Recent Endorsements
You've left us really enthused about the whole digital dimension and we're looking forward to developing our plan with your support.
Simon Beardow - Deputy Director, British Council, Vietnam
Simon Beardow - Deputy Director, British Council, Vietnam
Tuesday, 17 January 2017
Final Post
This blog is no longer active as I have retired. Feel free to enjoy the past articles
Tuesday, 11 August 2015
Today's Humour Spot - Digital Ads
Labels:
2015,
cartoon,
digital advertising,
digital marketing,
humor,
humour,
Roger Smith
Monday, 12 January 2015
Who Is Using What In Social Media?
Some interesting findings from a recent Pew Research survey. Five key revelations:
- Facebook remains that most preferred site although its growth has slowed quite dramtically.
- Twitter, Instagram, Pinterest and LinkedIn saw significant increases over the past year in the proportion of online adults who now use their sites
- Men now use Twitter more than women. The reverse was true in 2013.
- More women (77%) than Men (66%) use Facebook
- While LinkedIn is showing strong growth more than 60% use it infrequently
Monday, 22 September 2014
Wealthy But Are They Healthy?
According to an article in Singapore's Straits Times there are thirty two billionaires in Singapore and increase of five over the previous year.
They share a combined wealth of US$65 billion. What is revealing is the patriarchal nature of Singapore business, which remains very much a tradition within the country and its wealthiest families.
As this graphic shows, none of 32 billionaires are women and most of the money is, and has been, made in the financial sector. The majority of these super wealthy are not born and bred Singaporeans but have moved there (or their families have) to take advantage of the country's growth and prosperity.
The global trend shows a 7% growth in the number of billionaires and there are now 2,325 of them according to recent research from Wealth-X and the Swiss bank UBS.
12% of the world's billionaires are women and more than half are self-made. i.e. they did not inherit their fortunes. The old saying about 'money makes money' holds true as most enjoyed an average growth in their wealth of 4.4%.
Even though Singapore is enjoying good growth in the super-rich club the best place to make your fortune remains the USA with China coming a close second.
Labels:
2014,
Asia,
Billionaire,
finance,
millionaires,
Research,
Roger Smith,
Singapore,
Straits Times,
thedigitalconsultant,
UBS,
United States,
Wealth
Tuesday, 16 September 2014
You've Got The Smartphone Now Get The T-Shirt
![]() |
| A Friend In Need - T-Shirt |
Labels:
2014,
clothing,
friendship,
funny,
humor,
humour,
mobile,
relationships,
Roger Smith,
Smartphone,
T-shirt,
tech
Tuesday, 9 September 2014
About Face/s - Instagram Revelations
Labels:
2014,
Color,
colour,
Dan Zarrella,
infographic,
Instagram,
photographs,
Roger Smith,
science,
Social media marketing
Wednesday, 13 August 2014
Picture This
If you thought your Facebook posts that contained an image were working more effectively than the common 'garden' text-only variety, then you are probably right.
As the chart above from Dan Zarrella clearly demonstrates, posts with photos perform far better when it comes to engagement.Wwhereas text posts have been on a constant decline these past four years.
And if you have gone to all trouble of producing a video to entice a response you might want to think again, as they too are nowhere near as effective as photos.
Dan's earlier analysis of 'Selfies' also gives some pointers as to what types of image attract people most. For example, cool colour such as blues and greens elicit more 'Likes' than warmer colours. Great news if your are a martian!
A little bit of self promotion using the tag #pretty also seems to help as does #NoFilter.
Time to get out the camera!
Related articles
Labels:
2014,
content,
Dan Zarrella,
Facebook,
HubSpot,
Roger Smith,
Social media,
thedigitalconsultant
Sunday, 3 August 2014
State of Social Media - Infographic
Labels:
2014,
infographic,
Roger Smith,
Social media
Friday, 1 August 2014
Poster - The Discovery of Wearables
![]() |
The Discovery of Wearables - get a copy here. |
Friday, 4 July 2014
Apps, 'Appless And The Great Unwashed
If you think you are going to make your fortune by producing an app and selling it to the multitudes consider this: out of the thousands of apps available, the average mobile user tends to only use between 22 and 28 apps a month.
Research has shown that young users (18-24) spend more time using apps which comes as little surprise, but they use fewer on average than the 25-34 age group.
Earlier in 2014 comScore released statistics that showed social media apps as being the most popular - Facebook, YouTube and Gmail.
2013 produced a similar result (see below).
But if you are thinking of developing an App and want to know what type of app people are interested in, take a look at AppBrian Stats which lists the top Android searches.
Music, hacking and password breaking apps figured prominently when I last looked which speaks volumes (if you'll excuse the pun) for the use of apps in general.
Perhaps the final word on Apps and the pervasive nature of their use in society are the recent findings from a Bank of America study.
Research has shown that young users (18-24) spend more time using apps which comes as little surprise, but they use fewer on average than the 25-34 age group.
Earlier in 2014 comScore released statistics that showed social media apps as being the most popular - Facebook, YouTube and Gmail.
2013 produced a similar result (see below).
![]() |
| Most popular smartphone apps in the United States in 2013 |
Music, hacking and password breaking apps figured prominently when I last looked which speaks volumes (if you'll excuse the pun) for the use of apps in general.
![]() |
| Top Android searches over the last two weeks |
Apparently mobile phone users would rather give up alcohol, television or chocolate than lose the use of their mobile devices. 47% of U.S. consumers are so wedded to their smartphones that they couldn't last a day without them.
![]() |
| Bank of America Study |
The bank also found that there folk use their mobile banking apps to "perform more sophisticated transactions, such as mobile check deposit" while the younger set would rather forgo using deodorant or toothbrushes than lose the use of their smartphone.
Perhaps it would be wise never to mingle in a crowd of young smartphone users if you are fastidious about personal hygiene!
Monday, 30 June 2014
Today's Comic - Deleting Facebook
Labels:
2014,
comics,
Facebook,
funny,
humor,
humour,
Roger Smith,
Social media,
thedigitalconsultant
Tuesday, 17 June 2014
Not Another Brick In The Wall - A Lesson For All Brand Managers In A Digital World
The leaked internal report from the New York Times details the digital health of the publication and has a number of pointers that any brand manager should be taking note of.
Cultural change seems to be one of the main challenges; a not unfamiliar scenario for many traditional media companies. Unless this change takes place the NYT faces a dire future.
The newsroom is challenged to expand and engage its audience through discover, promotion and connection. Their task is not made any easier by "a cadre of editors who remain unfamiliar with the web.”
Overall it is an alarming indictment of a traditional company that has thus far failed to adapt to the expectations and opportunities of the digital age.
This chart sums up at a glance how new media publications such as the Huffington Post and Buzzfeed have captured the market at the expense of the NYT and other traditional companies.
![]() |
| Source: The New York Times Innovation Report |
To quote the report: “The very first step … should be a deliberate push to abandon our current metaphors of choice — ‘The Wall’ and ‘Church and State’ — which project an enduring need for division. Increased collaboration, done right, does not present any threat to our values of journalistic independence.”
Get the full New York Times Innovation Report here.
It is not possible to do justice to the full content of the NYT document in this blog post, but it is worth reading in its entirety. Their action strategy clearly details what needs to be done to turn the NYT around and will be applicable for many businesses struggling to adapt to a rapidly changing digital world.
Monday, 16 June 2014
Malware Momentum
![]() |
| Kaspersky Cyberstats |
70% of malware is AdWare and 15% are trojans.
The volume of emails sent in the day and numbers of births & deaths also make for quiet reflection.
When it comes to countries that spam generation, China remains way out it front. They generate almost twice as much as the second placegetter, the USA.
At time of writing there have been more than 37 million new internet users in 2014; a ripe crop for potential spammers and malware malcontents.
Wednesday, 28 May 2014
Singapore’s Top 100 People To Know - Nice To Be One Of Them
Nice to be identified as one of the "Singapore’s Top 100 People to Know Online", a list compiled by Sparkah Business Strategy.
Just goes to show that all of that tweeting and blogging over the years sometimes pays off in recognition and free advertising!
Labels:
2014,
Asia,
Business,
Business and Economy,
Roger Smith,
Singapore,
sparkah,
strategy,
thedigitalconsultant
Sunday, 4 May 2014
Big (Data) Does Not Always Mean Better
The essence of his recent article on Big Data is that data big or small, is only of value when it is subjected to robust analysis, but that poor data can never deliver results of worth. What you may be including in your data analysis could have been open to bias and different data can produce quite differing stories.
Methodology matters. So long as we keep in mind that any data set has strengths and weaknesses, the results achieved through Big Data analysis will be of value.
Real-time does not guarantee 'good times' for businesses without an understanding of context and some thoughtful analysis of results.
As Mark Kotkin reminds us "..while there is some general sense that big data arrives at warp-speed and involves huge data-sets from very diverse sources and methodologies, there is no consensus and little discussion of what comprises meaningful and valid “big” data-sets".
The age of Big Data also brings with it other hefty concerns; the security implications of having such data widely available, issues of privacy, ethical considerations of 'open' and 'social' data, and the impact on the political environment.
Being able to access petabyte and exabyte-size data-sets may have become increasingly commonplace but what are the broader implications for society?
Governmental Overview
Such considerations are exercising the minds of governments around the world including the White House, which has established a Big Data and Privacy Working Group.They came to the following six conclusions:
- Big Data saves lives - doctors can now monitor millions of data points providing more immediate and better diagnosis of a patient's condition.
- Big Data makes the economy work better - transport, utilities and services save time and money and can adjust with alacrity to peak demand.
- Bid Data saves taxpayer dollars - predictive analytics helps identify and counteract fraudulent activity
- The balance of power between government and citizen is changed and can "chill the exercise of free speech or free association".
- Intimate personal details can be extracted from Big Data sets - effective consumer privacy protection needs to be in place to counteract this.
- Big data can lead to discrimination - having our lives increasingly governed by algorithms and automated processes can potentially discriminate against certain societal groups, especially in the areas of housing, employment, and credit.
There is a growing realization that current privacy laws are outdated and social and private data already released globally, can never be retrieved.
But as with all data, big or small beware of over-hyping the subject and avoid spurious data associations and correlations.
Accept that Big Data can, and is, changing the world even though some can't yet see it. Obama’s re-election chief number-cruncher is on record as saying “Big data is bullshit” and a Cambridge professor summed it up in one word - "Bollocks".
You may not know your 'Petabytes' from your 'Hadoops' but do you really need to? Big Data is already making big decisions that affect our lives so we need to learn to live with it.
Related articles
Tuesday, 22 April 2014
11 Ideals That Will Change Your Communications
What is the optimum length of time for a presentation to clients? How long should we make make our company video?
These are just two of the questions that are answered in recent collated statistics from a variety of reputable online sources.
Here are eleven statistical findings that should guide your online and offline communications:
These are just two of the questions that are answered in recent collated statistics from a variety of reputable online sources.
Here are eleven statistical findings that should guide your online and offline communications:
- The ideal length of a tweet is 100 characters
- The ideal length of a Facebook post is less than 40 characters
- The ideal length of a Google+ headline is less than 60 characters
- The ideal length of a headline is 6 words
- The ideal length of a blog post is 7 minutes, 1,600 words
- The ideal width of a paragraph is 40-55 characters
- The ideal length of an email subject line 28-39 characters
- The ideal length of a presentation is 18 minutes
- The ideal length of a web page title tag is 55 characters
- The ideal length of a domain name is 8 characters
- The ideal length of a YouTube is 3 to 3 1/2 minutes
And yes, I am aware that the headline for this post is seven words rather than six and that the content is less than 1,600 words; both of which are less than 'ideal'. But we need to remind ourselves that 'ideals' are not absolutes.
Labels:
2014,
communications,
Facebook,
Google,
google+,
Research,
Roger Smith,
statistics,
strategy,
thedigitalconsultant,
Twitter,
YouTube
Sunday, 13 April 2014
Be Still My 'Bleeding'Heart'
This infographic from 10 TopTen Reviews, highlights some of the major trends in the malware industry and reveals several interesting statistics about computer viruses.
You can see the larger original version here.
You can see the larger original version here.
Wednesday, 9 April 2014
Would Sir Like Malware With His Meal?
Just when you thought it was safe to get back into the (digital) water, after ditching Window XP and upgrading your home or office PC, comes the news that hackers managed to get into an oil company's' systems through a Chinese takeaway menu!
Yes... you read correctly, this ingenious restaurant menu hack was the key to grabbing crucial company data.
How did they do it? According to the report in the New York Times, "hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business’s vast computer network".
This form of infiltration is referred to as watering hole attack. Just as predatory crocodile lurks by a watering hole in the Masai Mara ready to pounce on a thirsty gazelle, so does this malware await its opportunity.
And no, before you ask, I doubt if Edward Snowden every set foot in this restaurant but it does go to prove just how clever and pervasive cybercrime has become.
Any system or device that uses software is now prone to these types of attack whether it be climate control systems, printers or even vending machines. Once you can break into one device you have a pathway to break into an enterprises' entire system. I doubt if many people truly appreciate the sophistication and cunning of today's cyber criminals and spooks.
The NYT article also details that 23-70% of attacks dealt with by network security agencies emanate from third party devices. It is also worth mentioning that many of the devices mentioned above such as vending machines (and surprisingly ATMs) still run of Windows XP and as of this month, Microsoft has ceased its support for this software leaving it even more vulnerable.
30% of the world's personal computers still run on Windows XP which represents a massive challenge to stopping the proliferation of malware. If you have a spare £5.5m you can always do what the UK government has just done and buy yourself some extra breathing space. But for most mere mortals such as yours truly, this was not an option.
Ransomware attacks, which as the same suggest hijack and lock a system until a ransom is paid, grew by 500% in 2013. Cryptolocker is the best known of this type of malware.
I have made a mental note to be more careful when selecting from a menu in a restaurant in the future. The 'Chef's Special' may not turn out to be quite what it seems at first glance.
Yes... you read correctly, this ingenious restaurant menu hack was the key to grabbing crucial company data.
How did they do it? According to the report in the New York Times, "hackers infected with malware the online menu of a Chinese restaurant that was popular with employees. When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business’s vast computer network".
This form of infiltration is referred to as watering hole attack. Just as predatory crocodile lurks by a watering hole in the Masai Mara ready to pounce on a thirsty gazelle, so does this malware await its opportunity.
And no, before you ask, I doubt if Edward Snowden every set foot in this restaurant but it does go to prove just how clever and pervasive cybercrime has become.
Any system or device that uses software is now prone to these types of attack whether it be climate control systems, printers or even vending machines. Once you can break into one device you have a pathway to break into an enterprises' entire system. I doubt if many people truly appreciate the sophistication and cunning of today's cyber criminals and spooks.
The NYT article also details that 23-70% of attacks dealt with by network security agencies emanate from third party devices. It is also worth mentioning that many of the devices mentioned above such as vending machines (and surprisingly ATMs) still run of Windows XP and as of this month, Microsoft has ceased its support for this software leaving it even more vulnerable.
30% of the world's personal computers still run on Windows XP which represents a massive challenge to stopping the proliferation of malware. If you have a spare £5.5m you can always do what the UK government has just done and buy yourself some extra breathing space. But for most mere mortals such as yours truly, this was not an option.
The Year of the Mega Breach
Symantec's most recent Internet Security Report 2014 labelled 2013 as the Year of the Mega Breach as the number of attacks were 62 percent greater than in 2012, with 253 total breaches. Eight of the breaches last year exposed more than 10 million identities each!![]() |
| Source: Symantec Corporation - Internet Security Threat Report 2014. |
I have made a mental note to be more careful when selecting from a menu in a restaurant in the future. The 'Chef's Special' may not turn out to be quite what it seems at first glance.
Related articles
Cyber criminals hacked ATMs in Europe by injecting malware through USB to break into it
End of Windows XP support spells trouble for some
Snowden documents: NSA infected computers with malware
5 Signs Your Android Smartphone Is Infected With Malware
Prison Locker Ransomware, an upcoming malware threat in 2014
Sophisticated Russian cyber criminal syndicate behind Neiman Marcus breach eluding US authorities
Subscribe to:
Posts (Atom)
Blog Archive
-
▼
2017
(1)
- ▼ 01/15 - 01/22 (1)
-
►
2015
(2)
- ► 08/09 - 08/16 (1)
- ► 01/11 - 01/18 (1)
-
►
2014
(17)
- ► 09/21 - 09/28 (1)
- ► 09/14 - 09/21 (1)
- ► 09/07 - 09/14 (1)
- ► 08/10 - 08/17 (1)
- ► 08/03 - 08/10 (1)
- ► 07/27 - 08/03 (1)
- ► 06/29 - 07/06 (2)
- ► 06/15 - 06/22 (2)
- ► 05/25 - 06/01 (1)
- ► 05/04 - 05/11 (1)
- ► 04/20 - 04/27 (1)
- ► 04/13 - 04/20 (1)
- ► 04/06 - 04/13 (1)
- ► 03/02 - 03/09 (1)
- ► 01/12 - 01/19 (1)
-
►
2013
(34)
- ► 12/29 - 01/05 (1)
- ► 12/08 - 12/15 (1)
- ► 11/24 - 12/01 (2)
- ► 11/17 - 11/24 (1)
- ► 11/10 - 11/17 (2)
- ► 10/27 - 11/03 (1)
- ► 10/13 - 10/20 (1)
- ► 09/22 - 09/29 (1)
- ► 09/01 - 09/08 (1)
- ► 08/18 - 08/25 (1)
- ► 08/04 - 08/11 (1)
- ► 07/28 - 08/04 (1)
- ► 07/07 - 07/14 (1)
- ► 06/30 - 07/07 (1)
- ► 06/23 - 06/30 (1)
- ► 06/16 - 06/23 (1)
- ► 06/02 - 06/09 (2)
- ► 05/19 - 05/26 (1)
- ► 05/12 - 05/19 (1)
- ► 05/05 - 05/12 (1)
- ► 04/21 - 04/28 (1)
- ► 03/31 - 04/07 (1)
- ► 03/17 - 03/24 (1)
- ► 03/10 - 03/17 (1)
- ► 03/03 - 03/10 (1)
- ► 02/24 - 03/03 (1)
- ► 02/10 - 02/17 (1)
- ► 02/03 - 02/10 (1)
- ► 01/27 - 02/03 (2)
- ► 01/06 - 01/13 (1)
-
►
2012
(76)
- ► 12/30 - 01/06 (1)
- ► 12/16 - 12/23 (2)
- ► 12/09 - 12/16 (1)
- ► 11/25 - 12/02 (3)
- ► 11/18 - 11/25 (1)
- ► 11/11 - 11/18 (2)
- ► 11/04 - 11/11 (1)
- ► 10/28 - 11/04 (2)
- ► 10/21 - 10/28 (2)
- ► 10/07 - 10/14 (2)
- ► 09/23 - 09/30 (1)
- ► 09/16 - 09/23 (1)
- ► 09/09 - 09/16 (1)
- ► 09/02 - 09/09 (1)
- ► 08/26 - 09/02 (1)
- ► 08/19 - 08/26 (1)
- ► 08/12 - 08/19 (1)
- ► 07/29 - 08/05 (1)
- ► 07/22 - 07/29 (2)
- ► 07/15 - 07/22 (3)
- ► 07/08 - 07/15 (1)
- ► 07/01 - 07/08 (2)
- ► 06/24 - 07/01 (1)
- ► 06/17 - 06/24 (2)
- ► 06/10 - 06/17 (1)
- ► 06/03 - 06/10 (1)
- ► 05/20 - 05/27 (3)
- ► 05/13 - 05/20 (1)
- ► 05/06 - 05/13 (2)
- ► 04/29 - 05/06 (3)
- ► 04/22 - 04/29 (1)
- ► 04/08 - 04/15 (2)
- ► 04/01 - 04/08 (3)
- ► 03/25 - 04/01 (1)
- ► 03/18 - 03/25 (2)
- ► 03/11 - 03/18 (2)
- ► 03/04 - 03/11 (1)
- ► 02/26 - 03/04 (1)
- ► 02/19 - 02/26 (2)
- ► 02/12 - 02/19 (2)
- ► 02/05 - 02/12 (1)
- ► 01/29 - 02/05 (1)
- ► 01/22 - 01/29 (2)
- ► 01/15 - 01/22 (2)
- ► 01/08 - 01/15 (1)
- ► 01/01 - 01/08 (5)
-
►
2011
(139)
- ► 12/25 - 01/01 (4)
- ► 12/18 - 12/25 (1)
- ► 12/11 - 12/18 (2)
- ► 12/04 - 12/11 (2)
- ► 11/27 - 12/04 (2)
- ► 11/20 - 11/27 (1)
- ► 11/13 - 11/20 (3)
- ► 11/06 - 11/13 (1)
- ► 10/30 - 11/06 (2)
- ► 10/23 - 10/30 (3)
- ► 10/16 - 10/23 (3)
- ► 10/09 - 10/16 (3)
- ► 10/02 - 10/09 (4)
- ► 09/25 - 10/02 (1)
- ► 09/18 - 09/25 (4)
- ► 09/11 - 09/18 (5)
- ► 09/04 - 09/11 (3)
- ► 08/28 - 09/04 (4)
- ► 08/21 - 08/28 (2)
- ► 08/14 - 08/21 (5)
- ► 08/07 - 08/14 (4)
- ► 07/31 - 08/07 (2)
- ► 07/24 - 07/31 (3)
- ► 07/17 - 07/24 (4)
- ► 07/10 - 07/17 (2)
- ► 07/03 - 07/10 (3)
- ► 06/26 - 07/03 (4)
- ► 06/19 - 06/26 (1)
- ► 06/12 - 06/19 (4)
- ► 06/05 - 06/12 (2)
- ► 05/29 - 06/05 (5)
- ► 05/22 - 05/29 (2)
- ► 05/15 - 05/22 (2)
- ► 05/08 - 05/15 (1)
- ► 05/01 - 05/08 (5)
- ► 04/24 - 05/01 (4)
- ► 04/17 - 04/24 (2)
- ► 04/10 - 04/17 (4)
- ► 04/03 - 04/10 (3)
- ► 03/27 - 04/03 (2)
- ► 03/20 - 03/27 (2)
- ► 03/13 - 03/20 (2)
- ► 03/06 - 03/13 (1)
- ► 02/27 - 03/06 (1)
- ► 02/20 - 02/27 (2)
- ► 02/13 - 02/20 (2)
- ► 02/06 - 02/13 (2)
- ► 01/30 - 02/06 (3)
- ► 01/23 - 01/30 (2)
- ► 01/16 - 01/23 (2)
- ► 01/09 - 01/16 (3)
- ► 01/02 - 01/09 (3)
-
►
2010
(102)
- ► 12/26 - 01/02 (2)
- ► 12/19 - 12/26 (3)
- ► 12/12 - 12/19 (5)
- ► 12/05 - 12/12 (1)
- ► 11/28 - 12/05 (4)
- ► 11/21 - 11/28 (3)
- ► 11/14 - 11/21 (4)
- ► 11/07 - 11/14 (2)
- ► 10/31 - 11/07 (4)
- ► 10/24 - 10/31 (2)
- ► 10/17 - 10/24 (2)
- ► 10/10 - 10/17 (3)
- ► 10/03 - 10/10 (3)
- ► 09/26 - 10/03 (1)
- ► 09/19 - 09/26 (2)
- ► 09/12 - 09/19 (1)
- ► 09/05 - 09/12 (2)
- ► 08/29 - 09/05 (1)
- ► 08/22 - 08/29 (4)
- ► 08/15 - 08/22 (3)
- ► 08/08 - 08/15 (1)
- ► 08/01 - 08/08 (3)
- ► 07/25 - 08/01 (3)
- ► 07/18 - 07/25 (2)
- ► 07/11 - 07/18 (2)
- ► 07/04 - 07/11 (4)
- ► 06/27 - 07/04 (3)
- ► 06/20 - 06/27 (1)
- ► 06/13 - 06/20 (4)
- ► 06/06 - 06/13 (4)
- ► 05/30 - 06/06 (6)
- ► 05/23 - 05/30 (6)
- ► 05/16 - 05/23 (4)
- ► 05/09 - 05/16 (3)
- ► 05/02 - 05/09 (4)



























