ie9

Mobile isn’t a device. It’s data.

The real value of mobile isn’t the tools we use, but the information that travels among them. Understanding that information may lead us to bold insights and discoveries.

What will mobile data tell us about our world?

Two out of three people in the world keep a mobile device within reach 24 hours a day. Chances are you’re one of them. And if you are, you use your device an average of 150 times a day: exchanging messages, shooting video, following the news, following maps.

These and countless other mobile interactions (thermostats interacting with energy providers, vehicles interacting with satellites) generate an astonishing 5.2 million gigabytes of data a day.

And we’re only starting to determine what we can do with this data—and what this data can do for us. Take a look at just three possibilities.

See mobile in action:

Precision.

An executive-placement firm transitions from traditional desktop practices into agile mobile tools.

A mobile infrastructure keeps up with real life.

Executive recruiting isn’t a 9-to-5 job. New candidates, openings, and placements crop up constantly, in phone calls, e-mails—even offhand remarks on a golf course. Whenever an executive gets a promotion, starts looking for a change, or becomes available for work, a recruiter needs to know, and to alert the network as fast as possible.

Anytime, anywhere, from any device.

The employees of Massachusetts-based firm ZurickDavis relied on slow, inefficient channels of relaying information, such as e-mail, or even face-to-face conversation, before it upgraded to a custom-built mobile application.

Implementing the cloud-based infrastructure meant that anyone at the firm could access, update, and share on a network from anywhere in the world. Even on the front seat of a golf cart, heading for the 18th hole. Suddenly, job opportunities, candidate profiles, and current and past search data were always up to date and always accessible.

Having a mobile system has helped ZurickDavis fulfill positions 25 percent faster than it could before. Staffers now work remotely as well as at the company headquarters—a change that has helped the firm save rent on office space.

The company’s move now looks like common sense: an estimated 35 percent of the world’s workforce is now mobile.

There are four times as many mobile phones in use today as there are personal computerts and tablets—and twice as many as there are TVs.

Productivity.

A software developer cuts costs by creating a mobile platform compatible with multiple operating systems.

A mobile system exponentially increases the reach of a great idea.

With a mobile market dominated by four operating systems that each work independently of the others, mobile software developers are challenged to efficiently serve their clients by supporting each operating system. This condition of the mobile landscape often requires building four separate executions for every function.

Tools that work with any operating system.

Whenever it builds a cross-platform app for a corporate customer, software developer Zylog Systems needs to build the same functionality into similar tools designed for iOS, Android, BlackBerry and Windows Mobile systems. As it expanded its client base, developing and maintaining sets of similar code bases for similar builds became increasingly difficult.

Simplifying the system streamlines the work.

As Zylog began building mobile code sets for clients in the banking and insurance industries, it switched to a mobile cross-platform development tool that immediately slashed the company’s development costs by nearly 60 percent. Developing a mobile application for four devices, once a 400-hour job, can now take as little as 100 hours.

It also simplified its customers’ application maintenance and software upgrades. Administrators can now push out improvements to multiple platforms simultaneously. Using this mobile tool also has given Zylog greater insight into its clients’ needs, as it provides consolidated reports for all of its supported devices and platforms.

More than half of all enterprises consider security and authentication as one of the top two concerns for their mobile environment.

Security.

When the global technology company needed to implement a secure bring-your-own-device policy, it used its own innovations for security.

Mobile security measures let employees use consumer technology in an open environment.

As more employees are using their own mobile devices and computers at work, employers face the challenge of protecting enterprise data and delivering business value in a bring-your-own-device (BYOD) environment.

But when those challenges are met, BYOD policies greatly encourage and improve productivity as employees take advantage of the technological flexibility.

Bring your own securable device.

The sheer range of mobile operating systems in use today can seem daunting. At IBM, employees can use Android, Apple iOS, Microsoft Windows Mobile and Symbian Series 60, although officially, IBM supports the BlackBerry OS and Enterprise Server for providing employees wireless access to IBM work applications including Lotus Notes (e-mail contacts, calendar) and Sametime (instant messaging).

To embrace what it calls the “bring your own securable device” movement, IBM is redesigning its infrastructure to accommodate its employees, by incorporating such security technologies as agent software installed on every device, alphanumeric passwords that protect device access, and management tools that let IT managers remove data from lost or stolen devices.

A secure strategy for corporate and personal data.

Rather than ensuring enterprise-level security with complex passwords that require phone calls to the IT department, IBM is working with vendors to develop and introduce “container” technologies that store proprietary data, applications and network access within secured infrastructures that don’t interfere with employees’ personal apps and data.

While standard workplace BYOSD practices are still emerging, the vast majority of companies view mobile security as a concern equal to any other security. But every company must protect both corporate and personal data with a mobile strategy spanning network connections, access to corporate resources, and employees’ own devices.

With many workplaces practicing a bring-your-own- device policy, 93 percent of companies express concerns about mobile security.