Apps for Africa: Mobile Cloud Computing to Accelerate Innovation

Part 2: Apps for Africa: Mobile Cloud Computing to Accelerate Innovation

Continued From Part 1

Every cloud has a silver lining, a lining that emits beams of hope onto the continent it traverses. Africa’s horizon has seen many clouds that have only passed on to deliver rains to the rest of the world.  However, one cloud spreads across the African continent, breathing a new hope of life on a part of the world that has always been referred to as a dark continent. That cloud is called the mobile cloud.

Mobile cloud computing is not a new trend in Africa, having first been introduced on the continent by the several mobile network operators. Services such as mobile banking and mobile money transfer have been around for over 3 years, operating on a private cloud computing framework that was tied to each network operator. These services have revolutionized mobile computing, delivering services that had long been a myth to many Africans. The advent of such services has had a far reaching reception pattern, creating trade links between the rural poor. In the biggest part of Africa, banking institutions are fragmented, without a reliable interconnected backbone that can facilitate trade and commercial transactions. And worse still, computer usage is very low in Africa, making it even harder to facilitate such transactions.

However, with the installation of the sea cable that had the first phase connecting the coastal countries to the global broadband infrastructure, fast internet cable is now being extended to the inland countries, providing a more reliable and faster internet link for both desktop and mobile internet users. The high penetration rate of cellular technologies will grow even faster with the adoption of fast internet on the continent. Mobile phones will therefore remain the preferred communication gadget in Africa.

The advent of fast internet will therefore leverage the existing services and provide a wider reaching cloud platform for building and deploying cloud-hosted applications. Even before the fast internet cable spreads to most of Africa, mobile application developers are already building solutions to take advantage of these new developments.

Microfinance Institutions to tap into the cloud:

RedCloud Technologies, the company behind the hugely successful M-PESA money transfer service in Kenya is already completing work on a project that will see micro-finance institutions connect to the M-PESA service, disbursing loans to their clients, improving cash flow management, helping the borrower repay the loan simply and cheaply without queuing in the bank using mobile money transfer, and getting the approved loan and money faster into the hands of the micro-entrepreneur. This project will provide support to customers with low-end phones using SMS technology, and high-end phones/ smart phones using a web-based application. The project will also provide support for loans officers that would like to use the web application option in areas with limited or no network coverage. The loans officer simply saves the loan application information and then posts it to a remote database when they move to places with network coverage.

Strategic partnerships between industry and academia:

Safaricom, Kenya’s largest mobile network operator and Strathmore University, a leading private university in Nairobi partnered this year to launch an initiative dubbed the “Safaricom Academy”. The initiative aims at developing young talent to create employment through the development of mobile applications that are relevant to the local Kenyan mobile user. The main goals of the Safaricom academy are:

  • Promote local innovation in developing relevant applications for the Kenyan market.
  • Create an enabling environment for the development of relevant mobile applications.
  • Attracting companies with applications to host them within the Safaricom portal.

This initiative will see more local content and mobile applications developed and hosted on cloud-based marketplaces.

Developer Bootcamps:

Many developer initiatives have sprung up in the past two years. In Kenya, iHub (Innovation Hub) seeks to link technologists, innovators and investors. In Uganda, the HiveColab is working with local developers to help them nurture their ideas through provision of workspace, hardware and developer tools. All these are initiatives that have also helped some small companies find seed funding from venture capitalists and big industry players such as Nokia. Virtual City, a Nairobi-based mobility solutions company, received a 1 million dollar award from Nokia after winning a global competition for building innovative mobile applications.

These initiatives are continuing to grow and spread across Africa, showing a positive market response to the adoption of relevant innovative mobile solutions on the continent.

In part 3, we shall focus on the future of the mobile cloud and what it holds for Africa in the next five years.

By Allan Atukunda

Allan is a software engineer with four years experience as a programmer and writer. He is also a mobile computing advocate in Africa with a vision to transform Africa through mobile communication technology. Allan believes that Africa can be used as a test bed for new and innovative mobile technology solutions, and encourages investors to take advantage of the fast growing mobile technology sector on the continent.

Allan Atukunda is a software engineer with four years experience as a programmer and writer. He is also a mobile computing advocate in Africa with a vision to transform Africa through mobile communication technology. Allan believes that Africa can be used as a test bed for new and innovative mobile technology solutions, and encourages investors to take advantage of the fast growing mobile technology sector on the continent.

You can subscribe to Allan’s blog to receive regular updates on the state of the African mobile technology sector here: http://www.mobilecodelabs.blogspot.com

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…