No Smartphone? Never Fear – Apps For All Are (Hopefully Soon) Here

Never Fear – Apps For All Are (Hopefully Soon) Here

Explicating the trendiness and popularity of intelligent mobile devices these days, smartphones such as the iPhone and Android smack of technological superiority. They flaunt generously sized display touch screens; only they are entitled to the Internet-surfing speed and power of the 4G network; those who shell out the big bucks to buy them can also enjoy new video conferencing features, such as FaceTime on the iPhone.

But easily the clearest indicator of status change between a smartphone and a lesser “dumb phone” entity is the capacity to delve into the can-do-everything-for-you world of applications, or apps.

Technically termed as application software, there is no shortage as to the number of apps available for users of smartphones of every stripe. The Apple store now advertises at least 500,000 different apps for the iPhone, while the iPad still profits from a more modest figure of 140,000 such programs. Droid adherents select from a nearly equally impressive selection of 400,000 apps for their devices.

The most popular apps tend to balloon beyond the mobile device community and aim for a place in the popular zeitgeist. Such hit apps as “Angry Birds,” which massacres the fervent competition for number-one status, strike chords both on and away from the phone. Applications for Facebook, Skype, and Google Maps are nearly as popular, as they prove incredibly useful in on-the-go situations with a cell phone in tow.

Sad news for those of us sans smartphones: the lack of a proper operating system, or OS, bars us from this world of delicious attractive apps aplenty. Or, at least it did.

Word broke last month that the Finnish start-up called Blaast has devised the technology needed to create an OS catering toward non-smartphones, enabling them to partake in the app craze. It’s only fitting that our beloved cloud computing is behind this potentially monumental shift in the status quo of mobile technology and the social politics of the smartphone / “dumb phone” debate.

Blaast rightly attacks the smartphone craze, its manifesto declaring that they “are just too expensive for emerging markets.” As Blaast seeks to capitalize on “the next billion people who will [access the Internet for the first time via] a mobile phone,” the company has created a cloud-based operating system, empowering much more affordable non-smartphones to do every app-lovable that smartphones can, on the cheap.

Like everything good and beta-testable, Blaast’s breakthrough offering unfortunately won’t launch in the sink-or-swim mobile climate of America. Instead, founder Joonas Hjelt has opted to develop his cloud-mobile revolution in the more tenable market of Jakarta, Indonesia — a move that will also let Hjelt and co. refine their commitment to low pricing for this vital, technologically democratizing service.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…