Each week the Carnival of the Mobilists (COM) brings you the best of mobile blogging from around the Web, curating posts and links submitted by our COMmunity of 100+ influencers and bloggers. Before I dive into this week’s selection of posts, allow me (as COM Coordinator & Connector) to remind everyone that there are still openings to step up and host the COM. I encourage everyone to check out the Host Schedule and which dates you would like to reserve.
I might add that hosts also get great exposure and extra traffic for the week that they host. (One reason why Alcatel-Lucent Optism, a newcomer to the COM, has already chosen another slot to host the COM in September.) Hosts also benefit from connecting with the COMmunity and can be sure that, once the Carnival is live on their site, bloggers who made the lineup will use their social media channels and voice to amplify your post.
How to host the COM
- The COM generally showcases the top 10 posts chosen from the posts that were submitted throughout the week.
- One post in your Carnival should be your Best Post of the Week. Please don’t post a roundup without providing us your pick of the week and your reasons why it sets the bar.
- If possible, try to choose and highlight a newcomer to the Carnival.
- Remember that your job as host is to encourage the reader to visit the post on the contributors’ site and generate traffic for the individual blogger. Therefore, don’t tell the whole story — the purpose of your post is to recap the best of mobile blogging and make the reader want to click through your summary and read the whole post.
You can also check out the COM website for additional detail and a list of past posts.
The week’s lineup:
Lee Cocking over at the Fixmo company blog submits two posts: one a clear, concise and well-written blog expertly outlining the complex concept of Mobile Device Sandboxing (aptly titled Mobile Device Sandboxing 101; and the other (titled BYOD Security Strategies ).The sandboxing post is really more of a primer, providing an overview of the three approaches and ways companies can/must minimize the security risks around embracing BYOD (Bring Your Own Device) in the organization. In Lee’s view the winning approach “needs to be more than just simple application abstraction and should also include increased encryption for data-at-rest and data-in-transit, with enhanced policy control that goes above and beyond the standard application level control (which is usually nothing).” The takeaway: If your organization is embracing BYOD, or you require additional security on consumer-grade devices, then you have to think about including sandboxing requirements when looking at your mobile security and mobile risk management needs. The second post, like the title says, lists recommendations (and provides practical advice) on how companies can secure their organizations against BYOD-related threats.
JT Klepp, a newcomer to the COM, provides us a post that deep dives into what a winning mobile wallet solution will have to offer. He argues a wallet will need to know our context (to serve us the right deal while shopping, for example). And it should also be location-aware. The takeaway: Wallets will have to facilitate payments (that’s table stakes) — but winning wallet solutions will do much, much more.
Steve Smith over at Mediapost muses about how mobile changes all the rules of mobile marketing in The Age of The Branded Action. He shares some examples and campaigns (such as the campaign from Google and Grow Interactive that won the won the Mobile Lions Grand Prix) to show how mobile is not just about targeting and tracking us; it’s about providing us a kind of platform that allows us to engage and act in our interests (and prompted by the brands we appreciate). In the case of the Google campaign the aim was to re-imagine the famous Coke hilltop ad (“I’d like to buy the world a Coke”) and effectively enable us to buy people around the world a Coke. It’s a great piece packed with other great examples to drive his point home — which is why it is my hands-down Pick of the week.
Jonathan Kohl brings us two parts of a three part blog series laying out all the steps you need to follow when setting up a test lab to test your mobile app I was impressed by his hands-on, no-nonsense style, which is surely valuable to developers faced by this challenge. Building an app on a budget? Then read on and follow Jonathan’s extremely helpful hints.
- Creating a Test Lab for Mobile Apps Testing – Part 1: http://www.kohl.ca/2012/creating-a-test-lab-for-mobile-apps-testing-part-1/
- Creating a Test Lab for Mobile Apps Testing – Part 2: http://www.kohl.ca/2012/creating-a-test-lab-for-mobile-apps-testing-part-2/
Chris Reynolds over at MobyAffiliates— an excellent destination providing app developers and marketers numbers, reports, lists and trends — brings us a new review of Mobile Social Gaming Market Statistics and Trends. It’s a massive new industry and Chris details the “huge waves of new value” it has created. As he puts it: “With freemium business models that combine huge mass market usage with multi-million dollar revenue streams from virtual goods and ‘in-app purchases’ this is a huge new market developing.” It’s a worthwhile post — particularly in view of all the app reports underlining that games are the number one genre — full stop.
And finally, here at MobileGroove draws our attention to a guest column contribution from AdaptiveMobile’s Ciaran Bradley. He draws from recent in-house research (a survey of 1,000 smartphone) users to gauge current usage patterns of mobile applications and the awareness of security threats associated levels of subscriber trust in mobile network operators, and the factors that serve to both build and erode that trust. The combined research produced some surprise findings for both operators and consumers. The takeaway: There are many apps and services that compromise our data (and our trust). But don’t expect people to take matters into their own hands. While the majority of respondents voiced concern over what they consider to be an unacceptable breach of their personal privacy, many more simply choose not take action to prevent or limit the damage done by rogue applications. This is where operators can/should/MUST come in to provide the advice and the tools to help users understand the risk and fight back.
The COM touches down at Wapple, so be sure to submit your best mobile blogging by end-Sunday. Remember: You can also submit a post on behalf of another blogger if you think the post is outstanding and should be shared with the larger community of Mobilists.