Canadians Talking Tech

Towards a Personalized Mobile Experience

by Noah Bloom Posted in Mobile, Web

I worked on the following paper for Blueslice Networks, a telecom equipment provider based in Montreal, Canada. It is entitled Towards a Personalized Mobile Experience: How converged subscriber management will impact the life of end-users. It has also been submitted as a proposal for a presentation at Mobile World Congress 2010 in Barcelona.

How do you think you will use your mobile devices in 2015 and interact with other devices in your life? What would you like to be able to do in 5 years time? We’d love to hear — you can leave your comments below!

~ ~ ~

Towards a Personalized Mobile Experience

The advances to come in personal communications in the next few years will be amazing.

In the five years to come, we will be far along in the interaction between the devices of our life. Many have considered how convergence would reduce the number of personal communications devices; however, the reality is quite different, as more and more ”connected,” purpose-built devices are being added to the standard household. We will inevitably still use and manage and interact with more devices in our life, as we will finally be able to connect with many pieces of information in our home and daily life that remain to be untapped.

This article will elaborate fully on the hyper-connected world of 2015, the role of operators, and the importance of mobile personalization and converged profile management. It will evaluate current practices and future opportunities for operators to offer mobile personalization for their subscribers, as well as how end users will interact and live in an evolving and resulting hyper-connected world.


The size of the globally connected community is continuing its transformative growth. We have seen the four billionth mobile subscriber in 2009 , and yet “data” connections are projected to attain a 300% to 500% penetration rate . These data connections will make human subscriber numbers pale in comparison: they will allow consumers to lead a rich, informative, and hyper-connected lifestyle.

If we are able to link all the devices in your life, and not just most of them, we are slated for an amazing way to communicate and live, having access to exciting new services, anytime and anywhere. By harnessing subscribers’ historical data to predict their behaviors and converging information from all “connected” devices of their life to enhance and personalize their mobile experience, converged subscriber data management will be the key cornerstone of the 2015 end user experience.


A day in the life of a typical connected person in just a few years time could sound something like the following:

The day would start with an interactive experience in home. REM sleep monitors, alarm clocks, lights fading on, and climate control are all connected to start your day in the most soothing way. As you pick up your mobile device, the phone emerges from quiet mode, and you are actively presented with the applications you’re most likely to use. You are presented with relevant information for your day, preferred information from news sources and other interests, and personalized streams from your social media networks. You have also formulated customized responses to any queries that have come into your real time inbox (finally now with short, two sentence messages!) and are prepared for your review. Through your real time inbox, you have access to all your documents, personal files, media libraries, and control over your devices. Fully integrated is your schedule interactive with maps, direction visualizations, and automatic timings for your meetings.

As you move through the house, you notice your picture frames with photographs from your most recent weekend getaway and your highest rated oldies. You pass your home PC, which knows to remain dormant on these mornings. Your kitchen alerts you about the groceries that are low in the fridge.

As you leave your house, your car is alerted to your meetings and offers visualizations of your directions. Your mobile device presents you with an update on your home electricity usage and automatically enables energy consumption mode while you’re away from the house.

At the office, the tasks underway on your mobile device are transferred to the PC, calls are routed to the office device, and your customized responses are ready for your review.

Arriving home at the end of the day, your calls are optionally routed to your home system, your reading tablet gives you suggestions for new books based on recent topics of the day and your friends’ recommendations, your DVD-less movie player gives you film suggestions, and you are connected to your relevant social network news.

What was previously known as Machine-to-Machine, or M2M, is now simply any embedded wireless devices that are increasingly part of your day-to-day life. They are all united under a centralized profile, so that they can interact in smart ways with you based on previous behavior, usage data analytics, and the centrally converged profile information. What makes this work elegantly and interactively is a cohesion in connectivity, devices, identities, and applications, all underpinned by a centralized view on all the information of a subscriber.


We are witnessing the emergence of many forms of access: HSPA is followed by 4G/LTE, WiFi, WiMAX, broadband, cable, DSL, Bluetooth, NFC, etc. each varying by data rate, mobility, and reach, and reflecting the requirements of the applications that use them. Access technologies are increasing, not reducing.

However, end users are generally unaware or do not care about the multitude of access networks and technologies. In the next few years, users will continue to buy more and more connected devices, such as the Amazon Kindle, without really thinking about how or why it is connected. In the case of the Kindle, they will just want it to buy books whenever they want.


Some devices will continue to accumulate more and more access technologies, increasing their ability to access the network and unified profile anywhere and at any time. However, many devices will actually only use one or two, and that will be sufficient. Many devices will not be used as pervasively across different locations like some mobile devices.

The network will know how a user wants to be reached on their devices, where and when calls and messages are routed to a specific device, or that all devices should ring simultaneously. You will be able to connect with the devices that surround you: you will watch your video and audio library across multiple devices without physical storage drives, share multimedia with your picture frames, control home lighting, and manage your energy consumption and conservation. Any one of these devices can be actively accessed or passively through alerts of predefined behaviors.


As consumers continue to accumulate devices and applications, they are very quickly acquiring new identities. Many of the identities across different services are interacting with each other, so providing a trustworthy single sign-on will not only be convenient and leverage the different services, but it will also allow for the network to learn more about how and when the user wants to use their applications.

For example, today a user will post a thought, image, or video to multiple services at once, e.g. YouTube, Flickr, Twitter, Facebook, their personal blog, Posterous, etc. Based on the type of media, they may want to spread it differently.

Many of today’s users can still manage several social applications, but as industry influencers continue aggregating multiple streams to simplify their communications, and as people will find different value to different services, all consumers will, by 2015 absolutely need to aggregate their streams. Their operator is the organization in whom the consumer has trust and a direct connection at all times. A smart operator will be able to offer a single sign-on and actively prompt the user for the applications they will want to use in certain situations.

By analyzing information about the subscriber, such as service preferences, usage, and personalization, an operator can further create an inconspicuous social network for each user. It is not one that rivals the very well established Facebook, MySpace, or Twitter, but one built around their real connections: who they call, who they message, who they interact with constantly. Based on frequency and degrees of separation, this data-mining can create an intelligent network for the user, allowing automatic prompts of certain people’s location or behavior, predetermined sharing of information such as photographs, day-to-day scheduling and routine, and tracking of their social graphs.


No longer fighting Internet innovations, the operators’ walled gardens are coming down. Instead, operators are embracing innovative Internet applications, which are becoming less device and access reliant, and more contextual and location-based. Applications are prompted based on your previous behaviors and where you are now. You are encouraged to interact with your local environments and see what’s going on around you, such as businesses, attractions, and people nearby.

The progression from walled garden to an open model will continue further to open up opportunities with third party service providers. An operator could open up an API towards the converged subscriber profile databases, which would give innovative players the ability to build applications around the operator’s data. This also opens up new business models and revenue sharing between the user, third party services, and the operator.


An operator offering mobile personalization reduces the likelihood of an end-user changing service provider. The information they have and can mine to promote a better user experience will lead to improved customer loyalty and reduced churn.

Subscriber data is changing. It is no longer just a collection of relevant routing information, such as a phone number and phone identity, enabled and disabled services, and current location. It connects multiple networks, multiple user devices, multiple applications, and multiple access networks into an intelligent heart of a network, and it is the diving board for connectivity and innovation of the future. The greatest tool to lead us to a hyper-connected world lies in this intelligent layer of subscriber data.

Post to Twitter Post to Delicious Post to Digg Post to Facebook Post to Reddit Post to StumbleUpon

  1. 13 Responses to “Towards a Personalized Mobile Experience”

  2. By Victor54 on Aug 27, 2009

    Actually Ericsson just published their vision on life in 2020. Lots of funny furniture and cool ideas, but I really like the idea of being able to control all those electronic devices in your home and life.

  3. By Stephen Ohlund on Aug 27, 2009

    The Life in 2020 project! Wow, 450 experts created 15 personas, 70 mobile devices, 22 companies. I read it at About-Electronics.EU: I guess we’re not really getting one device to do it all after all?

  4. By Noah Bloom on Aug 27, 2009

    Agreed, don’t underestimate what can happen to communications within just 5 years. There’s room for lots of innovative new services and players in the space.

  5. By Angele Yanor on Aug 27, 2009

    Wow, Noah, you’re prolific. I particularly enjoyed the futuristic ‘Day in a Life’ scenario. I’ve heard that scientists are working on equipping cell phones and laptops with sensors that are able to analyze & save their owners’ walking patterns. If your phone or computer senses an unfamiliar stride, it goes into a lockdown until your password is keyed in. Talk about futuristic!

  6. By Samantha on Aug 27, 2009

    I’m concerned about machines knowing everything about me, including every moment of my daily schedule. Does that make sense?

  7. By Fred Bastien on Aug 28, 2009

    Hi Samantha – yes it does make sense. There are a lot of discussions in the industry about how do we ensure and respect end-user privacy and other preferences with such data convergence technology. It is quite clear that any of such initiative need to consider strong standardized interfaces for authentication, authorization, privilege settings, etc. This will enable you (as the end-user) to allow (or not) your service provider to share part of your information with third-parties.

    Good to hear all your comments


  8. By Noah Bloom on Aug 29, 2009

    Angele, thanks for the comment and compliment! I haven’t heard of that specific service but sounds useful and indeed futuristic. An important point I sought to make here is that the platform and intelligence is there, mostly thanks to innovative carriers building ways to data mine their consumer base, and the road for innovative services is open!

  9. By Noah Bloom on Aug 29, 2009

    Samantha, that is a VERY important point, and one that everyone is or needs to consider. A lot of it comes down to the point that we already share a lot of personal information with several organizations (Google, our government, our banks, our service providers, and our mobile carriers). The hope is that they are trustworthy. And moving forward we will be more willing to let trustworthy companies use that info if it serves us better. I contend that we really do trust our telecom/mobile providers, and so they have the power to make useful services we are comfortable using. Would that reasoning make someone more comfortable?

  10. By CRDONALD on Oct 9, 2009

    Did you see this on Mashable? Monitor Your Electricity Usage in Real-Time With Google PowerMeter ( Isn’t that like what you’re talking about? Looks really interesting. I’d like to be able to do that for sure! Is it worth $200 though? might take a long time to save that money…

  11. By xalkin on Oct 9, 2009

    Interesting article, but wouldn’t you say carriers are trending towards being more of a dumb pipe and less of a services and applications company? It seems like Rogers in Canada didn’t want to accept the Kindle just recently for that very reason. They didn’t want to be just a dumb pipe as part of Amazon and AT&T’s roaming service

  12. By Noah Bloom on Oct 21, 2009

    @xalkin you have a good point about carriers potentially trending to being more of a dumb pipe, but the article here actually proposes how they can empower themselves to be more. And this is a good thing for the users and third party service providers (eg Google @CRDONALD, etc).


    1) They’re the only ones with direct access to this important user behavior and routine
    2) They are in fact trusted by their customers
    3) They are beginning to accept a fundamental difference in revenue per device for embedded wireless services (eg. used to be called M2M)

    I think carriers should be extremely excited that this opportunity exists for them to save themselves from becoming a dumb pipe!

  13. By Noah Bloom on Oct 21, 2009

    Also check out 5Deka’s article “A Day in 2050” which even further emphasizes the importance of a user’s routine and interactions with the devices in their life and how they could be all connected:

  14. By Olivier Adam on Oct 22, 2009

    Interesting article, well written! The only thing that worries me is the “one device fits all” concept. Your discussion about service providers aiming to offer open platform is sadly a dream that we have to wait for a bit longer I’m worried. I know many service providers are working to develop their own, in house, operating systems and as much as the android OS is getting traction, you still have quite a few, very different, OS out there (Apple, Microsoft, RIM, Palm, Android, etc.). Just look at the Blackberry with it’s messenger feature which is solely usable on a blackberry, etc. Each device is coming up with it’s own applications store, and its own API to develop applications. So it will be hard to get a consensus and everyone to share a more open, free platform for applications and communications.

    Same idea goes for a unified log on for services, we are still (sadly) far from the adoption of a more unified log on system. Users will still want to access their services from different devices, not just their “mobile device” and the unified sign on process will be quite hard to have portability over different access devices. Imagine also loosing your mobile device which includes all your access (including your bank, work, medical records, etc.), companies would just not allow that! Look at the most secure sites, you can’t save the password in Firefox/IE8/Chrome/Opera database. Companies will always force you to enter your password (or eventually biometry if it can be properly implemented) when logging on as an added security. Just look at all those credit card transaction, a few years ago, you only needed your credit card #, security # and sometimes your full address and name. Now, they are asking for your birthday, and they are deploying more and more an additional password just for your credit card transactions.

    I’m happy to elaborate more on certain points, just let me know what aspects you would like to discuss more in details.

    Olivier Adam

Sorry, comments for this entry are closed at this time.