a person checks their balance, it creates more load. And it costs money to have enough capacity at backend to handle the load. Should not the load be optimized only for financial tx which actually exchange value? Balance queries run typically about 3:1 against financial tx, so smart solution (ie balance maintained in app and updated everytime there is a financial tx, or notification from system) can reduce the backend load caused by mobile transaction requests by 2/3.
  16. But then each tx causes also traffic to the tx system – everytime a person checks their balance, it creates more load. And it costs money to have enough capacity at backend to handle the load. Should not the load be optimized only for financial tx which actually exchange value? Balance queries run typically about 3:1 against financial tx, so smart solution (ie balance maintained in app and updated everytime there is a financial tx, or notification from system) can reduce the backend load caused by mobile transaction requests by 2/3.