Feeds

The new killer app is … MMS

Send a pic from the DeLorean

Internet Security Threat Report 2014

Ditch the iPhone and forget about social media, the new killer app is actually MMS, claims tech author and 3G strategist Tomi Ahonen.

Ahonen told an audience of digital and content executives at MipTV in Cannes that the humble mobile phone trumps iPhones, television and social media as the platform with greatest reach and built-in revenue.

"There are about 100 million iPhones on the platform. Now multiply it against all mobile phones. That's 2 per cent of your audience. If you develop an iPhone app and you are a media brand, you are deliberately ignoring 98 per cent of your available audience. That's a pretty rotten strategy in my mind," he claimed.

He added that with smartphones accounting for just 17 per cent of the world's handsets, the game has not yet changed enough to change the fundamentals.

"If you want to make money now, not some time in the future, stick to SMS and MMS," he said.

Conceding that apps would one day be huge, he said however that it would take at least ten years to get there.

Ahonen dismissed the power of Facebook and Twitter, positing that MMS has 2.4 billion active users today. "MMS is bigger than the total internet. The planet's biggest multimedia platform – that people actually pay for.

"If you want to know how to reach the world, it's not Twitter, not Facebook: it's MMS and its three time bigger than email,” he adds. He warned content players: "If you're in television today and you don't understand MMS, you're a dinosaur. You'll be out of business."

MMS's no-frills sibling, SMS, has 4.2 billion active users of text messaging and 1 in seven people are consuming media content on a mobile phone. "In India today, one-third of all SMS sent is media, not person-to-person messages. This is your future."

He highlighted that with 5.2 billion total mobile phone subscriptions globally – versus 1.7 billion TV sets – the small-screen synergies need to be exploited. Adding that the average person checks handset 150 times a day, once every six-and-a-half minutes.

He said that for "Gen Y", his research shows that "10 per cent of youth think it's okay to send text messages while having sex." Surely there is an app for that. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.