Appcoins Protocol Rests on Three Main Pillars: 1) Transparency, 2) Eq- Uitability and 3) Community-Focused

Total Page:16

File Type:pdf, Size:1020Kb

Appcoins Protocol Rests on Three Main Pillars: 1) Transparency, 2) Eq- Uitability and 3) Community-Focused AppCoins Distributed and Trusted App-based Transactions Protocol Paulo Trezentos Diogo Pires Aptoide Team ISCTE / Aptoide Aptoide December 11, 2017 Version DRAFT 0.50 Abstract Today there are 2.1 bn smartphone users in the world generating more than USD77 bn in annual gross revenue. Those numbers are projected to double by 2020. However, app stores are still riddled with inefficiencies and malware. In-app purchases (IAP) are not accessible to the low-end market, in-app advertising is plagued by too many intermediaries, malware is still prevalent and innovation is slowing down. The reasons are diverse: payment models are not suited for emerging countries and younger generations; there is no trust between the actors of the ecosystem; and there is a lack of standardisation defining clear interfaces and enabling market free entry for new players. The AppCoins network is an open and distributed protocol built on the Ethereum blockchain. It aims to mitigate the current inherent deficiencies of app stores. By marrying blockchain technology with app store technology, app advertising, in-app billing and app-approval can be drastically improved and sped up through disintermediation and redistributing the unlocked value to end-users and developers. \AppCoin" ERC20 token will be used by the developers to advertise their Apps to the users. From every advertising investment inside the app store, 85% goes to the user. The user has to use those coins to buy items (in-app purchase) inside the apps and games, generating the return of the investment to the developers. In parallel, the Advertising and IAB transactions are used to establish the reputation of the developer. The design of the AppCoins protocol rests on three main pillars: 1) transparency, 2) eq- uitability and 3) community-focused. Firstly, open and transparent standards facilitate trust and privacy. Secondly, revenue shares are redistributed away from unnecessary intermediaries to end-users and developers. Thirdly, through open-source code, knowledge is accessible to the community. The current problems in the app stores flows are further described in this document, as well as the risks contained in each of them. Concepts like \proof-of-attribution", use Ethereum network smart contracts and state storage, allowing cryptographically to reach an acceptable digital agreement between users and developers. This new AppCoins power app economy network will be launched within the next 12 months, leveraging on existing 200 million annual unique active users of the Aptoide app store. Token sale proceeds will be used to incentivise developers, OEMs and end-users. By 2022, Aptoide aims that 1.3 bn people use AppCoins powered app stores. CONTENTS Contents 1 Introduction and Problem Statement 3 1.1 Motivation . .3 1.2 Historical perspective . .3 1.3 Advertising . .4 1.4 In-App Billing . .7 1.5 App Approval . .8 1.6 Paper organisation . 10 2 Design of the Solution 11 2.1 Assumptions . 11 2.2 Client side support . 11 2.3 Fraud . 13 2.4 Protocol Overview and sketch . 14 3 AppCoins: Protocol Definition 18 3.1 Advertising . 19 3.1.1 Data Structures . 19 3.1.2 Algorithms' Pseudo-code . 20 3.1.3 Wallet Transactions . 22 3.2 In-App Billing . 23 3.2.1 Data Structures . 23 3.2.2 Algorithms' Pseudo-code . 24 3.2.3 Wallet Transactions . 25 3.3 Developer Rank . 26 3.3.1 Developer Reputation . 27 3.3.2 Data Structures . 27 3.3.3 Algorithms' Pseudo-code . 28 3.3.4 Wallet Transactions . 32 4 Blockchain Limitations and Proposed Approach 32 4.1 Blockchain limits . 33 4.2 Existing technology . 34 4.3 Ethereum and Bitcoin based . 34 4.4 Lightning Network . 34 4.4.1 Raiden . 35 4.4.2 Plasma . 35 4.4.3 OmiseGO . 36 4.5 Independent blockchains . 36 4.5.1 Nxt . 36 4.5.2 Tezos . 37 4.5.3 IOTA . 37 4.6 Proposed Approach . 37 1 CONTENTS 5 Related Work 39 5.1 Related Projects . 39 5.1.1 Basic Attention Token . 39 5.1.2 Kin . 40 5.1.3 Monetha . 41 5.2 Projects Affinity . 42 5.2.1 Advertising . 42 5.2.2 IAB . 42 5.2.3 Developer Reputation . 43 6 Acknowledgements 43 References 43 Legal notice to Investors 47 2 1 INTRODUCTION AND PROBLEM STATEMENT 1 Introduction and Problem Statement 1.1 Motivation In 2016, the Aptoide app store was used to install 1.1 bn apps in 200 million unique devices1. Although the Aptoide brand may - or not - be familiar to the reader before reading this white paper, one out of five young people between the ages of 16 and 25 worldwide uses Aptoide. In certain countries - like Brazil or Mexico2 - that number increases to one out of three. Over this incredible journey to earn the trust of Aptoide users, without any paid acquisition, we discovered that app stores can be much more. The app discovery can be much better. The financial transactions - like advertising and in-app purchases - can be much more efficient. The sharing can be much more powerful. The current state does not benefit enough the developers or the user. It only benefits Google and Apple. In a closed market, they can impose margins and their own distribution rules. The proposed protocol in this document is a call to the community. It is a call to developers, to other app stores, and to users. It is a call to work together towards a free-entry app store market. A market that unlocks the world of in-app purchases to billions of users. A market that benefits the talented developers providing them significant revenue and transparent ways to reach their users. AppCoins envisions a world where app stores compete by innovation and service level. The same way open source and community helped Aptoide to reach 100 million users in 4 years, we are certain that blockchain is the technology that will enable this revolution, providing trust and transparency. If you share this vision, join us on this journey [26], collaborating in the protocol, developing open source software and spreading the word. Changing the app store ecosystem and breaking monopolies. 1.2 Historical perspective App stores are a distribution channel between the developer and the end user. Although soft- ware distribution exists since there is software development, the current model of smartphone became popular with the launch of Apple's App Store in July 2008 and with its pre-load in iPhone 3G. In the same year, but later in August 2008, Google announced the launch of Android Market [42], the app store for Android. These initial app stores followed a centralised model where one entity is responsible for assuring the core features of software distribution: file delivery, app discovery, financial trans- actions and app approval. This centralisation comes with its inherent drawbacks such as little to none transparency and being closed source. As the smartphone user base grew, the centralised model started to reveal additional flaws: a lack of trust and economic inefficiencies. Another weakness of the centralised app economy is the intransparency behind rule-making and enforcement. For instance, apps are commonly censored if they compete with the app 1Aptoide web site is considered the #692 most visited site in the world by SimilarWeb (Sept 2017). 2Aptoide Top 5 countries: Brazil, Mexico, US, India, Italy 3 1 INTRODUCTION AND PROBLEM STATEMENT store owner's economic interests. In addition, collected personal user data (e.g. user age, preferences, apps installed, etc) can be exploited for other purposes. A lack of transparency erodes trust among the participating stakeholders: developers, advertisers, users and Original Equipment Manufacturers (OEM). Moreover, the central authority behind the app store reaps a disproportional high share of the created revenue in the smartphone value chain. Further, centralisation also stifles competition and innovation. The AppCoins network redefines the following three app store core processes: • Advertising inside the app store: Developers advertising to users to install their app or game. There are different advertising models depending on the intended action: CPI (Cost per Installation), CPA (Cost per Action), CPM (Cost per Thousand Impressions) and others. There are different technologies and platforms to support it: Ad networks, Exchanges and RTB (Real Time Bidding). • In-App Purchase (IAP): When users want to unlock premium features inside the app or game, the purchase mechanism is tied to the respective app store. To enable payment transactions, the developer has to either integrate the SDK from the app store or use its API. • App approval: To offer the app in the store, developers have to go through a stringent approval process in which the submitted app is screened by anti-virus and anti-malware tools, as well as static and dynamic code analysis platforms. Some app stores also rely on manual app testing. Not only Developers and OEM manufacturers, will benefit of app stores supporting the AppCoins protocol. Users will benefit as well: 1) easier to transfer money between users in a peer-to-peer way 2) possibility of earning coins by installing and giving attention to a game or even evaluating the quality and safety of an app 3) be censorship resistant and avoiding the censorship potential of a centralized approach. In the next subsections, each of the flows and problems are analysed. 1.3 Advertising The flows presented before are not interacting with each other. Resources and information generated by each flow are siloed from each other. The numerous intermediaries mushroomed to address the lack of trust and integrate the various players in the fragmented market. In the following subsections, we will analyse each of the flows individually and the main problems faced today. For a developer or a publisher, the most natural place to advertise an application or game is where the users are looking for that kind of content: the app store.
Recommended publications
  • On Client Ledger System™ Software
    Focus on Client Ledger System™ Software A Financial MicroSystems, Inc. Publication • Volume 18, Issue 1 • 4th Quarter of 2012 CLS II (1.61) and CLS-DOS (6.3) Updates are Scheduled for Release December 4th Year-end CLS updates for both CLS II and CLS-DOS are currently scheduled for release December 4th. We originally planned to discontinue CLS-DOS at the end of this year, because it has become increasingly difficult for us to make the required programming changes. However, we have decided to release one final year-end update for CLS-DOS and will continue to support it through September 2013. All future development will focus on CLS II. CLS updates include the new 2012 W-2 and 1099/1098 formats for both laser-printed plain-paper and preprinted forms. Dot-matrix preprinted W-2 and 1099 forms are available only in CLS-DOS. Formats for the standard, two-up, preprinted W-2 and W-3 forms are basically unchanged for 2012. However, the 1099- MISC form has alignment changes and formats for the 1099-INT, 1099-DIV, 1099-B, 1099-C, 1098 and 1096 forms are new. All W-2 and W-3 forms (including Copy A) may be printed on plain paper. Submittable 940, 941, 943 and 944 forms may also be printed on plain paper. For 1099, 1098 and 1096 forms, all copies except Copy A may be printed on plain-paper. Copy A must be filed using “official” scannable forms (the IRS may impose a penalty for using non-scannable forms). The CLS updates also include required changes to the federal 940, 941, 943 and 944 forms for the 2012 year-end.
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Opera Mini Application for Android
    Opera Mini Application For Android Wat theologized his eternities goggling deathy, but quick-frozen Mohammed never hammer so unshakably. Fain and neverfringillid headline Tyrone sonever lambently. reapplied his proles! Tracie meows his bibulousness underdevelop someplace, but unrimed Ephrayim This application lies in early on this one knows of applications stored securely for example by that? Viber account to provide only be deactivated since then. Opera Mini is a super lightweight browser that loads web pages faster than what every other browser available. Opera Mini Browser Latest News Photos Videos on Opera. The Opera Mini for Android lets you do everything you any to online without wasting your fireplace plan It's stand fast safe mobile web browser that saves you tons of. Analysis of tomorrow with a few other. The mini application for opera android open multiple devices. Just with our site on a view flash drives against sim swap scammers? Thanks for better alternative software included in multitasking is passionate about how do you can browse, including sms charges may not part of mail and features. Other download option for opera mini Hospedajes Mirta. Activating it for you are you want. Opera mini 16 beta android app has a now released and before downloading the read or full review covering all the features here. It only you sign into your web page title is better your computer. The Opera Mini works the tender as tide original Opera for Android This app update features a similar appearance and functionality but thrive now displays Facebook. With google pixel exclusive skin smoothing makeover tool uses of your computer in total, control a light.
    [Show full text]
  • Living Without Google on Android
    Alternative for Google Apps on Android - living without Google on Android Android without any Google App? What to use instead of Hangouts, Map, Gmail? Is that even possible? And why would anyone want to live without Google? I've been using a lot of different custom ROMs on my devices, so far the two best: plain Cyanogenmod 11 snapshot on the Nexus 4[^1], and MIUI 2.3.2 on the HTC Desire G7[^2]. All the others ( MUIU 5, MIUI 6 unofficial, AOKP, Kaos, Slim, etc ) were either ugly, unusable, too strange or exceptionally problematic on battery life. For a long time, the first step for me was to install the Google Apps, gapps packages for Plays Store, Maps, and so on, but lately they require so much rights on the phone that I started to have a bad taste about them. Then I started to look for alternatives. 1 of 5 So, what to replace with what? Play Store I've been using F-Droid[^3] as my primary app store for a while now, but since it's strictly Free Software[^4] store only, sometimes there's just no app present for your needs; aptoide[^5] comes very handy in that cases. Hangouts I never liked Hangouts since the move from Gtalk although for a little while it was exceptional for video - I guess it ended when the mass started to use it in replacement of Skype and its recent suckyness. For chat only, check out: ChatSecure[^6], Conversations[^7] or Xabber[^8]. All of them is good for Gtalk-like, oldschool client and though Facebook can be configured as XMPP as well, I'd recommend Xabber for that, the other two is a bit flaky with Facebook.
    [Show full text]
  • Apple Business Manager Overview Overview
    Getting Started Guide Apple Business Manager Overview Overview Contents Apple Business Manager is a web-based portal for IT administrators to deploy Overview iPhone, iPad, iPod touch, Apple TV, and Mac all from one place. Working Getting Started seamlessly with your mobile device management (MDM) solution, Apple Configuration Resources Business Manager makes it easy to automate device deployment, purchase apps and distribute content, and create Managed Apple IDs for employees. The Device Enrollment Program (DEP) and the Volume Purchase Program (VPP) are now completely integrated into Apple Business Manager, so organizations can bring together everything needed to deploy Apple devices. These programs will no longer be available starting December 1, 2019. Devices Apple Business Manager enables automated device enrollment, giving organizations a fast, streamlined way to deploy corporate-owned Apple devices and enroll in MDM without having to physically touch or prepare each device. • Simplify the setup process for users by streamlining steps in Setup Assistant, ensuring that employees receive the right configurations immediately upon activation. IT teams can now further customize this experience by providing consent text, corporate branding or modern authentication to employees. • Enable a higher level of control for corporate-owned devices by using supervision, which provides additional device management controls that are not available for other deployment models, including non-removable MDM. • More easily manage default MDM servers by setting a default server that’s based on device type. And you can now manually enroll iPhone, iPad, and Apple TV using Apple Configurator 2, regardless of how you acquired them. Content Apple Business Manager enables organizations to easily buy content in volume.
    [Show full text]
  • Maas360 and Ios
    MaaS360 and iOS A comprehensive guide to Apple iOS Management Table of Contents Introduction Prerequisites Basics and Terminology Integrating MaaS360 with Apple’s Deployment Programs Deployment Settings Enrollment: Manual Enrollment Enrollment: Streamlined Apple Configurator Device View Policy App Management Frequently Asked Questions "Apple’s unified management framework in iOS gives you the best of both worlds: IT is able to configure, manage, and secure devices and control the corporate data flowing through them, while at the same time users are empowered to do great work with the devices they love to use.” -Apple Business “Managing Devices and Corporate Data on iOS” Guide IBM Security / © 2019 IBM Corporation 3 Types of iOS Management “Supervision gives your organization more control iOS supports 3 “styles” of management that will over the iOS, iPadOS, and tvOS devices you own, determine the MDM capabilities on the device. allowing restrictions such as disabling AirDrop or Apple Music, or placing the device in Single App Standard – an out-of-the-box device with no additional Mode. It also provides additional device configurations. Would be enrolled over-the-air via a Safari configurations and features, so you can do things URL or the MaaS360 agent. like silently install apps and filter web usage via a global proxy, to ensure that users’ web traffic stays Supervised – Supervision unlocks the full management within the organization’s guidelines. capabilities available on iOS. Can be automated via the Apple streamlined enrollment program or enabled manually By default, iOS, iPadOS, and tvOS devices are not via Apple configurator. Supervision of an existing device supervised.
    [Show full text]
  • Free Your Android! Not Free As in Free Beer About the FSFE This flyer Was Printed by the Free Software You Don't Have to Pay for the Apps from F-Droid
    Free as in Freedom Free Your Android! Not Free as in Free Beer About the FSFE This flyer was printed by the Free Software You don't have to pay for the apps from F-Droid. A lot Foundation Europe (FSFE), a non-profit organi- of applications from Google Play or Apple's App Store sation dedicated to promoting Free Software Get a are also free of charge. However, Free Software is not and working to build a free digital society. about price, but liberty. Free App Store Access to software de- When you don't control a program, the program termines how we can take for Your Android controls you. Whoever controls the software therefore part in our society. There- controls you. fore, FSFE is dedicated to ensure equal access and For example, nobody is allowed to study how a non- participation in the infor- free app works and what it actually does on your mation age by fighting for phone. Sometimes it just doesn't do exactly what you digital freedom. want, but there are also apps that contain malicious features like leaking your data without your knowledge. Nobody should ever be forced to use software that does not grant the freedoms to use, Running exclusively Free Software on your device puts study, share and improve the software. You you in full control. Even though you may not have the should have the right to shape technology as skills to directly exercise all of your freedom, you you see fit. benefit from a vibrant community that is enabled by freedom and uses it collaboratively.
    [Show full text]
  • How to Disable Gatekeeper and Allow Apps from Anywhere in Macos Sierra
    How to Disable Gatekeeper and Allow Apps From Anywhere in macOS Sierra Gatekeeper, first introduced in OS X Mountain Lion, is a Mac security feature which prevents the user from launching potentially harmful applications. In macOS Sierra, however, Apple made some important changes to Gatekeeper that seemingly limit the choices of power users. But don’t worry, Gatekeeper can still be disabled in Sierra. Here’s how. Stand out at the party or promote your business with colorful powder coated and custom engraved Yeti tumblers from Perfect Etch. Traditionally, Gatekeeper offered three settings of increasing security: anywhere, App Store and identified developers, and App Store only. The first choice, as its name describes, allowed users to launch applications from any source, effectively disabling the Gatekeeper feature. The second choice allowed users to run apps from the Mac App Store as well as from software developers who have registered with Apple and securely sign their applications. Finally, the most secure setting limited users to running apps obtained from the Mac App Store only. While the secure options were good ideas for less experienced Mac users, power users found Gatekeeper to be too limiting and typically sought to disable it by setting it to “Anywhere.” In macOS Sierra, however, the “Anywhere” option is gone, leaving “App Store” and “App Store and identified developers” as the only two options. Disable Gatekeeper in macOS Sierra The Gatekeeper settings can be found in System Preferences > Security & Privacy > General. The Gatekeeper options are located beneath “All apps downloaded from:” with the choice of “Anywhere” missing. Thankfully, the “Anywhere” setting can be restored to Gatekeeper in Sierra with a Terminal command.
    [Show full text]
  • Applications: A
    Applications: A This chapter contains the following sections: • ABC, on page 8 • Abonti, on page 9 • About.com, on page 10 • ABS-CBN, on page 11 • ACA Services, on page 12 • ACAP, on page 13 • Access Network, on page 14 • AccessBuilder, on page 15 • AccuWeather, on page 16 • Ace Hardware Corporation, on page 17 • Acer, on page 18 • AcFun, on page 19 • Achetez Facile, on page 20 • ACI, on page 21 • Acoon.de, on page 22 • ACR-NEMA, on page 23 • Acrobat.com, on page 24 • Active Networks, on page 25 • ActiveSync, on page 26 • Ad Advisor, on page 27 • AD Backup, on page 28 • AD DRS, on page 29 • AD DSAOP, on page 30 • AD DSROL, on page 31 • AD File Replication Service, on page 32 • Ad Marvel, on page 33 • Ad Master, on page 34 • Ad Mob, on page 35 • Ad Nexus, on page 36 • AD NSP, on page 37 • Ad Redirector, on page 38 • AD Restore, on page 39 Applications: A 1 Applications: A • Ad Tech, on page 40 • AD XDS, on page 41 • AD-X Tracking, on page 42 • Ad4mat, on page 43 • Adap.tv, on page 44 • Adaptive Receive Node Scheduling, on page 45 • Adblade, on page 46 • Adcash, on page 47 • Adconion Media Group, on page 48 • Addicting Games, on page 49 • Addictive Mobility, on page 50 • AddThis, on page 51 • AddThis Bot, on page 52 • AddToAny, on page 53 • AdF.ly, on page 54 • AdGear, on page 55 • Adify, on page 56 • AdJuggler, on page 57 • Admasters, on page 58 • Admeld, on page 59 • ADMETA, on page 60 • Admin5, on page 61 • AdNetwork.net, on page 62 • ADNStream, on page 63 • Ado Tube, on page 64 • Adobe Analytics, on page 65 • Adobe Connect, on page 66
    [Show full text]
  • Pokki – End User License Agreement
    POKKI – END USER LICENSE AGREEMENT THIS END USER LICENSE AGREEMENT ("AGREEMENT") GOVERNS YOUR USE OF THE POKKI WEB-CONNECTED DESKTOP APPLICATION ("POKKI APP" or "SOFTWARE") PROVIDED BY POKKI, INC. ("POKKI"). BY DOWNLOADING THIS SOFTWARE, YOU OR THE ENTITY OR COMPANY THAT YOU REPRESENT ("YOU" or "YOUR") ARE UNCONDITIONALLY AGREEING TO BE BOUND BY ALL OF THE TERMS OF THIS AGREEMENT. YOUR USE OF THIS SOFTWARE SHALL ALSO CONSTITUTE ASSENT TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT UNCONDITIONALLY AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT DOWNLOAD OR USE THIS SOFTWARE. IF THESE TERMS ARE CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY LIMITED TO THESE TERMS. 1. LICENSE GRANT. Subject to compliance with all the terms of this Agreement, Pokki, Inc. hereby grants You a limited, personal, non-sublicenseable, non-transferable license to download, install and use (in executable form only) the Software solely for Your personal use and solely in accordance with any documentation that accompanies it. 2. LICENSE RESTRICTIONS. You agree not to, and agree not to permit anyone else to: (i) copy (except for a reasonable number of backup copies) or distribute the Software; (ii) modify, reverse engineer, disassemble, decompile or otherwise attempt to discover the source code or structure, sequence and organization of the Software (except where the foregoing is required by applicable local law, and then only to the extent so permitted); or (iii) license, sell, rent, lease, transfer or host the Software or use the Software for timesharing or service bureau purposes. You shall not remove or obscure any proprietary notices on the Software, and shall reproduce such notices exactly on all permitted copies of the Software.
    [Show full text]
  • Installing and Removing Software
    CHAPTER 28 Installing and Removing Software One of the fun things about running any operating system is the ability to expand it—to add in new software over time to improve your workflow or just enhance entertainment value. Linux is blessed in this regard, because tens of thousands of software titles are avail- able to meet almost every need. However, even if you’ve tracked down the ideal software title, there’s just one barrier to overcome: installing it on your system. Installing software under Ubuntu isn’t the same as with Windows, and indeed you can’t simply install any application you come across on the Internet, because these are most likely to be Windows versions. See Chapter 11 for more information on Linux ver- sions of common Windows applications. Users are afforded a lot more power over what happens to their systems, but this comes at the expense of needing to take a little time to understand the terminology and techniques. That is what you’ll learn in this chapter. Software Installation Basics Installing programs on Windows is relatively easy. If you wish to use the WinZip archive tool, for example, you can browse to the web site, download the installer *ata file, and install the software. Although you might not realize it, a lot of work goes into making this apparently simple task possible. After the original software has been created by the pro- grammers, it must be made into a form that you, the end user, can deal with. The first thing to happen is that the software is compiled.
    [Show full text]
  • Microsoft Store Strategic Audit
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Honors Theses, University of Nebraska-Lincoln Honors Program Spring 4-29-2019 Microsoft Store Strategic Audit James Onnen University of Nebraska - Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/honorstheses Part of the Business Administration, Management, and Operations Commons, and the Business Analytics Commons Onnen, James, "Microsoft Store Strategic Audit" (2019). Honors Theses, University of Nebraska-Lincoln. 168. https://digitalcommons.unl.edu/honorstheses/168 This Thesis is brought to you for free and open access by the Honors Program at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Honors Theses, University of Nebraska-Lincoln by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Microsoft Store Strategic Audit James Onnen April 2019 This paper looks at Microsoft's Universal Store's digital distribution strategies for apps and games and potential strategies Microsoft can use to leverage its store to create value for itself and its users. This paper looks at specific uncaptured markets in gaming that Microsoft could capture. Contents 1 Background 1 2 Situational Analysis 2 2.1 Internal Situational Analysis . 3 2.2 External Situational Analysis . 4 2.2.1 Apps and services . 5 2.2.2 Digital games and Xbox . 5 2.2.3 Threat analysis . 5 2.3 Leadership structure . 7 3 Strategic alternatives 7 3.1 Capture the PC gaming market . 7 3.2 Capture gaming-as-a-service market with cross-platform support . 8 3.3 Convert developers to the Microsoft Store through PWA . 9 4 Strategic Recommendation 10 4.1 Strategic justification .
    [Show full text]