SlideShare ist ein Scribd-Unternehmen logo
1 von 23
 
Executive Summary ,[object Object],[object Object],[object Object]
THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily.  Instead they use text messaging and social media to communicate DIGITAL COMMUNICATION LIVES FOREVER SENDERS HAVE NO CONTROL People don’t think about the fact that the information lives forever… They don’t realize the effect that it can have on them… and their future.
Media Coverage
THE IMPORTANCE OF IMPERMANENCE Example #1:  Mark Zuckerberg To:  “A Friend” Subject:  Facebook Users What if, one day after this message was sent, it was deleted from the receiver’s device, the sender’s device, and all servers in -between
THE IMPORTANCE OF IMPERMANENCE E xample #2:  Erik Kade To:  Mark Norris VP, Sales Subject:  While in client meeting texting to determine what points to negotiate on. What if these messages were sent to delete on read so that 1 minute after they were opened the were deleted?
USE AT YOUR OWN RISK Example #1:  Kimberly Swann Where:  Facebook What:  Posted  'im so totally  bord!!!’ Result:  Loss of job What if Kim communicated with her friends in a manner that would not allow others to see her messages?
USE AT YOUR OWN RISK Example #2:  Stacy Snyder Where:  MySpace What:  Friend posted a picture of her at a party with the caption  ‘Drunken Pirate’ Result:  Denied Teaching Degree What if Stacy controlled what people did with pictures of her that she sent them?
USE AT YOUR OWN RISK Example #3:  Jesse Logan Where:  Text Message What:  Shared nude photos with her boyfriend via text. Result:  Suicide What if the picture she texted was not able to be forwarded and deleted itself after a set lifespan.
THE TIGERTEXT VISION ,[object Object],[object Object],[object Object],DEVELOP THE FIRST SENDER-CONTROLLED MOBILE MESSAGING PLATFORM/NETWORK ,[object Object],[object Object],[object Object],[object Object],All messages sent  SECURELY  and  KEPT PRIVATE
C2C TRACTION ,[object Object],[object Object],[object Object],[object Object],[object Object],BUILDING A STICKY BASE OF CORE USERS ,[object Object]
PERSONAL COMMUNCATION NETWORK
Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control over their personal data claim to be very selective about who they give  personal to and why of respondents are afraid  of personal data being  sold to third parties 76% of respondents are concerned about privacy violations Study conducted by Nokia Siemens Data Protection and Respecting Privacy is a Global Concern
Two Out of Three Consumers Look for a Portal to Manage Their Personal Data ,[object Object],4 6 22 42 27 69% 4 11 31 40 12 52% 4 15 27 42 16 16% 6 13 34 36 10 46% ,[object Object],Global result (n=9186) Mobile provider (n=9115) Internet provider (n=5147) Landline telephone provider (n=6721) 0% 20% 40% 60% 80% 100% Definitely not Probably not Neither yes or no Probably yes Definitely yes
Who do you trust ,[object Object],Decreasing Credibility Global n=min 9,126
Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HIPAA compliant? Do you experience lapses in patient safety due to poor physician or nurse mobile communication?
[object Object],[object Object],[object Object],[object Object],[object Object],Physician Stats   Source: Spyglass Consulting Report July 2010 & PWC Nov 2010
[object Object],[object Object],[object Object],[object Object],[object Object],Manage mobile messaging characteristics for first time TIGERTEXT messages are sent thru a  private gateway  which  reduces costs  while  increases privacy, productivity and flexibility Create Your Own HIPAA Compliant Private Mobile Network The “HIPAATEXT” Solution
Reduces Business Risk RISK  =  Asset Value  x  Vulnerability  x  Threat  x  Probability ,[object Object],[object Object],[object Object],[object Object],*2009 Annual Study: Ponemon Institute $204 per compromised customer record  and $6.75 million per data breach SECURITY THROUGH PRIVACY Business Value 8 CA hospitals fined $800,000 due to recent Privacy Breaches (Nov. 2010)
The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data. We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks."
Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.
 

Weitere ähnliche Inhalte

Was ist angesagt?

A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
UltraUploader
 

Was ist angesagt? (11)

How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
McGregor Watkins
McGregor WatkinsMcGregor Watkins
McGregor Watkins
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Keynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff MossKeynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff Moss
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 

Ähnlich wie Jeffrey Evans Presentation

Privacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products ReportPrivacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products Report
Daniel Allemeier
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 

Ähnlich wie Jeffrey Evans Presentation (20)

Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
FDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing BreifFDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing Breif
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Privacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products ReportPrivacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products Report
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
 
Webinar Mobile Technology Latinos
Webinar Mobile Technology LatinosWebinar Mobile Technology Latinos
Webinar Mobile Technology Latinos
 
FrontlineSMS:Medic for Scotland Malawi Partnership 2009
FrontlineSMS:Medic for Scotland Malawi Partnership 2009FrontlineSMS:Medic for Scotland Malawi Partnership 2009
FrontlineSMS:Medic for Scotland Malawi Partnership 2009
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
PURLs, GURLs & Mobile Marketing (Planet Success 2013)
PURLs, GURLs & Mobile Marketing (Planet Success 2013)PURLs, GURLs & Mobile Marketing (Planet Success 2013)
PURLs, GURLs & Mobile Marketing (Planet Success 2013)
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
 
CFS November
CFS NovemberCFS November
CFS November
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 

Mehr von Mediabistro

Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_Inszi
Mediabistro
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Mediabistro
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody Presentation
Mediabistro
 

Mehr von Mediabistro (20)

Elements of a Successful Job Listing
Elements of a Successful Job ListingElements of a Successful Job Listing
Elements of a Successful Job Listing
 
Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014
 
Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_Inszi
 
Melb oleg2
Melb oleg2Melb oleg2
Melb oleg2
 
Paul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing MelbournePaul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing Melbourne
 
Paul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing MelbournePaul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing Melbourne
 
Angela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing MelbourneAngela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing Melbourne
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
 
Terry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing MelbourneTerry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing Melbourne
 
2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation
 
Gary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing MelbourneGary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing Melbourne
 
James canning inside bitcoin melbourne final
James canning inside bitcoin melbourne finalJames canning inside bitcoin melbourne final
James canning inside bitcoin melbourne final
 
Gst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential PitfallsGst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential Pitfalls
 
Building a trading platform from scratch
Building a trading platform from scratchBuilding a trading platform from scratch
Building a trading platform from scratch
 
Bitcoin Lateral Economics
Bitcoin Lateral EconomicsBitcoin Lateral Economics
Bitcoin Lateral Economics
 
State of Ethereum, and Mining
State of Ethereum, and MiningState of Ethereum, and Mining
State of Ethereum, and Mining
 
Future of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh ZerlanFuture of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh Zerlan
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody Presentation
 
Crypto Law
Crypto LawCrypto Law
Crypto Law
 
Morning Keynote: Bobby Lee
Morning Keynote: Bobby LeeMorning Keynote: Bobby Lee
Morning Keynote: Bobby Lee
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Jeffrey Evans Presentation

  • 1.  
  • 2.
  • 3. THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily. Instead they use text messaging and social media to communicate DIGITAL COMMUNICATION LIVES FOREVER SENDERS HAVE NO CONTROL People don’t think about the fact that the information lives forever… They don’t realize the effect that it can have on them… and their future.
  • 5. THE IMPORTANCE OF IMPERMANENCE Example #1: Mark Zuckerberg To: “A Friend” Subject: Facebook Users What if, one day after this message was sent, it was deleted from the receiver’s device, the sender’s device, and all servers in -between
  • 6. THE IMPORTANCE OF IMPERMANENCE E xample #2: Erik Kade To: Mark Norris VP, Sales Subject: While in client meeting texting to determine what points to negotiate on. What if these messages were sent to delete on read so that 1 minute after they were opened the were deleted?
  • 7. USE AT YOUR OWN RISK Example #1: Kimberly Swann Where: Facebook What: Posted 'im so totally bord!!!’ Result: Loss of job What if Kim communicated with her friends in a manner that would not allow others to see her messages?
  • 8. USE AT YOUR OWN RISK Example #2: Stacy Snyder Where: MySpace What: Friend posted a picture of her at a party with the caption ‘Drunken Pirate’ Result: Denied Teaching Degree What if Stacy controlled what people did with pictures of her that she sent them?
  • 9. USE AT YOUR OWN RISK Example #3: Jesse Logan Where: Text Message What: Shared nude photos with her boyfriend via text. Result: Suicide What if the picture she texted was not able to be forwarded and deleted itself after a set lifespan.
  • 10.
  • 11.
  • 13. Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control over their personal data claim to be very selective about who they give personal to and why of respondents are afraid of personal data being sold to third parties 76% of respondents are concerned about privacy violations Study conducted by Nokia Siemens Data Protection and Respecting Privacy is a Global Concern
  • 14.
  • 15.
  • 16. Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HIPAA compliant? Do you experience lapses in patient safety due to poor physician or nurse mobile communication?
  • 17.
  • 18.
  • 19.
  • 20. The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
  • 21. Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data. We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks."
  • 22. Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.
  • 23.  

Hinweis der Redaktion

  1. Pick consistent word for the industry See next executive summary slide for additional content ideas
  2. Narry Note - we should discuss how to convey the Platform and Marketplace vision your latest UI demonstrates MMN is a downloadable app on any mobile device… Consumers will use this the way they use BBM but cross carrier and cross platform Businesses can also be on this network to communicate with their own customers - given the amount of app clutter today wouldn’t you rather be in a network that has consumer stickiness as apposed to one of hundreds of thousands of app fighting for attention We have built a private gateway that reduces costs and increases privacy and flexibility for all users of this network (consumers and businesses) Business can communicate with customers without fears of duplication and forwarding and with protection to sensitive data. We have to set the stage for the business - Explain the TigerText network. Explain the connection hub. After this slide - Next example is the dynamic use case. – COUPONING – What is the value for them. What is the reason that I want a coupon that disappears. Show some case studies. EXPLAIN THE NETWORK AND GATEWAY TO EXPLAIN WHY PEOPLE ARE ON THE GATEWAY…
  3. These are great “Progress to Date” data points – you can mention them more than once as they are great!
  4. Just like BBM you can communicate back and forth will all of your friends just like BBM. (Show slide with friend communication). As a business you are also in your customers network and they can receive communication from you and will not have to remember to go check the messages. They will be there for them when they want them. It reduces clutter. Business can be a part of the network – Network is a BBM on steroids… We have a threaded message – add a slide showing unified inbox and showing that all the messages com into one unified box where you can easily manage your messages and the messages do not get missed. Show them all coming into the one box. Similar to how Gmail threads messages.