Figure 1: Mobile Device Penetration &amp; Use Case Maturity