SlideShare a Scribd company logo
1 of 18
Download to read offline
ways that mobile devices
are transforming what we
believe & how we behave
9
On average, users check their mobile
device at every meal for 3 days before
finally eating a meal without peeking at
their device.
Mobile devices are our new
favorite dining companion
1
Insight
Using a mobile device at
mealtime has become the new
normal, both when eating solo
or with dining companions.
73% of women agree that
they are slightly addicted
to at least one game on
their mobile device.
Women have a crush on mobile games2
Insight
Conventional wisdom portrays
young men as being gaming
fanatics but women are very
passionate about gaming too.
• 82% of mobile users with
data limits have avoided
using an app because they
consume too much data.
• However… 58% of mobile
users still exceed their
monthly data limit.
“App Abstinence” doesn’t prevent
users from exceeding data limits
3
Insight
Mobile devices have become so
essential and embedded in peoples
lifestyles that data limits are not
enough to constrain usage.
• 53% of mobile fitness app users
begin to use them less regularly
within the first four weeks of the
download.
• 76% are using them less often within
the first 2 months.
The novelty with mobile
fitness apps wears off quickly
4
Insight
Fitness app developers need to
focus on establishing their
products as daily rituals with
users or risk having them become
the next piece of unused fitness
equipment moldering in the
basement.
Dads are more likely to believe that their kids
have a secret stash of social media apps
5
Insight
Parents may want to consider
using apps to monitor their child’s
social sites and quarantine their
mobile devices at bedtime.
51% of Millennials think it’s acceptable to
sleep with their mobile device while in bed
6
61% of Millennials think it’s acceptable to
use their mobile device while on the toilet
7
25% of Millennials think it’s acceptable to
use their mobile devices while on a date
8
Insight
Mobile devices are pervasive —
nearly tethered to Millennials — so
mobile operators must provide
enough persistent connections and
reliably high Quality of Experience
to keep users consistently satisfied.
33% of users will only wait 1-5
seconds for a mobile webpage
to load before they abandon.
The show must go on…. quickly9
Insight
To remain popular and drive user
engagement, content providers
need to create and deliver content
that loads quickly on mobile
devices.
© 2014 Citrix
Findings for this presentation are based on:
• A consumer survey of 1,000 U.S. adult smart phone or tablet
owners ages 18 and older conducted by Wakefield Research on
behalf of Citrix in January 2014.
• The February 2014 Citrix Mobile Analytics Report. Click here to
download the full report.

More Related Content

Viewers also liked

How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamCitrix
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First TimersCitrix
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookCitrix
 
A Few Interesting Things About the Brain [Infographic]
A Few Interesting Things About the Brain [Infographic]A Few Interesting Things About the Brain [Infographic]
A Few Interesting Things About the Brain [Infographic]Citrix
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix Citrix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix
 
10 +1 Reasons to Attend Citrix Synergy
10 +1 Reasons to Attend Citrix Synergy10 +1 Reasons to Attend Citrix Synergy
10 +1 Reasons to Attend Citrix SynergyCitrix
 
„Big Data – Kundendaten erfolgreich schützen“
„Big Data – Kundendaten erfolgreich schützen“„Big Data – Kundendaten erfolgreich schützen“
„Big Data – Kundendaten erfolgreich schützen“Citrix
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewayCitrix
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsCitrix
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“Citrix
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. Citrix
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...Citrix
 

Viewers also liked (15)

How to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization TeamHow to Build an All-Star Virtualization Team
How to Build an All-Star Virtualization Team
 
15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers15 Tips for Citrix Synergy First Timers
15 Tips for Citrix Synergy First Timers
 
Desktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBookDesktop Virtualization Deployment Insights eBook
Desktop Virtualization Deployment Insights eBook
 
A Few Interesting Things About the Brain [Infographic]
A Few Interesting Things About the Brain [Infographic]A Few Interesting Things About the Brain [Infographic]
A Few Interesting Things About the Brain [Infographic]
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix
 
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
Citrix & Canalys: Northern European Channel Partners in a State of Transforma...
 
10 +1 Reasons to Attend Citrix Synergy
10 +1 Reasons to Attend Citrix Synergy10 +1 Reasons to Attend Citrix Synergy
10 +1 Reasons to Attend Citrix Synergy
 
„Big Data – Kundendaten erfolgreich schützen“
„Big Data – Kundendaten erfolgreich schützen“„Big Data – Kundendaten erfolgreich schützen“
„Big Data – Kundendaten erfolgreich schützen“
 
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health SystemCitrix Customer Story: Franciscan Missionaries of Our Lady Health System
Citrix Customer Story: Franciscan Missionaries of Our Lady Health System
 
SYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + GatewaySYN303: Receiver + StoreFront + Gateway
SYN303: Receiver + StoreFront + Gateway
 
Citrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery ContinuumCitrix CTO Perspective: The Application Delivery Continuum
Citrix CTO Perspective: The Application Delivery Continuum
 
SYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and AnalyticsSYN240: Next-Generation Management and Analytics
SYN240: Next-Generation Management and Analytics
 
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
„So nutzen Sie Xing & Co für Ihren Vertriebserfolg“
 
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs. SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
SYN 208: Power HDX 3D Applications with Intel and NVIDIA GPUs.
 
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
SYN 214: Linux Virtual Desktop Capabilities, Use Cases, Architecture, and Dep...
 

More from Citrix

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital WorkplaceCitrix
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Citrix
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideCitrix
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformCitrix
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?Citrix
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesCitrix
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?Citrix
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Citrix
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesCitrix
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 MigrationCitrix
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix PaddingtonCitrix
 

More from Citrix (20)

Building The Digital Workplace
Building The Digital WorkplaceBuilding The Digital Workplace
Building The Digital Workplace
 
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace Maximize your Investment in Microsoft Office 365 with Citrix Workspace
Maximize your Investment in Microsoft Office 365 with Citrix Workspace
 
XenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment GuideXenApp on Google Cloud Deployment Guide
XenApp on Google Cloud Deployment Guide
 
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud PlatformDeploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
Deploying Citrix XenApp & XenDesktop Service on Google Cloud Platform
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
 
Workforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & ProductivityWorkforce Flexibility Can Drive Greater Engagement & Productivity
Workforce Flexibility Can Drive Greater Engagement & Productivity
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Citrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment GuideCitrix Cloud Services: Total Economic Benefits Assessment Guide
Citrix Cloud Services: Total Economic Benefits Assessment Guide
 
Citrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch NotesCitrix Synergy 2017: Technology Keynote Sketch Notes
Citrix Synergy 2017: Technology Keynote Sketch Notes
 
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch NotesCitrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
Citrix Synergy 2017: Malcolm Gladwell Innovation Super Session Sketch Notes
 
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch NotesSynergy 2017: Colin Powell Innovation Super Session Sketch Notes
Synergy 2017: Colin Powell Innovation Super Session Sketch Notes
 
Who Are Citrix Customers?
Who Are Citrix Customers?Who Are Citrix Customers?
Who Are Citrix Customers?
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working Enterprise Case Study: Enabling a More Mobile Way of Working
Enterprise Case Study: Enabling a More Mobile Way of Working
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration4 Ways to Ensure a Smooth Windows 10 Migration
4 Ways to Ensure a Smooth Windows 10 Migration
 
Citrix Paddington
Citrix PaddingtonCitrix Paddington
Citrix Paddington
 

Recently uploaded

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Recently uploaded (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 

9 Ways Mobile Devices Transform How We Act

  • 1. ways that mobile devices are transforming what we believe & how we behave 9
  • 2. On average, users check their mobile device at every meal for 3 days before finally eating a meal without peeking at their device. Mobile devices are our new favorite dining companion 1
  • 3. Insight Using a mobile device at mealtime has become the new normal, both when eating solo or with dining companions.
  • 4. 73% of women agree that they are slightly addicted to at least one game on their mobile device. Women have a crush on mobile games2
  • 5. Insight Conventional wisdom portrays young men as being gaming fanatics but women are very passionate about gaming too.
  • 6. • 82% of mobile users with data limits have avoided using an app because they consume too much data. • However… 58% of mobile users still exceed their monthly data limit. “App Abstinence” doesn’t prevent users from exceeding data limits 3
  • 7. Insight Mobile devices have become so essential and embedded in peoples lifestyles that data limits are not enough to constrain usage.
  • 8. • 53% of mobile fitness app users begin to use them less regularly within the first four weeks of the download. • 76% are using them less often within the first 2 months. The novelty with mobile fitness apps wears off quickly 4
  • 9. Insight Fitness app developers need to focus on establishing their products as daily rituals with users or risk having them become the next piece of unused fitness equipment moldering in the basement.
  • 10. Dads are more likely to believe that their kids have a secret stash of social media apps 5
  • 11. Insight Parents may want to consider using apps to monitor their child’s social sites and quarantine their mobile devices at bedtime.
  • 12. 51% of Millennials think it’s acceptable to sleep with their mobile device while in bed 6
  • 13. 61% of Millennials think it’s acceptable to use their mobile device while on the toilet 7
  • 14. 25% of Millennials think it’s acceptable to use their mobile devices while on a date 8
  • 15. Insight Mobile devices are pervasive — nearly tethered to Millennials — so mobile operators must provide enough persistent connections and reliably high Quality of Experience to keep users consistently satisfied.
  • 16. 33% of users will only wait 1-5 seconds for a mobile webpage to load before they abandon. The show must go on…. quickly9
  • 17. Insight To remain popular and drive user engagement, content providers need to create and deliver content that loads quickly on mobile devices.
  • 18. © 2014 Citrix Findings for this presentation are based on: • A consumer survey of 1,000 U.S. adult smart phone or tablet owners ages 18 and older conducted by Wakefield Research on behalf of Citrix in January 2014. • The February 2014 Citrix Mobile Analytics Report. Click here to download the full report.