SlideShare une entreprise Scribd logo
1  sur  23
 
Executive Summary ,[object Object],[object Object],[object Object]
THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily.  Instead they use text messaging and social media to communicate DIGITAL COMMUNICATION LIVES FOREVER SENDERS HAVE NO CONTROL People don’t think about the fact that the information lives forever… They don’t realize the effect that it can have on them… and their future.
Media Coverage
THE IMPORTANCE OF IMPERMANENCE Example #1:  Mark Zuckerberg To:  “A Friend” Subject:  Facebook Users What if, one day after this message was sent, it was deleted from the receiver’s device, the sender’s device, and all servers in -between
THE IMPORTANCE OF IMPERMANENCE E xample #2:  Erik Kade To:  Mark Norris VP, Sales Subject:  While in client meeting texting to determine what points to negotiate on. What if these messages were sent to delete on read so that 1 minute after they were opened the were deleted?
USE AT YOUR OWN RISK Example #1:  Kimberly Swann Where:  Facebook What:  Posted  'im so totally  bord!!!’ Result:  Loss of job What if Kim communicated with her friends in a manner that would not allow others to see her messages?
USE AT YOUR OWN RISK Example #2:  Stacy Snyder Where:  MySpace What:  Friend posted a picture of her at a party with the caption  ‘Drunken Pirate’ Result:  Denied Teaching Degree What if Stacy controlled what people did with pictures of her that she sent them?
USE AT YOUR OWN RISK Example #3:  Jesse Logan Where:  Text Message What:  Shared nude photos with her boyfriend via text. Result:  Suicide What if the picture she texted was not able to be forwarded and deleted itself after a set lifespan.
THE TIGERTEXT VISION ,[object Object],[object Object],[object Object],DEVELOP THE FIRST SENDER-CONTROLLED MOBILE MESSAGING PLATFORM/NETWORK ,[object Object],[object Object],[object Object],[object Object],All messages sent  SECURELY  and  KEPT PRIVATE
C2C TRACTION ,[object Object],[object Object],[object Object],[object Object],[object Object],BUILDING A STICKY BASE OF CORE USERS ,[object Object]
PERSONAL COMMUNCATION NETWORK
Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control over their personal data claim to be very selective about who they give  personal to and why of respondents are afraid  of personal data being  sold to third parties 76% of respondents are concerned about privacy violations Study conducted by Nokia Siemens Data Protection and Respecting Privacy is a Global Concern
Two Out of Three Consumers Look for a Portal to Manage Their Personal Data ,[object Object],4 6 22 42 27 69% 4 11 31 40 12 52% 4 15 27 42 16 16% 6 13 34 36 10 46% ,[object Object],Global result (n=9186) Mobile provider (n=9115) Internet provider (n=5147) Landline telephone provider (n=6721) 0% 20% 40% 60% 80% 100% Definitely not Probably not Neither yes or no Probably yes Definitely yes
Who do you trust ,[object Object],Decreasing Credibility Global n=min 9,126
Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HIPAA compliant? Do you experience lapses in patient safety due to poor physician or nurse mobile communication?
[object Object],[object Object],[object Object],[object Object],[object Object],Physician Stats   Source: Spyglass Consulting Report July 2010 & PWC Nov 2010
[object Object],[object Object],[object Object],[object Object],[object Object],Manage mobile messaging characteristics for first time TIGERTEXT messages are sent thru a  private gateway  which  reduces costs  while  increases privacy, productivity and flexibility Create Your Own HIPAA Compliant Private Mobile Network The “HIPAATEXT” Solution
Reduces Business Risk RISK  =  Asset Value  x  Vulnerability  x  Threat  x  Probability ,[object Object],[object Object],[object Object],[object Object],*2009 Annual Study: Ponemon Institute $204 per compromised customer record  and $6.75 million per data breach SECURITY THROUGH PRIVACY Business Value 8 CA hospitals fined $800,000 due to recent Privacy Breaches (Nov. 2010)
The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data. We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks."
Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.
 

Contenu connexe

Tendances

A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
UltraUploader
 

Tendances (11)

How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
McGregor Watkins
McGregor WatkinsMcGregor Watkins
McGregor Watkins
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Secure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-MailSecure and Reliable Data Transmission in Generalized E-Mail
Secure and Reliable Data Transmission in Generalized E-Mail
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Keynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff MossKeynote : CODE BLUE in the ICU! by Jeff Moss
Keynote : CODE BLUE in the ICU! by Jeff Moss
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 

Similaire à Jeffrey Evans Presentation

Privacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products ReportPrivacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products Report
Daniel Allemeier
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 

Similaire à Jeffrey Evans Presentation (20)

Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
FDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing BreifFDMK 320 C3P4 Marketing Breif
FDMK 320 C3P4 Marketing Breif
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Privacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products ReportPrivacy Information You NEED to Know | Dental Products Report
Privacy Information You NEED to Know | Dental Products Report
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...
 
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
 
Webinar Mobile Technology Latinos
Webinar Mobile Technology LatinosWebinar Mobile Technology Latinos
Webinar Mobile Technology Latinos
 
FrontlineSMS:Medic for Scotland Malawi Partnership 2009
FrontlineSMS:Medic for Scotland Malawi Partnership 2009FrontlineSMS:Medic for Scotland Malawi Partnership 2009
FrontlineSMS:Medic for Scotland Malawi Partnership 2009
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
PURLs, GURLs & Mobile Marketing (Planet Success 2013)
PURLs, GURLs & Mobile Marketing (Planet Success 2013)PURLs, GURLs & Mobile Marketing (Planet Success 2013)
PURLs, GURLs & Mobile Marketing (Planet Success 2013)
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Getting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sitesGetting users to trust your Mobile Apps and Mobile Web sites
Getting users to trust your Mobile Apps and Mobile Web sites
 
CFS November
CFS NovemberCFS November
CFS November
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 

Plus de Mediabistro

Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_Inszi
Mediabistro
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Mediabistro
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody Presentation
Mediabistro
 

Plus de Mediabistro (20)

Elements of a Successful Job Listing
Elements of a Successful Job ListingElements of a Successful Job Listing
Elements of a Successful Job Listing
 
Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014
 
Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_Inszi
 
Melb oleg2
Melb oleg2Melb oleg2
Melb oleg2
 
Paul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing MelbournePaul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing Melbourne
 
Paul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing MelbournePaul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing Melbourne
 
Angela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing MelbourneAngela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing Melbourne
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
 
Terry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing MelbourneTerry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing Melbourne
 
2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation
 
Gary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing MelbourneGary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing Melbourne
 
James canning inside bitcoin melbourne final
James canning inside bitcoin melbourne finalJames canning inside bitcoin melbourne final
James canning inside bitcoin melbourne final
 
Gst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential PitfallsGst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential Pitfalls
 
Building a trading platform from scratch
Building a trading platform from scratchBuilding a trading platform from scratch
Building a trading platform from scratch
 
Bitcoin Lateral Economics
Bitcoin Lateral EconomicsBitcoin Lateral Economics
Bitcoin Lateral Economics
 
State of Ethereum, and Mining
State of Ethereum, and MiningState of Ethereum, and Mining
State of Ethereum, and Mining
 
Future of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh ZerlanFuture of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh Zerlan
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody Presentation
 
Crypto Law
Crypto LawCrypto Law
Crypto Law
 
Morning Keynote: Bobby Lee
Morning Keynote: Bobby LeeMorning Keynote: Bobby Lee
Morning Keynote: Bobby Lee
 

Dernier

Dernier (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Jeffrey Evans Presentation

  • 1.  
  • 2.
  • 3. THE IMPORTANCE OF TEXTING More than 4 billion text messages are sent in the US daily 90% of teens do not check email daily. Instead they use text messaging and social media to communicate DIGITAL COMMUNICATION LIVES FOREVER SENDERS HAVE NO CONTROL People don’t think about the fact that the information lives forever… They don’t realize the effect that it can have on them… and their future.
  • 5. THE IMPORTANCE OF IMPERMANENCE Example #1: Mark Zuckerberg To: “A Friend” Subject: Facebook Users What if, one day after this message was sent, it was deleted from the receiver’s device, the sender’s device, and all servers in -between
  • 6. THE IMPORTANCE OF IMPERMANENCE E xample #2: Erik Kade To: Mark Norris VP, Sales Subject: While in client meeting texting to determine what points to negotiate on. What if these messages were sent to delete on read so that 1 minute after they were opened the were deleted?
  • 7. USE AT YOUR OWN RISK Example #1: Kimberly Swann Where: Facebook What: Posted 'im so totally bord!!!’ Result: Loss of job What if Kim communicated with her friends in a manner that would not allow others to see her messages?
  • 8. USE AT YOUR OWN RISK Example #2: Stacy Snyder Where: MySpace What: Friend posted a picture of her at a party with the caption ‘Drunken Pirate’ Result: Denied Teaching Degree What if Stacy controlled what people did with pictures of her that she sent them?
  • 9. USE AT YOUR OWN RISK Example #3: Jesse Logan Where: Text Message What: Shared nude photos with her boyfriend via text. Result: Suicide What if the picture she texted was not able to be forwarded and deleted itself after a set lifespan.
  • 10.
  • 11.
  • 13. Beginning to Care 82% 73% 45% 52% of respondents see privacy as an important topic of respondents feel they lack control over their personal data claim to be very selective about who they give personal to and why of respondents are afraid of personal data being sold to third parties 76% of respondents are concerned about privacy violations Study conducted by Nokia Siemens Data Protection and Respecting Privacy is a Global Concern
  • 14.
  • 15.
  • 16. Mobile Healthcare – A risk and an opportunity Do your physicians text message to communicate? Is your SMS communication HIPAA compliant? Do you experience lapses in patient safety due to poor physician or nurse mobile communication?
  • 17.
  • 18.
  • 19.
  • 20. The “HIPAATEXT” Solution Expired message Lifespan remaining Lifespan remaining Delivered & read notifications
  • 21. Constantly Pushing the Privacy Envelope On Friday, we expanded the information you are able to share with external websites and applications to include your address and mobile number. ... Over the weekend, we got some useful feedback that we could make people more clearly aware of when they are granting access to this data. We agree, and we are making changes to help ensure you only share this information when you intend to do so. We'll be working to launch these updates as soon as possible, and will be temporarily disabling this feature until those changes are ready. We look forward to re-enabling this improved feature in the next few weeks."
  • 22. Big Brother Getting Bolder January 5, 2011 California Supreme Court: Cell Phone Searches Don't Need a Warrant Awful 4th amendment decision in California that searching one's cell phone data does not require a warrant, in a time and place where a cell phone is more like a computer than a phone.
  • 23.  

Notes de l'éditeur

  1. Pick consistent word for the industry See next executive summary slide for additional content ideas
  2. Narry Note - we should discuss how to convey the Platform and Marketplace vision your latest UI demonstrates MMN is a downloadable app on any mobile device… Consumers will use this the way they use BBM but cross carrier and cross platform Businesses can also be on this network to communicate with their own customers - given the amount of app clutter today wouldn’t you rather be in a network that has consumer stickiness as apposed to one of hundreds of thousands of app fighting for attention We have built a private gateway that reduces costs and increases privacy and flexibility for all users of this network (consumers and businesses) Business can communicate with customers without fears of duplication and forwarding and with protection to sensitive data. We have to set the stage for the business - Explain the TigerText network. Explain the connection hub. After this slide - Next example is the dynamic use case. – COUPONING – What is the value for them. What is the reason that I want a coupon that disappears. Show some case studies. EXPLAIN THE NETWORK AND GATEWAY TO EXPLAIN WHY PEOPLE ARE ON THE GATEWAY…
  3. These are great “Progress to Date” data points – you can mention them more than once as they are great!
  4. Just like BBM you can communicate back and forth will all of your friends just like BBM. (Show slide with friend communication). As a business you are also in your customers network and they can receive communication from you and will not have to remember to go check the messages. They will be there for them when they want them. It reduces clutter. Business can be a part of the network – Network is a BBM on steroids… We have a threaded message – add a slide showing unified inbox and showing that all the messages com into one unified box where you can easily manage your messages and the messages do not get missed. Show them all coming into the one box. Similar to how Gmail threads messages.