By Billlie Scwab Dunn for Daily Mail Australia

We live in an ever-changing world and now a futurist claims that everyday things we know and love will soon become extinct.

Michael McQueen, from Sydney, believes that time is running out for credit cards, iTunes, car parks, call centres and service stations.

‘This is just the beginning of the changes ahead which will impact how we live, as well as disrupt a large number of industries,’ he said.

McQueen takes a closer look at these five everyday things about to become extinct and why.

1. Car parks

McQueen explained that the think tank RethinkX believe that the self-driving age will see the end of car parks.

‘They predict that by 2027, 90 per cent of passenger miles in the US each year will be travelled in autonomous vehicles and that many of those vehicles will not be owned by the ‘driver’,’ he said.

‘Instead, this 90 percent of travel will be done in driverless Uber-style vehicles, which will make up 60 percent of the vehicles on the road.’

This means once you arrive at your destination there will be no need to park the car as your vehicle may drop you at your destination and then head off to a designated wait area or perhaps even drive home and pick you up later.

Although this research looks at America, if it does will there is a high chance it would trickle down to other countries, such as Australia.

2. Credit cards

McQueen explained that there are a variety of new technologies appearing on the market that will soon make credit cards useless.

One such company who has done this is the financial services Square, who have developed and released technology that will identify you upon entry to a store.

‘Their Pay By Name system detects when a known mobile phone is in range, identifies the buyer, and displays his or her face on a screen so that the person behind the register can simply tap the picture to complete the transaction,’ Mr McQueen said

‘Chinese payment giant Alipay even unveiled technology called ‘Smile to Pay’ in September 2017 which allows customers to verify their identity and ‘pay’ for a meal via facial recognition.’

McQueen explained that there are a variety of new technologies appearing on the market that will make credit cards useless +6
McQueen explained that there are a variety of new technologies appearing on the market that will make credit cards useless

3. iTunes

iTunes burst on the scene in 2001 and it was a service that no one had seen before and has remained relevant for the last 17 years.

This is why people may find it shocking that Mr McQueen believes soon the platform will no longer be in existence.

‘It was recently announced that Apple Music has 38 million paying subscribers, adding nearly 2 million subscribers a month, with more than 6 million trialing the service for free. That’s a lot of people who aren’t downloading music anymore,’ he said.

‘According to both Nielsen Music and BuzzAngle, music downloads suffered double-digit drops last year. And they’ve been sinking for years.’

iTunes burst on the scene in 2001 and it was a service that no one had seen before and has remained relevant for the last 17 years +6
iTunes burst on the scene in 2001 and it was a service that no one had seen before and has remained relevant for the last 17 years

4. Call centres

Using advanced technology to replace humans in certain jobs will most likely save companies money, which is why companies are rushing to implement automated service technology.

Unfortunately for many who rely on it for their income, this includes call centres,

‘By 2020, technology research leader Gartner estimates that AI-powered chatbots will be responsible for a full 85 percent of customer service interactions,’ Mr McQueen said.

‘As Artificial Intelligence advances, reducing reliance on human representatives undoubtedly spells job losses.’

5. Service stations

Many people won’t be able to imagine a world without a service station as the first record of one was in 1913.

Mr McQueen believes that soon they will no longer be around and this will be because of the decrease in people using petrol.

‘The growth of electric vehicles will see demise of need for petrol,’ he said.

By Eric Limer for Popular Mechanics 

Twitter is suggesting all users change their passwords as a precaution after a reported glitch caused some passwords to be stored in plain text. If you’ve ever used your Twitter password for another service, you’d be wise to change it in both places.

Twitter says there is no evidence of a breach, but the error would have allowed any snoopers inside the system to scoop up unprotected passwords with ease. Typically, passwords are “hashed” before they are stored, a process which transforms them password into a unique series of numbers and letters that can’t be translated back into the actually sequence of numbers and letters you type in. This prevents hackers from snagging a phrase they can try on your other accounts.

Even with no evidence of an actual breach, this bug serves as a good reminder for some basic security hygiene. Use unique passwords for every service you use; a password manager can help you keep track of them all. Turn on two-factor authentication where available (it is available on Twitter). And while you’re at it, go look at the apps that have access to your account. These apps, if they’re insecure themselves, can offer hackers a limited way into your account without ever having to figure out your password.

Source: EWN 

Nearly 60 000 South African users have allegedly been impacted by the Facebook/Cambridge Analytica data breach.

The breach which affects more than 87-million Facebook users came after some 270,000-people allowed use of their data by a researcher.

In 2013, a Cambridge University researcher named Aleksandr Kogan created a personality quiz app. Through the app, Kogan scraped the data of all their friends as well, a move allowed by Facebook until 2015.

The researcher then sold the data to Cambridge Analytica, which was against Facebook rules.

A Facebook spokesperson says 33 users in South Africa downloaded the quiz app and the 59,777 were friends of those who would have installed the app elsewhere in the world.

Facebook CEO Mark Zuckerberg says there was a breach of trust between Kogan, Cambridge Analytica and Facebook.

“But it was also a breach of trust between Facebook and the people who share their data with us and expect us to protect it. We need to fix that.”

Zuckerberg says Facebook has a number of plans to prevent something like this happening again.

“First, we will investigate all apps that had access to large amounts of information before we changed our platform to dramatically reduce data access in 2014, and we will conduct a full audit of any app with suspicious activity. We will ban any developer from our platform that does not agree to a thorough audit. And if we find developers that misused personally identifiable information, we will ban them and tell everyone affected by those apps. That includes people whose data Kogan misused here as well.”

The dark side of blue light

By Sam Upton for Two Sides

There’s a question that’s been asked since the early beginnings of digital communication over 30 years ago.

That question has been the focus of many debates, discussions, articles and research papers, as well as arguments between billions of parents and their children all over the world. It’s preoccupied governments, academics, companies, organisations and brands, and will continue to do so for a long time to come. The question is simple: Is digital harming our health?

The amount of digital information that’s being created, consumed and shared every day is staggering. In just one minute of an average day, Google receives over 4 000 000 search queries, YouTube users upload 72 hours of new video, Facebook users share 2 460 000 pieces of content, and Apple users download 48 000 apps. By the time you will have finished reading this article, those numbers will have increased further.

All this content consumption brings with it a host of potential health issues for the user. Anxiety, depression, addiction, isolation, narcissism, all are becoming more and more common, particularly amongst the young. And while the mental strain is certainly troubling, there are also physical issues linked to excessive computer use, such as vision impairment, neck strain, hearing loss and insomnia. While it’s undoubtedly a channel that solves a lot of modern-day problems, it also creates a few.

With the debate around the consumption of digital media getting louder, Two Sides commissioned a global survey in June 2017, which asked over 10,700 consumers in ten countries about their attitudes to digital and print media, and how worried they are about the amount of time they spend on digital devices. What they found was a clear concern about digital media and a desire to ‘switch off’ and enjoy print more.

When asked if they are concerned that the overuse of electronic devices could be damaging to their health, 46% of UK consumers agreed, while 47% agreed that they spend too much time on digital devices. While these results are intriguing in that they go against the modern assumption that people prefer digital, it’s when we delve deeper into the demographics that things start to get really interesting.

Looking at the different age groups for each question, you’d expect the younger demographic to be more at ease with digital, relaxed with their exposure to online media. But 74% of 18-24 year-olds stated that they spend too much time on electronic devices, compared to 48% of 35-44 year-olds and 29% of those 55 and over. Meanwhile, when asked if they were concerned that the overuse of electronic devices could be damaging to their health, 58% of 18-24 year-olds and 67% of 25-34 year-olds agreed.

With results such as these, it’s clear that people are becoming more and more concerned about the amount of digital content they consume. Social media, plus online video, news, shopping and reading take up a large amount of our day, an amount that’s increasing every year. The most recent IPA Touchpoints data shows that the average UK adult will spend almost eight hours a day consuming media – of that, 2.5 hours is spent on social media and a further 2.1 on the internet.

There are a number of reasons why people should be concerned about the amount of digital content they consume. The most obvious is that too much screen time at night disrupts sleep patterns. The blue light emitted by tablet, smartphone and e-reader screens suppresses the level of the sleep-inducing hormone melatonin, making sleep more difficult, which can lead to more serious health issues such as obesity and diabetes.

Harvard University neuroscientist Anne-Marie Chang recently compared the effects of reading on a light-emitting device compared with a printed book, and found a marked difference in the sleep patterns of the two sets of people. “Participants who read on light-emitting devices took longer to fall asleep, had less REM sleep and had higher alertness before bedtime than those people who read printed books,” she explains. “We also found that after an eight-hour sleep episode, those who read on the light-emitting device were sleepier and took longer to wake up.”

On a more anthropological level, neurologists have discovered that too much time spent online can rewire the human brain to prioritise sensation over thought, stimulating the reward mechanism and the production of dopamine – basically encouraging us to behave like gamblers. This mindset means that people addicted to screens are hard-wired to seek sensations and avoid boredom to such an extent that, a 2014 study for Science magazine found, many people would rather give themselves electric shocks than be left alone with their thoughts for 15 minutes.

But all is not lost. The adverse health effects of too much digital content can be countered by the simple action of reading a print publication. Indeed, it appears that the respondents to the Two Sides survey already know this, with 69% agreeing that it’s important to ‘switch off’ and enjoy printed books and magazines, a figure that doesn’t vary significantly across the age groups.

So print, which is kinder on our eyes, brains and sleep patterns, could be an effective cure for those suffering from digital overload.

To download the global report, as well as the Key Findings from the UK survey, go to www.twosides.info/Survey2017

Taking back your digital identity

We’re bringing information and devices online at an unprecedented rate, raising one of the fundamental questions of our time: how do we represent ourselves in this digital world that we are creating? And more importantly, how do we secure our identity in a digital world?

We’ve heard about blockchain for currencies and smart contracts, a compelling and crucial application is in securing online identity.

For four billion years, the genetic code has been life’s data store- containing not only instructions for but also the lineage of all terrestrial life. Over the past few hundred thousand years, a new species has emerged, one that is rapidly and inexhaustibly producing huge volumes of data of their own: humans.

A brief history of humanity’s data affair
We have observed the world and made sense of it through language for as long as we’ve existed. Armed with the technologies we developed, we peered inside atoms and learned something about the behaviour of the fundamental particles including electrons and photons that we have found there. Developing capabilities to manipulate collections of these units of electricity and light has led to a series of technological revolutions that has had a fundamental impact on how we store, analyse and communicate information about our world.

The network of networks, the Internet, has evolved over time from a range of contributing developments by mathematicians, scientists and engineers. In each decade from the 1940s inventions included the transistor, the computer, computer networks, remote access to computing power, software and documents, and finally by the mid-1990s, commercial service providers ensured increasingly global connectivity. Near-instant text and audio-visual communication, and the emergence of social media and online services across industries, have vastly transformed our society in a remarkably short space of time.

The benefits of increased connectivity come with the associated risk around how the information that we create, communicate and store can be intercepted, sometimes with malicious intent. Cryptography is the ancient art of achieving confidentiality by transforming a message such that is only intelligible to someone in possession of a key. Since the emergence of the Internet, a multitude of algorithms for data security have been developed, and global standards for encryption protocols provide some level of communications security over our computer networks.
Just months after the financial crash of 2008, the first digital currency to employ cryptography to solve the problem of double-spending without the requirement for a central trusted third party was proposed. That currency was Bitcoin, now valued at over USD 100 billion, and one of over 1000 different crypto-currencies. The technology underlying this decentralised capability is a distributed ledger, or blockchain. Transactions are recorded in blocks that are linked and secured by cryptography, these records are verified and stored across a network making the ledger resistant to modification.

The really interesting part is that blockchain, this combination of capabilities in computing, connectivity and cryptography, has applications not only in the financial world, but in any transactional environment, including for a decentralised personal data management system that ensures users own and control their data.

Ups and downs: the risks of exponential data
As of this year, the digital world’s data content is estimated at billions of terabytes, or zettabytes, 90% of which has been created since 2016. Information is an increasingly valuable commodity, and its acquisition, analysis and trade plays an important role across industries. And with one quarter of the world’s population using Facebook every month in 2017, a lot of this data is personal.

The rise of social media has led to new conceptualisations and discussions around identity, as we build representations of ourselves online. On the other hand, information about ourselves that we did not intend to be shared or distributed is also contributing to our digital profiles. Any organisation with stores of personal data can be hacked, be negligent, or even sell this data to external parties for profit, resulting in outcomes that range from spam to identity theft.

In 2013 and 2014, three billion Yahoo! accounts were hacked in what was the highest-profile digital identity breach at the time. In South Africa, more than 30 million identity numbers and other associated financial information was leaked online only last year. Regulators have been swift in their response: personal data protection regulations such as the European GDPR or South African POPI Act carry severe penalties to companies who act recklessly or even negligently with personal data.

Stunning revelations surrounding Facebook’s sharing of up to 87 million members’ data to a third party in the service of the last US presidential election has caused shockwaves across the world, wiping $100-billion off its market capitalisation and leading some analysts to speculate around fines that could amount to $2-trillion – 100 times larger than the biggest corporate fine in history.

One definition of personal data is an economic asset generated by the identities and behaviours of individuals, and the monetisation potential of its (mis)use is astounding. Services like messaging, search and navigation may appear free to use, but they actually come at a cost: your personal data, or perhaps more aptly called your consumer data. Because as has been said, if you’re not paying, you’re not the customer; you’re the product. The question of how to verify, secure and manage identity and personal data online is more pertinent today than ever before.

The strongest link in the (block)chain
Identification provides a foundation for human rights. An estimated 1.1 billion people worldwide cannot officially prove their identity, and we simply don’t know how many of the world’s more than 200 million migrants, 21.3 million refugees, or 10 million stateless persons have some form of identification. The World Bank estimates that 78% of these unidentified people are from sub-Saharan Africa and Asia.
The recent Blockchain Africa Conference in Johannesburg brought together like-minded innovators. Global Consent, based in Cape Town, is one such local player doing exciting things in the identity space. Consent is developing a blockchain-based trust protocol to independently authenticate identity and selectively exchange personal information. Consent is also the first Sovrin steward in Africa. Sovrin is the world’s first publicly available distributed ledger dedicated to digital identity. The code base of Sovrin is part of the open source Hyperledger project, which is governed by the Linux Foundation and backed by corporates including SAP, IBM, NTT and Intel. The infrastructure for ensuring consensus, security and trust around identity transactions on the Sovrin network is provided by globally distributed stewards like Consent, who independently own and operate nodes on the network.

Blockchain has impressive applications in a transactional environment, in this context enabling individuals to own and control their identities online in a decentralised personal data management system where records are verified and stored across a network making the ledger resistant to modification. Like any network, the strength of a blockchain-enabled personal data management system depends in part on its size. And given the size of the problem of personal identification in Africa, both online and off, we can look forward to ongoing discussion and adoption of technologies like blockchain to meet this challenge going forward.

So … developments in computing, connectivity and cryptography, have resulted in blockchain, the technological confluence of the three, with exciting applications in identification and securing personal data online. However, we live in the physical world, and biometric data will need to support the initial registration of an individual on such a system. A candidate for advanced biometric identity verification is a naturally occurring structure, which could also be the future of data storage, with a remarkable 700 terabyte capacity per gram- the ultimate unique identifier.

This structure is the DNA molecule, and despite significant achievements like determining its structure and sequence, science continues to grapple with the computational complexity of understanding life. The role of large portions of determined sequences remain a complete mystery. Life, and in particular humanity, is arguably the most mysterious phenomenon we have ever encountered, and we have a long way to go in terms of fully understanding ourselves.

One thing we have arrived at is a solution to taking back ownership of our identities in the digital world we are creating, through the compelling application of blockchain in the digital identity space.

By Adriana Marais, Head of Innovation at SAP Africa

On Monday 7 May 2018 First National Bank became the first bank in South Africa to introduce a mini-ATM that uses biometrics, as a means of validation for consumers.

The device functions as a self-service kiosk from which customers can make withdrawals, transfers, and payments, view statements, purchase airtime and electricity and perform card cancellations. It also people to open new accounts by reading a consumer’s thumb print.

“The TouchPoint validates a customer’s identity by scanning a fingerprint placed on the biometric reader and it can detect false fingerprints to prevent fraud,” said Lee-Anne van Zyl, CEO of FNB Points of Presence.

“The identity of the customer is then verified with the department of home affairs to ensure the self-service account opening complies with the relevant laws.”

FNB said the device had been successfully piloted in Gauteng province since November 2017 and the bank aimed to place the devices in branches, community retailers in townships and rural areas across South Africa.

“The introduction of biometric validation on self-service devices is an important step to making banking much more accessible to South African communities,” said van Zyl.

“This is a continuation of our journey to broaden financial inclusion.”

Source: Supermarket & Retailer

As fibre broadband rolls out to South Africa’s townships, people will switch away from satellite TV services to online platforms like Netflix. This is according to a recent article by MyBroadband.

Vumatel plans to connect South Africa’s townships – if the pilot in Alexandra is successful, Vumatel will replicate the model in Diepsloot.

Within the next two years, Vumatel aims to connect 2.5-million homes and 10-million township residents to fibre broadband.

However, DStv research has shown that once someone makes the switch to an online subscription video service, they don’t go back to satellite TV.

MultiChoice South Africa CEO Calvo Mawela told MyBroadband there is no doubt that the future of pay TV is online, which is why they are arguing that satellite and Internet-based pay TV services must fall under the same regulations in South Africa.

A saving grace for DStv in South Africa has been the lacklustre penetration of broadband services.

However, with the launch of Netflix locally in 2016 and the proliferation of fibre infrastructure, DStv’s market share has changed.

“Over 100 000 Premium subscribers left us in the last financial year,” said Mawela. This was largely as a result of the popularity of Netflix, he added.

He said most of their growth is happening at the lower-end of the market through DStv Access packages, where the profit margins are lower than on DStv Premium and DStv Compact.

Now with Vumatel rolling out 100Mbps fibre services to townships at R89 per month, DStv’s lower-tier services will come under pressure.

Mawela said Vumatel rolling out fibre to Alexandra will kill DStv’s satellite TV market share.

The latest online shopping trends in SA

Price comparison platform Price Check has carried out research on some of the trends in online shopping and found very interesting results.

CEO of Price Check, Kevin Tucker, has highlighted the major trends which emerged in their research.

Consumer demographics
Approximately 2.5-million people a month use Price Check. South Africans love shopping according to the notable shopping seasons, and patterns differ vastly at peak times like Black Friday and Christmas.

The 25-34 age group is the dominant online shopper in South Africa. However, across the board people are moving online – it is changing the way we as consumers shop. People of all ages are looking for groceries and home deliveries.

Tucker says the searches between male and female are somewhat similar. In general females search for pharmaceuticals and health and beauty products. They also enjoy cellphones and gadgets.

Replacement parts, such as phone covers and battery chargers, are also very popular.

Noticeable trends
“We found that cellphones dominated the searches. South Africans seems to be passionate about finding deals for cellphones,” says Tucker.
South Africa has a larger number of prepaid cell phone users than contract users, and thus consumers are funding their own phones.
“The value-leader is Huawei, across all their different models.”

Interestingly, what tops the list is also a search for DSTV decoders. People are trying to save a couple of rands on DSTV decoders, which doesn’t really vary much.

Source: Cape Talk

Make your router hacker-proof

By Sandeep Nair Narayanan, Anupam Joshi and Sudip Mittal for The Conversation 

In late April, the top federal cybersecurity agency, US-CERT, announced that Russian hackers had attacked internet-connected devices throughout the U.S., including network routers in private homes. Most people set them up – or had their internet service provider set them up – and haven’t thought much about them since. But it’s the gateway to the internet for every device on your home network, including Wi-Fi connected ones. That makes it a potential target for anyone who wants to attack you, or, more likely, use your internet connection to attack someone else.

As graduate students and faculty doing research in cybersecurity, we know that hackers can take control of many routers, because manufacturers haven’t set them up securely. Router administrative passwords often are preset at the factory to default values that are widely known, like “admin” or “password.” By scanning the internet for older routers and guessing their passwords with specialized software, hackers can take control of routers and other devices. Then they can install malicious programs or modify the existing software running the device.

Once an attacker takes control
There’s a wide range of damage that a hacker can do once your router has been hijacked. Even though most people browse the web using securely encrypted communications, the directions themselves that let one computer connect to another are often not secure. When you want to connect to, say, theconversation.com, your computer sends a request to a domain name server – a sort of internet traffic director – for instructions on how to connect to that website. That request goes to the router, which either responds directly or passes it to another domain name server outside your home. That request, and the response, are not usually encrypted.

A hacker could take advantage of that and intercept your computer’s request, to track the sites you visit. An attacker could also attempt to alter the reply, redirecting your computer to a fake website designed to steal your login information or even gain access to your financial data, online photos, videos, chats and browsing history.

In addition, a hacker can use your router and other internet devices in your home to send out large amounts of nuisance internet traffic as part of what are called distributed denial of service attacks, like the October 2016 attack that affected major internet sites like Quora, Twitter, Netflix and Visa.

Has your router been hacked?
An expert with complex technical tools may be able to discover whether your router has been hacked, but it’s not something a regular person is likely to be able to figure out. Fortunately, you don’t need to know that to kick out unauthorized users and make your network safe.

The first step is to try to connect to your home router. If you bought the router, check the manual for the web address to enter into your browser and the default login and password information. If your internet provider supplied the router, contact their support department to find out what to do.

If you’re not able to login, then consider resetting your router – though be sure to check with your internet provider to find out any settings you’ll need to configure to reconnect after you reset it. When your reset router restarts, connect to it and set a strong administrative password. The next step US-CERT suggests is to disable older types of internet communications, protocols like telnet, SNMP, TFTP and SMI that are often unencrypted or have other security flaws. Your router’s manual or online instructions should detail how to do that.

After securing your router, it’s important to keep it protected. Hackers are very persistent and are always looking to find more flaws in routers and other systems. Hardware manufacturers know this and regularly issue updates to plug security holes. So you should check regularly and install any updates that come out. Some manufacturers have smartphone apps that can manage their routers, which can make updating easier, or even automate the process.

Creating successful digital content is based on the design team addressing several basic pointers.

Conduct market research
Whilst a news broadcast may be interesting for some patrons in a restaurant, it may illicit groans from others. Market research needs to be conducted in order to understand what content will perk the customer’s interest whilst sitting, relaxing and enjoying a meal, or what will drive the irritated customer mad and straight out the door.
For example, if people on the road enjoy listening to music, a petrol station’s digital display could play top music videos. And if the petrol station is located on a national highway to the coast, various coastal regions could be featured, thus enhancing the holiday maker’ s trip.

What screen will the content be displayed on?
When digital content is created, the screen that it will be displayed on needs to be considered and the following questions asked: – Where is the screen located? Who will be looking at it? What will they be doing while they look at it?

What type of content should be displayed where?

  • Text heavy content generally takes more than a few seconds to read and is best reserved for waiting areas or long queues
  • Shorter content should be used in areas where customers come and go quickly
  • Content for displays that are placed near a point of sale, such as a cash register or reception desk, create tempting impulse buys
  • Storefront digital signage that attracts customers to a store, should consist of advertising and promotional content
  • Call to action content should take the form of a video. Content may be king, but when it comes to digital signage, so is context

Be a stickler for text design
With numerous fonts, sizes, and colours to select, it seems as if text design is the part of digital signage content that lends itself most to creativity. However, depending on the application, poor font choice can derail an entire project. Fonts should always be simple and legible, especially from a reasonable distance, and too many fonts will muddy the message and may lose viewers.

Choose colour wisely
Too many colours or the wrong colours together, can be a distraction or even worse, convey the incorrect emotion. In addition, combining certain colours may be a hit in the retail marketing arena, but garish colour combinations, used in an airport or train station, may be disconcerting for the traveller who is seeking basic information such as schedules.

Use motion selectively
Often silhouettes and animation may interfere with readability or comprehension. As viewers should be given enough time to read text, movement should not be too abrupt.

Alliteration and rhyme
For quicker viewer retention and memorization, rhyme and alliteration could be considered. Most viewers remember up to three items at any given time. By keeping the message clear and concise, and holding the screen views long enough, the message can be read and absorbed effectively.

A place for humour
There are times when a playful injection of humour can transform digital signage content from ordinary to eye-catching and attention-grabbing. Once a viewer’s attention is caught, a conversation can be started with excellent content to follow. For many marketers, getting a customer ‘in the door’ is the first step to converting them into a sale.

Keep it fresh
One major element separating digital signage from traditional signage is its ability to display dynamic content. If only static content is being displayed on the screen, the question remains, why even use digital signage? Dynamic content captures an individual’s attention, keeps the viewer interested and remains top of mind.
Customers and employees are 10 times more likely to observe dynamic digital signage content than static messages. Examples of dynamic digital signage content are videos, animations, social media feeds or RSS feeds. The latter two are the most likely to keep the content as fresh and exciting as possible, and they’re low maintenance. However, if a company’s social media account is being displayed, it’s essential that it is kept updated!

Keep it simple
At first glance, simplicity may seem contradictory to producing amazing content, however good visual communication should always be concise, easy to understand and memorable. Establish whether your content is interactive or not and then focus on delivering one key message, as too much information can overload and distract the viewer.

Place a call to action on every screen
Start a call to action with a verb, keep the verb and subject close together, and embed it in each screen being used (e.g. “Get Yours Today,” “Get Started Now,” “Try it for Free.)

Make it useful, not only colourful
When content is being designed, make sure it enhances the experience, not detracts from it. For example, many menu boards will use a dedicated attract screen for this type of animated content, such as McDonald’s where the content flows well and the actual menu is not affected. All content elements must work together and not compete against one another.

Offer value, not technology
Often companies engage in technology, whilst not fully understanding how it will add value to the customer experience. The key question needs to be asked, “What will the customer gain if they pay attention to my content?” Will they be entertained or more likely to make a purchase, or both? Does it offer them some sort of discount?

Customers may not pay attention to your digital signage if the design contains the following issues:

  • Lack of relevance – certain digital signage software solutions are available that allow you to examine how long your customers will look at a display, whether they engage with it and what their emotional reaction is. This information can be used to your advantage when you know your customer’s profile and needs, so that suitable and relevant content can be created.
  • Uninspiring content – even if your content is relevant, that doesn’t mean it’s a winner. Sometimes digital displays simply advertise a product’s price, and nothing else. It’s not useless, as it may drive a few sales, however it’s only revealing a fraction of the message. A key element to inspiring content is that it doesn’t just deliver sales, it also boosts brand awareness and value. So, with all your content, you need to ask, “how will this improve my brand?”
  • Lack of engagement – some displays fail to engage the audience in a conversation with the product, brand or service. Digital signage offers many tools one of which includes social media integration. You can integrate a social media newsfeed from your brand and encourage your audience to like or follow your pages. Or you can integrate a camera in your display, so users can take selfies against backdrops or augmented reality elements, such as a virtual sports jersey. However, having said that you don’t need to turn your display into an interactive marvel, but you do need to discover a way for your audience to care about and communicate with your brand. Neglecting engagement to advance sales is a recipe for disaster.

Follow us on social media: 

               

View our magazine archives: 

                       


My Office News Ⓒ 2017 - Designed by A Collective


SUBSCRIBE TO OUR NEWSLETTER
Top