The Cloud Is Raining Smart Phones

The Cloud Is Raining Smart Phones

I resisted getting my first cell phone for as long as I could, but finally broke down and got one for use while driving- at the time I was living and working in the Seattle area and my family was a six hour drive away in Eastern Oregon. When you are pulling that kind of mileage two or three times a month, you learn that pulling over to find a phone booth is a time killing inconvenience.

Beyond Land Line Replacement

Still, even though my provider was happy to upgrade my phone every couple years, there was no reason to look for anything very fancy. After all, it was just a phone. It was for talking to people with. Oh, I learned to send texts (but not fast enough that my daughter would ever mistake me for somebody cool), but the important function of the mobile phone was its simplest- to call and receive calls when I was away from my land line.

Until the smart phones hit the market. Smart phones are so much more than just devices to talk to one another, smart phones are a direct tap into the Internet. The smart phone is not quite a perfect tool for interfacing with the ‘net, but the concept is improving on a daily basis.

Blurring The Line Between “Real” Computers

For the foreseeable future, the desktop or laptop screen will remain the preferred tool for going on the Internet, but the scales are rapidly turning. There are places where ‘net connectivity using mobile devices is already more common than using “real” computers.

The most significant differences between a “real” computer and a mobile device is the amount of available memory and the size of the interface. These differences are disappearing so rapidly that they are approaching insignificance.

One solution to the storage question is the use of increasingly huge micro-SD cards, indeed this may be the best solution for onboard storage of data dense media. Increasingly, smart phone users are turning to the Cloud for storage and software solutions.

For Ubuntu, Smart Phones are Real Computers

Some developers are answering the difference between between smart phones and “real” computers but embracing the concept that smart phones are real computers. Canonical, the company behind the Linux based Ubuntu operating system envisions a time when workers will not just plug their smart phones into their work computers, the smart phone will essentially power the full sized work computer.

Having a smart phone powering a full sized computer seems a little far-fetched at first. When you consider how much time the typical smart phone user actually spends communicating compared to “other stuff” it begins to make more sense. This is even before counting the time spent flinging cartoon birds through the air at evil pigs.

By Peter Knight

Sorry, comments are closed for this post.

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…