Mobile devices with their applications are becoming an essential and integral part of business processes which can also be noted in the field of BI (business intelligence). Mobile phones and tablets are more than just additional computing platforms. Users interact with devices wherever they go, making the location an integral part of the process and help them achieve their work goals easier.
Mobility is exploding, as interest among executives and frontline personnel, in using information effectively, grows. Nearly all personnel in organizations would benefit if they had an easier access to data and analysis capabilities at the decision point, while they are on the go, with their mobile devices.
Mobile devices bring together applications, services, and native functionality, which fuse together communication, computing, data discovery, multimedia content, and participation in transactions.
Mobile computing represents opportunity for organizations in these two areas:
Below in the text you will find some guidelines to maximize the potential of mobile BI and analytics, including application design, integration with enterprise data and security management and how to use insights to innovate in operations.
Users, using modern mobile BI, will be able to apply data insights to improve efficiency, effectiveness, and agility in sales, services, and operational management scenarios.
Focus on opportunities of mobile BI
Organizations should focus on:
Clear and ease of use mobile BI app design
Good design is key to fast adoption of mobile BI and analytics. Clarity and ease of use should be top designing priorities, particularly when the primary users are not analysts and are less experienced in working with data and analytics.
Designers of these applications have to provide:
These steps will help to embed BI and analytics functionality into UX so that working with data becomes integral to all of their activities.
Leverage native mobile device functionality
Mobile device is not yet another Web access point. Its native capabilities make people excited, and in many organizations, mobile BI application deployment is moving faster than on the PCs and workstations. A major reason is that users like native functionality, such as touch gesturing, photography, integration with voice, video, and text communication, hands-free voice command capabilities, and integration with geolocation functionality.
“Native” mobile applications are developed and designed to take advantage of device-specific functionality. Traditionally they are written specifically to run only with the device’s operating system, such as Apple iOS or Google Android.
Development environment should be code-free and enable users or developers to add application features via APIs and pre-populated components without additional coding and include:
Analyzing usage to improve user experience and satisfaction
To increase user satisfaction, and expand adoption, the performance, design, and relevance
of mobile applications need continuous improvement. Collecting and analyzing data generated by the application’s use to make informed decisions on how to improve applications and upgrade UX is a key element.
The data is already available, since users generate it every time they tap on the screen or perform an action including geolocation data, which can provide contextual insights into both performance issues and application use. Developers should base improvements on:
Leading mobile application platforms enable organizations to monitor and track application usage across user populations for cohort analysis and to perform analysis of individual UX and ensure that developers, administrators, and other design personnel can apply data insights as they revise the application’s functionality as how the application enables users to access and interact with data.
Enforce Enterprise Data and Security Strategies
Users with mobile applications, have the freedom to interact with data wherever they are, including outside of firewalls. However, this means that it is important to address enterprise security concerns as mobile applications are deployed.
Organizations should align mobile expansion with their security procedures, including those for enterprise BI and data management.
Many organizations try to avoid complexity by simply treating mobile applications as new clients in their current data architecture as part of larger enterprise strategies, which allows them to use their existing data management, integration, metadata, and governance infrastructure. Centrally managed deployment extends data quality and security procedures, as well as regulatory adherence, to the mobile world.
Whether mobile is part of an existing or new architecture, security should be a key concern.