Opinion: Why your next phone will be a wallet
Anything that's data could be carried on a phone, and everything in my wallet is just data
Computerworld - I carry only the essentials in my wallet: a Starbucks debit card, California driver's license, a few credit cards, two ATM cards, a Costco card, business cards, a AAA card and some cash.
I try to avoid George Wallet Syndrome. But it seems that every electronics superstore, bookstore, grocery store and department store I shop in wants me to carry yet another card (either as a credit card or some kind of "membership" card that gives me a discount). If I accepted every offer, the stack of cards I carried would probably be three inches high. So I always say "no" to these cards.
I work hard at minimizing the stuff I carry in my pockets. I have the smallest smart phone in the world. I'm constantly removing receipts and other junk from my pockets. I avoid coin change like the plague.
I try to move everything I can from my wallet to my phone, namely photos of my wife and my kids. In fact, anything that's data could be carried on my phone, and everything in my wallet is just data.
So why am I carrying that data in a stack of obsolete and insecure data storage technologies, all wrapped in dead cow skin? How weird is that?
What's wrong with your wallet
Each credit card, ATM card and store "membership" card represents a huge quantity of useless plastic with a very thin magnetic strip on it. The magnetic medium stores a tiny amount of information -- so little you could write it all out on a single piece of paper. (By contrast, you could fit the Encyclopaedia Britannica on a MicroSD card the size of a thumbnail.)
Your wallet contains the keys to your life's savings and other vital information, but are "protected" by laughably feeble authentication schemes, such as your signature, or a three-digit number on the back. My Costco card sports an alarming, black-and-white photo of my face that nobody at Costco ever checks. These schemes are easily overcome: All you need at most is possession of the plastic to gain access to a card's purchasing power (and at a minimum, the number pressed into the plastic).
The absurdity of wallets, and what's inside them, goes largely unexamined by the general public. Most of us happily carry around growing quantities of these stupid plastic cards, completely unaware that software innovators in Silicon Valley, financial giants in New York and cell phone handset makers in California, Finland and Asia are conspiring behind the scenes to kill our wallets and everything in them.
These companies are working to move all that data in our wallets into our cell phones, then using the processing power, screens, Internet connections and keypads of those phones to dramatically improve our lives.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!