Mobile technology is technology that goes where the user goes. It consists of portable two-way communications devices, computing devices and the networking technology that connects them.
Currently, mobile technology is typified by internet-enabled devices like smartphones, tablets and watches. These are the latest in a progression that includes two-way pagers, notebook computers, mobile telephones (flip phones), GPS-navigation devices and more.
The communications networks that connect these devices are loosely termed wireless technologies. They enable mobile devices to share voice, data and applications (mobile apps).
Get insights to better manage the risk of a data breach with the latest Cost of a Data Breach report.
Register for the X-Force Threat Intelligence Index
Radio networks that use distributed cell towers that enable mobile devices (cell phones) to switch frequencies automatically and communicate without interruption across large geographic areas. The same basic switching capability enables cellular networks to accommodate many users across a limited number of radio frequencies.³
The current cellular service standard for most wireless communication. It uses packet switching technology, which organizes data into parts or packets for transmission and reassembles the information at the destination. 4G—“G” for generation—is reported to be 10x faster than 3G. And 5G, a much faster network, is coming still. 5G uses a set of aggregated frequency bands to unlock bandwidth and is approximately 20x faster than 4G.
Radio waves that connect devices to the internet through localized routers called hotspots. Short for wireless fidelity, wifi networks are like cell towers for internet access, but they don’t automatically pass service without establishing a wifi connection. Most mobile devices allow for automatic switching between wifi and cellular networks depending upon availability and user preference.⁴
A telecommunications industry specification for connecting devices over short distances using short-wavelength radio waves. Bluetooth enables users to quickly connect or pair devices such as headsets, speakers, phones and other devices.⁵
5G is the fifth generation of cellular wireless technology. Like 4G, it uses frequencies that are part of the radio spectrum, but 5G uses very high frequencies that offer more bandwidth. This means more data delivered at higher speeds to more devices. Imagine video streaming to a smartphone—5G will make it 10x better not just for an individual, but for anyone streaming a video at the same time.
Using its Road Day mobile app to upload claims information from the field, Amica Mutual Insurance Company achieved 25% to 50% estimated productivity gains for its workflow processes. The app enables adjusters to collaborate closely with customers in the field, improving the accuracy of claims and helping customers feel more involved.
Frogs are disappearing in Australia—4 of the 240 known species. To protect them, scientists needed a faster data-gathering model. Part of a crowd-sourcing approach, the FrogID app enables Australians to make audio recordings of frogs’ unique calls and upload them to an online database. The app also uses GPS coordinates to map frog populations.
City Furniture uses mobile technology to create an almost ideal shopping experience. Customers can combine online research with the ability to physically touch items and interact with sales personnel. The mobile app used by sales associates on their tablets accesses real-time data, processes payments and schedules deliveries—all without leaving the customer’s side.
Scalability: Creating point solutions that don’t scale across an enterprise can be costly in terms of development, management and maintenance. Apps need to be conceived holistically with consideration for lines of business, processes and technical environments.
Integration: Being able to connect logic and data services to the app is critical, whether the logic and data are on premises, on the cloud or in hybrid configurations.
Reuse: Over 105 billion mobile apps were downloaded in 2018.⁶ Many are, or can be modified or combined, for business applications. Using existing apps accelerates time-to-value and improves cost efficiency by taking advantage of domain and industry expertise built into the app.
Cloud-based development: The cloud offers an efficient platform to develop, test and manage applications. Developers can use application programming interfaces (API) to connect apps to back-end data and focus on front-end functions. They can add authentication to bolster security, and access artificial intelligence (AI) and cognitive services.
Mobility management: As mobile technology is deployed, organizations look to enterprise mobility management (EMM) solutions to configure devices and apps; track device usage and inventories; control and protect data; and support and troubleshoot issues.
BYOD: Bring your own device (BYOD) is an IT policy that allows employees to use personal devices to access data and systems. Effectively adopted, BYOD can improve productivity, increase employee satisfaction and save money. At the same time, it presents security and device management questions that need to be addressed.
Security: The mobile security battle is daunting in terms of volume and complexity. Artificial Intelligence (AI) is emerging as a key weapon to discern security anomalies in vast amounts of data. It can help surface and remediate malware incidents or recommend actions to meet regulatory requirements from a central dashboard.
Edge computing: One of the key advantages of 5G is that it can bring applications closer to their data sources or edge servers. Proximity to data at its source can deliver network benefits such as improved response times and better bandwidth availability. From a business perspective, edge computing offers the opportunity to perform more comprehensive data analysis and gain deeper insights faster.
Secure and careful management of mobile devices, content and apps is imperative—whether for a specific operating system, multiple device types or a mixed environment.
Move from mobile device management (MDM) to unified endpoint management (UEM). Use cloud, AI and analytics to support a complex endpoint and mobile environment.
Design thinking, data, technology and creativity can come together to develop enhanced, engaging mobile experiences. A key is finding the right partner.
The IBM Security® MaaS360® Unified Endpoint Management (UEM) solution has been built to help you manage and protect the frontline workforce's devices, apps, and data no matter their location.
See what’s exciting consumers about 5G technology—from mobile video streaming to immersive media experiences to eSports and beyond.
Read the blog and learn about the similarities and differences between advanced endpoint protection, laptop management and risk-based application patching.
Learn more about differences between mobile device management and mobile application management, in order to make sure your mobile devices, users and data remain protected.
As flexible work models have become the new norm, employees must remain productive when working from anywhere, on any device, in a protected way. From endpoint management to native security, IBM Security MaaS360 provides an end-to-end UEM solution.
¹ Number of smartphone users worldwide from 2016 to 2021, Statista (link resides outside ibm.com)
² The mobile workforce: the new movement, Information Age (link resides outside ibm.com)
³ Cellular Network, Techopedia (link resides outside ibm.com)
⁴ What is WiFi and How Does it Work?, CCM.net (link resides outside ibm.com)
⁵ Bluetooth, TechTarget (link resides outside ibm.com)
⁶ App Download and Usage Statistics, Business of Apps (link resides outside ibm.com)