Skip to main content

Alibaba pumps $100 million into Vmate to grow its video app in India

Chinese tech giant Alibaba is doubling down on India’s burgeoning video market, looking to fight back local rival ByteDance, Google and Disney to gain its foothold in the nation. The company said today that it is pumping $100 million into Vmate, a three-year-old social video app owned by subsidiary UC Web.

Vmate was launched as a video streaming and short-video-sharing app in 2016. But in the years since, it has added features such as video downloads and 3-dimensional face emojis to expand its use cases. It has amassed 30 million users globally, and will use the capital to scale its business in India, the company told TechCrunch. Alibaba Group did not respond to TechCrunch’s questions about its ownership of the app.

The move comes as Alibaba revives its attempts to take on the growing social video apps market, something on which it has missed out completely in China. Vmate could potentially help it fill the gap in India. Many of the features Vmate offers are similar to those offered by ByteDance’s TikTok, which currently has more than 120 million active users in India. ByteDance, with a valuation of about $75 billion, has grown its business without taking money from either Alibaba or Tencent, the latter of which has launched its own TikTok-like apps with limited success.

Alibaba remains one of the biggest global investors in India’s e-commerce and food-tech markets. It has heavily invested in Paytm, BigBasket, Zomato and Snapdeal. It was also supposedly planning to launch a video streaming service in India last year — a rumor that was fueled after it acquired a majority stake in TicketNew, a Chennai-based online ticketing service.

UC Web, a subsidiary of Alibaba Group, also counts India as one of its biggest markets. The browser maker has attempted to become a super app in India in recent years by including news and videos. In the last two years, it has been in talks with several bloggers and small publishers to host their articles directly on its platform, many people involved in the project told TechCrunch.

UC Web’s eponymous browser rose to stardom in the days of feature phones, but has since lost the lion’s share to Google Chrome as smartphones become more ubiquitous. Chrome ships as the default browser on most Android smartphones.

The major investment by Alibaba Group also serves as a testament to the growing popularity of video apps in India. Once cautious about each megabyte they spent on the internet, thrifty Indians have become heavy video consumers online as mobile data gets significantly cheaper in the country. Video apps are increasingly climbing up the charts on Google Play Store.

In an event for marketers late last year, YouTube said that India was the only nation where it had more unique users than its parent company Google. The video juggernaut had about 250 million active users in India at the end of 2017. The service, used by more than 2 billion users worldwide, has not revealed its India-specific user base since.

T-Series, the largest record label in India, became the first YouTube channel this week to claim more than 100 million subscribers. What’s even more noteworthy is that T-Series took 10 years to get to its first 10 million subscribers. The additional 90 million subscribers signed up to its channel in the last two years. Also fighting for users’ attention is Hotstar, which is owned by Disney. Earlier this month, it set a new global record for most simultaneous views on a live-streaming event.



from TechCrunch https://tcrn.ch/2KeViwY

Comments

Popular posts from this blog

How To Play Doom – And More – On An NES

Doom was a breakthrough game for its time, and became so popular that now it’s essentially the “Banana For Scale” of hardware hacking. Doom has been ported to countless devices, most of which have enough processing ability to run the game natively. Recently, this lineup of Doom-compatible devices expanded to include the NES even though the system definitely doesn’t have enough capability to run it without special help. And if you want your own Doom NES cartridge, this video will show you how to build it . We featured the original build from [TheRasteri] a while back which goes into details about how it’s possible to run such a resource-intensive game on a comparatively weak system. You just have to enter the cheat code “RASPI”. After all the heavy lifting is done, it’s time to put it into a realistic-looking cartridge. To get everything to fit in the donor cartridge, first the ICs in the cartridge were removed (except the lockout IC) and replaced with custom ROM chips. Some modifica...

The Flexible Permanence of Copper Tape Circuits

Somewhere between shoving components into a breadboard temporarily and committing them to a piece of protoboard or a PCB lies the copper tape method. This flexible Manhattan-style method of circuitry formed the basis for [Bunnie Huang]’s Chibitronics startup, and has since inspired many to stop etching boards and start fetching hoards of copper tape. [Hales] hit the ground running when he learned about this method , and has made many a copper tape circuit in the last year or so. He offers several nice tips on his site that speak from experience with this method, and he’ll even show you how to easily work an SMD breakout board into the mix. Generally speaking, [Hales] prefers plywood as the substrate to paper or cardboard for durability. He starts by drawing out the circuit and planning where all the tape traces will go and how wide they need to be. Then he lays out copper traces and pads, rubs the tape against the substrate to make it adhere strongly, and reinforces joints and laps w...

The Newbie’s Guide To JTAG

Do you even snarf? If not, it might be because you haven’t mastered the basics of JTAG and learned how to dump, or snarf, the firmware of an embedded device. This JTAG primer will get you up to snuff on snarfing, and help you build your reverse engineering skills. Whatever your motivation for diving into reverse engineering devices with microcontrollers, JTAG skills are a must, and [Sergio Prado]’s guide will get you going. He starts with a description and brief history of the Joint Test Action Group interface, from its humble beginnings as a PCB testing standard to the de facto standard for testing, debugging, and flashing firmware onto devices. He covers how to locate the JTAG pads – even when they’ve been purposely obfuscated – including the use of brute-force tools like the JTAGulator . Once you’ve got a connection, his tutorial helps you find the firmware in flash memory and snarf it up to a file for inspection, modification, or whatever else you have planned. We always apprec...