No Smartphone? Never Fear – Apps For All Are (Hopefully Soon) Here

Never Fear – Apps For All Are (Hopefully Soon) Here

Explicating the trendiness and popularity of intelligent mobile devices these days, smartphones such as the iPhone and Android smack of technological superiority. They flaunt generously sized display touch screens; only they are entitled to the Internet-surfing speed and power of the 4G network; those who shell out the big bucks to buy them can also enjoy new video conferencing features, such as FaceTime on the iPhone.

But easily the clearest indicator of status change between a smartphone and a lesser “dumb phone” entity is the capacity to delve into the can-do-everything-for-you world of applications, or apps.

Technically termed as application software, there is no shortage as to the number of apps available for users of smartphones of every stripe. The Apple store now advertises at least 500,000 different apps for the iPhone, while the iPad still profits from a more modest figure of 140,000 such programs. Droid adherents select from a nearly equally impressive selection of 400,000 apps for their devices.

The most popular apps tend to balloon beyond the mobile device community and aim for a place in the popular zeitgeist. Such hit apps as “Angry Birds,” which massacres the fervent competition for number-one status, strike chords both on and away from the phone. Applications for Facebook, Skype, and Google Maps are nearly as popular, as they prove incredibly useful in on-the-go situations with a cell phone in tow.

Sad news for those of us sans smartphones: the lack of a proper operating system, or OS, bars us from this world of delicious attractive apps aplenty. Or, at least it did.

Word broke last month that the Finnish start-up called Blaast has devised the technology needed to create an OS catering toward non-smartphones, enabling them to partake in the app craze. It’s only fitting that our beloved cloud computing is behind this potentially monumental shift in the status quo of mobile technology and the social politics of the smartphone / “dumb phone” debate.

Blaast rightly attacks the smartphone craze, its manifesto declaring that they “are just too expensive for emerging markets.” As Blaast seeks to capitalize on “the next billion people who will [access the Internet for the first time via] a mobile phone,” the company has created a cloud-based operating system, empowering much more affordable non-smartphones to do every app-lovable that smartphones can, on the cheap.

Like everything good and beta-testable, Blaast’s breakthrough offering unfortunately won’t launch in the sink-or-swim mobile climate of America. Instead, founder Joonas Hjelt has opted to develop his cloud-mobile revolution in the more tenable market of Jakarta, Indonesia — a move that will also let Hjelt and co. refine their commitment to low pricing for this vital, technologically democratizing service.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…