Chapter 90: Better Understanding of People's Hearts
Thanks to the rapid development of the electronic game industry in the United States, other software industries also know how to advertise.
Tom's free security software follows the strategy of electronic game promotion. It takes several steps to market advertisements, newspaper advertisements, and TV advertisements.
Among them, shopping mall advertisements are mainly posters. The content on the poster does not promote how advanced your technology is and how invincible it is.
Instead, it mainly focuses on the "National Computer Insurance Plan" and the "Million Bonus Challenge" plan.
Although neither of these two contents directly said that their security software is very strong, they both highlight Tom's strong confidence in security.
Confidence is infectious. Although Tom Security's software does not have a physical CD storage medium, its poster is pasted on the left and right next to Symantec and Kaspersky's security software, and the provocation in it means overflowing words.
The advertisements in the newspaper did not say that this free antivirus software is good, just good.
It also starts from another perspective.
This angle is to interview a "security personnel of a large factory" in the form of an interview with a reporter. Then the "security personnel of a large factory" seems to be promoting paid security software and belittled free security software, but in fact the meaning is exactly the opposite.
Such a form of anti-loyalty is also a form that the audience likes to hear.
TV advertising is less creative. After all, TV advertising is the most expensive and has the shortest time. There is not so much room for play, so it can only be slightly different.
Of course, unlike the all-round three-dimensional publicity of electronic games, Tom Security Software also purchased search engine keyword optimization services.
Speaking humans means manually pinning the search terms, so that no matter whether you see it in a shopping mall, in newspapers, or on TV, under this all-round and three-dimensional publicity offensive, you can search immediately with just one search.
Symantec also discovered the momentum Tom's safety.
Their approach is the same as Tom Security at the beginning, which is to download the security software as soon as possible and throw it into the virtual machine for disassembly and test.
The tester was operating the computer, sweating on his head, saying, "At present, the full performance of this security software can reach an excellent level. It is not significantly behind our security software..."
"Analysis what technology they are using." The leader urged.
Testers continued to work hard to get out of the shell, but Tom safely used a brand new encryption algorithm. This kind of encryption is difficult to crack with traditional brute force.
Moreover, after trying more than ten times, the security software itself will enable the stress mechanism. It directly finds this process that attempts to crack one's own process and performs a ruthless killing.
The leader looked at the technician's operation with a gloomy face.
The completion of this software is much higher than they thought.
Not only has excellent performance, but also has everything.
In this way...
It is difficult to destroy this software.
Of course they didn't know that in order to achieve profitability as soon as possible, Tom planned to go public with a strategy of going online first and then improving.
According to the terminology of the future Internet, it is to engage in iterative development.
Improve the functions through continuous small updates.
However, Symantec caused trouble, which forced Tom Clacy to act cautiously.
Speaking of this, we have to say that fortune is a mess.
Symantec thought that his strategy would solve the enemy once and for all, but he did not expect that although he solved a group of small shrimps, he raised a larger boss.
If they were more patient and not so panic at that time, they would wait until Tom Clacy's security software was created and detonated together with Tom Clacy's security software that would adopt the iterative development model, perhaps they would have been restless within a few years, rather than encountering a big boos within a few months.
However, as long as things are done, there is no if. Every choice is like two sides of a coin, both good and bad.
Symantec was bound by shareholders and could not make any changes in its business model. The pioneers who once solved the Millennium Worm crisis have now degenerated into anti-movements that interfered with the industry's progress.
Of course, their behavior is not a mantis chariot. They are much stronger than mantis, but it does not mean that they must wait to block the car's progress.
When they meet weak challengers, they can easily win. But what about when they encounter strong enemies?
Tom Clacy is a powerful enemy.
Although people have lost confidence in free security software, Tom Security's series of advertisements have really worked, and some people are willing to try it.
These people may be more low-end than those who chose free security software a few months ago.
Because a month ago, a group of people who felt that buying security software was painful to choose security software, but now only those who can’t afford it will choose.
After all, they are almost tossed crazy these days. In order to reduce losses, they must spend money instead of using bad free software.
However, when they started downloading, they felt different.
What's different?
First of all, the download speed is not much faster.
To say that they spend more on the server, they are not as expensive as Mentec and Kaspersky, but why are they fast? It is because their software download uses the p2p download protocol.
The meaning of the p2p download protocol is very simple, that is, every user will upload a part during the download process, and other users will download this part and then upload it.
This greatly reduces the pressure on the official server and naturally greatly accelerates the download speed.
If there is any impact on ordinary users, it is that their upload speed will also be occupied when downloading.
However, basically no one will upload things at the same time when downloading.
So, this is not a big problem.
Ordinary users who don’t know the principle think Tom safety is more prosperous.
After downloading and installing, the experience is different again.
Because Tom's safe interface is better than similar ones, and even charges, I don't know how much it looks.
You may not be able to intuitively feel the actual performance, but the interface is good-looking or not, you can see it at a glance.
The decisive suggestion on whether this interface looks good or not comes from the marketing manager of Tom Security, the female marketing department.
Chapter completed!