Wechat ◦ Invented by Xiaolong Zhang (Allen Zhang) ◦ Released by Tencent in 2011 ◦ Main Goal: to Make a ‘Chat App That Would Disrupt SMS’

Total Page:16

File Type:pdf, Size:1020Kb

Wechat ◦ Invented by Xiaolong Zhang (Allen Zhang) ◦ Released by Tencent in 2011 ◦ Main Goal: to Make a ‘Chat App That Would Disrupt SMS’ 7/13/2016 Background Info ◦ Weixin WeChat ◦ Invented by Xiaolong Zhang (Allen Zhang) ◦ Released by Tencent in 2011 ◦ Main goal: to make a ‘chat app that would disrupt SMS’ ◦ August 2011 WeChat adds video clips seven months after their initial launch date along with the “find ◦ Jan 2013 nearby users” feature ◦ WeChat was caught censoring users around the world, caused an international backlash, ◦ March and April 2012 and raised growing concerns over the censorship happening overseas. In March, the app officially had 100 million registered users and a month after came the ◦ Aug2013 name change from “Weixin” to “WeChat.” Many say that this was their first effort to begin ◦ WeChat grows to 100 million registered users outside of China expanding towards the international market. ◦ Summer of 2014 ◦ June 2012 ◦ Companies are no longer focusing on creating apps but instead launching solely as a WeChat failed at going after India seeing how they preferred Facebook and WhatsApp brand account on WeChat. This trend is still ongoing in China today. ◦ July 2012 ◦ March 2015 WeChat adds voice and video calls to their app ◦ Uber gets blocked on WeChat ◦ Summer of 2012 ◦ April 2016 The beginning of the QR code mania. Tencent gave brand accounts the opportunity to ◦ For work purposes, companies and business communication, a special version of WeChat launch on WeChat prompting many companies in China as well as foreign brands to do called Enterprise WeChat (or Qiye Weixin) was launched business on this new app. They were eager to interact with consumers in a much more intimate way. Features Sticker Gallery ◦ Voice Chat • Friend Radar • Favorite ◦ Group Chat Messages ◦ Moments • Group Chat QR ◦ Free Call Code • Chat History ◦ Video Call Backup ◦ Sticker Gallery • Web WeChat ◦ Broadcast • Shake messages • People Nearby • Walkie Talkie 1 7/13/2016 Friend Radar Shake Click "Friend Radar" and tell your friends Everyone who is using the feature Simply press "+" in the top nearby to do the will pop up on your radar screen. right corner and select "Add same. Just tap each icon to add them to Contacts". your contact list. Shake Walkie Talkie available in the latest versions of WeChat for iOS and Android An invitation message will be sent to the group chat's members automatically. Click "+" in a group chat conversation and select "Walkie Talkie". Walkie Talkie Walkie Talkie Members in the Walkie Talkie will hear you Hold the button in the immediately. Only one person can talk at a Press to hide the Walkie Talkie middle. Talk after the tone time. The indicator light will turn red if you window. You can then return to the when the indicator light press the button while others are speaking, Walkie Talkie session by clicking on the turns green. and you won't be able to talk. green bar in group chat or the Walkie Talkie notice message at the top. 2 7/13/2016 Walkie Talkie Wechat Payment Click to quit the Walkie Talkie session. You will no longer receive messages from this session again. Survey done by China Association For Quality in 2015 • 89.3% of respondents will use Wechat Payment/ Alipay for small amount of purchase (around 200 RMB) • 71.8% of respondents choose Wechat Payment/ Alipay because of convenience Wechat Whatsapp Line Tencent Facebook QQ Messenger Main Competitors Group Group Call X Group Group Call Group Call Group Call Chat \ Call \ \ \ Use internet to sent messages Size: 100 Size: 256 Size: 200 Photos, audio messages, users’ location Contacts ID and Phone I.D., email I.D. Facebook ◦ Whatsapp Most popular instant messenger, 1 billion users Wechat I.D. Number & phone I.D. Based in America and owned by Facebook PC Version Download Web Web Download Download Version Version Version Version Version ◦ Line Launched in Japan Micro blog Friends Circle X Timeline QQ Space Facebook 700 million users, popular in Taiwan Purchase Daily Life X Stickers Q Coins X purchase ◦ Tencent QQ Featured X X e.g.Brown e.g. X Also owned by Tencent Characters Cony Penguin 829 million active QQ accounts Apps Thirdparty X Games Games, Facebook operators Line Third party ◦ Facebook Messenger Didi Taxi Camera operators operated by Facebook with 900 million monthly active users Limitation Security : Security: Censored Declining Censored Payment Contact in China problem in China 3.
Recommended publications
  • Chinese Internet Companies and Their Quest for Globalization
    International Conference on Information, Business and Education Technology (ICIBIT 2013) Chinese Internet Companies and Their Quest for Globalization Harlan D. Whatley1 1Swiss Management Center, Zurich, Switzerland Abstract players in the technology market (Sun, 2009). Chinese internet companies have seen an This qualitative research paper unprecedented growth over the past explores the quest for globalization of decade. However, very few are two successful Chinese internet recognized brands outside of China while companies: Baidu and Tencent Holdings. some seek to develop their brands in In this case study, the focus is on the foreign markets. This paper analyzes the marketing strategies of these expanding marketing strategies of two internet multinational enterprises and the companies: Baidu and Tencent and their challenges they face to become quest for globalization. recognized as global brands. All of the firms in this study were founded as Keywords: Baidu, Tencent, internet, private enterprises with no ownership ties branding, marketing, globalization, China to the Chinese government. Furthermore, an analysis of the countries and markets 1. Introduction targeted by the firms is included in the study. In addition to a review of the Innovation efforts by technology current academic literature, interviews companies in China are driven by adding were conducted with marketing and significant value to imported foreign strategy professionals from the technologies or by developing new perspective firms as well as journalists products to satisfy specific domestic that closely follow Chinese internet firms demands (Li, Chen & Shapiro, 2010). and the technology sector. This study on Firms in the emerging market of China do the globalization of Chinese internet not possess the R&D resources that their firms will contribute to marketing developed Western counterparts have.
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • Data Source Diversity in Identifying and Understanding Events
    BABEL BEACON WORLDWIDE: DATA SOURCE DIVERSITY IN IDENTIFYING AND UNDERSTANDING EVENTS Introduction: As the online data landscape continues to exponentially expand, analysts are increasingly challenged to find where key pieces of information are hiding. Because actionable data can be found anywhere online, it is essential to cast the widest possible net over the vast pool of data sources – globally. It is our observation that many analysts, when analyzing publicly available information (PAI), tend to focus on just a few large social media (SM) platforms like Facebook, Instagram, and/or Twitter. Indeed, these data sources are useful for situational awareness in certain areas around the world. But they, in context, comprise only a small portion of the immense available data within the data universe. So, the appropriate question is: “What other data sources are there, relative to my question, that should be queried?” This Beacon explores the importance of leveraging the variety of global data sets by diving into historical social media posts and analyzing conversations they spawned both within and beyond the original posting site. Babel Street analysts winnowed down data from thousands of social media outlets, blogs and message boards, global news outlets, and the dark web to identify where else these posts were being referenced and by whom, in order to pinpoint relevant and potentially actionable intelligence. BLUF: o Focusing PAI research on only a few large SM platforms severely limits the information analysts can derive about ongoing
    [Show full text]
  • Social Media Contracts in the US and China
    DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L.
    [Show full text]
  • Protocol Filter Planning Worksheet, V7.X
    Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger
    [Show full text]
  • Resolving Mobile Communique App Using Classification of Data Mining Technique
    ISSN:0975-9646 M.Mohamed Suhail et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 583-587 Resolving Mobile Communique App Using Classification of Data Mining Technique M.Mohamed Suhail, Lecturer,Department of Computer Science, Jamal Mohamed College, Trichy, K.SyedKousarNiasi, Assistant Professor,Department of Computer Science, Jamal Mohamed College, Trichy, Abstract- A mobile app is a software application Data Mining refers to extracting or “mining” developed specifically for use on small, wireless computing knowledge from large amount of data.Many other terms devices, such as smartphones and tablets, rather than carry a similar or slightly different meaning to Data mining, desktop or laptop computers.On the Internet and mobile such as knowledge mining from data, knowledge app, chatting is talking to other people who are using the extraction, data/pattern analysis, Data archaeology, and Internet at the same time you are. Usually, this "talking" is Data dredging.Many people treat data mining as a synonym the exchange of typed-in messages requiring one site as the for another popularly used term, Knowledge Discovery repository for the messages (or "chat site") and a group of form Data, or KDD.Data mining has attracted a great deal users who take part from anywhere on the Internet.In this of attention in the information industry and in society as a work, we apply classification techniques of data mining whole in recent years, due to the wide availability of huge using a dataset of some mobile applications (eg. whatsapp, amounts of data and the imminent need for turning such Line…etc.,) to analyze the messengers.
    [Show full text]
  • Why Are Some Websites Researched More Than Others? a Review of Research Into the Global Top Twenty Mike Thelwall
    Why are some websites researched more than others? A review of research into the global top twenty Mike Thelwall How to cite this article: Thelwall, Mike (2020). “Why are some websites researched more than others? A review of research into the global top twenty”. El profesional de la información, v. 29, n. 1, e290101. https://doi.org/10.3145/epi.2020.ene.01 Manuscript received on 28th September 2019 Accepted on 15th October 2019 Mike Thelwall * https://orcid.org/0000-0001-6065-205X University of Wolverhampton, Statistical Cybermetrics Research Group Wulfruna Street Wolverhampton WV1 1LY, UK [email protected] Abstract The web is central to the work and social lives of a substantial fraction of the world’s population, but the role of popular websites may not always be subject to academic scrutiny. This is a concern if social scientists are unable to understand an aspect of users’ daily lives because one or more major websites have been ignored. To test whether popular websites may be ignored in academia, this article assesses the volume and citation impact of research mentioning any of twenty major websites. The results are consistent with the user geographic base affecting research interest and citation impact. In addition, site affordances that are useful for research also influence academic interest. Because of the latter factor, however, it is not possible to estimate the extent of academic knowledge about a site from the number of publications that mention it. Nevertheless, the virtual absence of international research about some globally important Chinese and Russian websites is a serious limitation for those seeking to understand reasons for their web success, the markets they serve or the users that spend time on them.
    [Show full text]
  • Corporate Social Responsibility in Chinese Media Industry Subtitle: a Case Study of CCTV and Tencent Language: English Pages: 35
    Corporate Social Responsibility in Chinese Media Industry A Case Study of CCTV and Tencent COURSE: Master Thesis in Media and Communication Science with Specialization in International Communication, 15 hp PROGRAMME: International Communication AUTHOR: Xuan Wang TUTOR: Renira Gambarato SEMESTER: Spring 2018 JÖNKÖPING UNIVERSITY Master thesis, 15 credits School of Education and Communication Course: Master Thesis in Media and Communication Box 1026, SE-551 11 Jönköping, Sweden Science with Specialization in International +46 (0)36 101000 Communication Term: Spring 2018 ABSTRACT Writer(s): Xuan Wang Title: Corporate Social Responsibility in Chinese Media Industry Subtitle: A Case Study of CCTV and Tencent Language: English Pages: 35 This thesis is a case study about Corporate Social Responsibility in Chinese media industry. The implementation of CSR in state-owned media companies and private media companies are different. The role that the government play in Chinese media companies implementing CSR were barely studied before. Since this thesis is a case study, two media companies were chosen for this study. One is CCTV, a state-owned media company, another is Tencent, a private media company. Document analysis was chosen as the main method for the analysis. Stakeholder theory, corporate political connection, and meta-governance are the main theories used in this study. In this thesis, the analysis of implementing CSR is divided into two dimensions, internally and externally implementing CSR. The internal dimension is further analyzed in three aspects, employees and health at work, shareholders, and public welfare and charitable activities. The external dimension is further analyzed in four aspects, customers, business partners, local community, and government.
    [Show full text]
  • Advanced Messaging & Communications Intelligence Service
    Advanced Messaging Communications is “ entering a new visual era, with three out of five chat & Communications app users now regularly making video calls. The COVID-19 pandemic is Intelligence Service accelerating the trend Part of the Digital Consumer Services Service Area Package towards ingrained“ use of Global, in-depth coverage of all types of consumer communication video calling among platforms. Analysis of telco platforms including P2P and A2P SMS consumers. and RCS, and of the major OTT platforms including users, traffic and revenues. Pamela Clark-Dickson Principal Analyst Advanced Messaging and Communications Intelligence Service | RETE-000022 PRODUCT OVERVIEW Advanced Messaging & HOW OMDIA HELPS YOU KEY QUESTIONS ADDRESSED • Size the telco and OTT messaging markets using • What is the size of the telco messaging market, for Communications country-level forecasts P2P and A2P SMS, and RCS? • Size the consumer VoIP and video calling markets • What is the size of the messaging app market, for Intelligence Service using country-level forecasts users, traffic and revenues? Track developments in the OTT Messaging, Social Part of the Digital Consumer Services • • Who are the key communications app players, and Service Area Package Media, and Enhanced Telco Communications what is their market share for users and messaging Services markets using detailed data trackers traffic in key countries? • Analyse multi-country surveys to identify how consumers use communications • How fast is app-based consumer VoIP and video calling growing, and who are the key players? How consumers typically access • How are key social media players addressing issues customer care such as data privacy and the spread of functions from misinformation on their platforms? service providers • What are the key platforms and technologies in the business-to-consumer messaging and communications market? • What role does CPaaS play in B2C messaging and communications? Page 2 Copyright © 2020.
    [Show full text]
  • Memory Forensics for QQ from a Live System
    JOURNAL OF COMPUTERS, VOL. 5, NO. 4, APRIL 2010 541 Memory Forensics for QQ from a Live System Yuhang Gao, Tianjie Cao School of Computer, China University of Mining and Technology Sanhuannanlu, Xuzhou, Jiangsu, 221116, China Email:[email protected], [email protected] Abstract—Our paper details the techniques to collect Besides, QQ promises good security on individual sensitive information of the QQ client, which is the most privacy by encrypting. All files related to privacy are popular instant messaging (IM) in China. We have managed encrypted and not readable without a successful login. to acquire the contact list, the QQ account, the chats Even if we are able to acquire these files, it takes great records, the QQ discussion group, the display names and the efforts to parse them. However, we can collect sensitive contents of network notepad. They are of great interest to the examiners. Besides, as the techniques we use to search information from the physical memory. The QQ client for process are able to reveal terminated and hidden would decrypt all received messages. Therefore, the processes, we are very likely to find sensitive information as physical memory would contain the plaintext of these long as somebody has logged in the QQ client. What’s more, messages. we propose the method of reconstructing the process space Thus it can be seen that the forensics for the QQ client by integrating paging file into memory dump file. We have is different from other instant messaging. The examiners reconstructed the process space of the QQ client in this way need new techniques.
    [Show full text]
  • Instant Messaging Service Reference
    IceWarp Unified Communications Instant Messaging Service Reference Version 10.4 Printed on 16 April, 2012 Contents Instant Messaging 1 Reference ....................................................................................................................................................................... 2 General .............................................................................................................................................................. 2 Services .............................................................................................................................................................. 2 Trusted Hosts ..................................................................................................................................................... 8 Archive/History .................................................................................................................................................. 9 File Transfers between Clients ..................................................................................................................................... 10 Monitoring via IM ......................................................................................................................................................... 12 Monitor Services and Get Your GW Events, Tasks and Notes via IM .................................................. 12 Usage ..................................................................................................................................................
    [Show full text]
  • Tencent QQ Is One of the Two Larger Isps Located in China. They Offer A
    Tencent QQ is one of the two larger ISPs located in China. They offer a protal site that senders can register for that will provide insight into the senders performance. All of this is free however so no additional costs for this. WHITELIST INFORMATION The following information is required for whitelisting: Company Name (matching your business license) Sending domain – ideally use the default address configured for your account. Sending IP (ranges can be added e.g. 1.2.3.4 – 1.2.3.6) Contact – Name of the contact Contact Number – mobile or land line of contact. ICP number – this number is often displayed at the bottom of the .cn version of your website. Business License – image or pdf version of a business document. REGISTRATION To register for this you will need to register a QQ address and then navigate to the site http://openmail.qq.com Select the square launch button highlighted below in red: Disclaimer: This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upo in making purchasing decisions. The development, release, timing, and pricing of any features or functionality described in this document may change and remains at the sole discretion of Oracle Corporation. 1 BRIEF / Tencent QQ Whitelisting & Best Practices Deliverability Intelligence This will ask you to log in using your QQ email address and password: Select the option on the Right of the top and add your details to log in, this will take you through to a form as per below: Copyright © 2020, Oracle and/or its affiliates.
    [Show full text]