Elgan: I want a military smartphone
The Pentagon wants deployed troops carrying smartphones, and better ones than you or I can buy
Computerworld - The most innovative and important consumer electronics company isn't a company at all. It's the Pentagon.
If that surprises you, consider that U.S. military research built the ocean that Silicon Valley swims in. The Pentagon's research organization, DARPA, funded or helped develop the Internet, GPS, the graphical user interface, the Google StreetView concept, Siri and much more.
Now, the military wants to put smartphones in the hands of all deployed troops. I think their phones are going to be better than regular smartphones. And that's why I want one.
The future of phones
Smartphones are already super thin and super light. Some have big screens but are still pocketable. They have powerful processors.
How can the industry maintain the rate of improvement and innovation of the last five years?
Of course, phones will get faster and lighter. Screen resolution will continue to improve.
The industry has other goodies in store, such as flexible screens and flexible phones. Flexibility will make phones more durable because they'll bend rather than break. Some phones will even be able to fold in half, so you'll be able to open a phone up like a book and double the screen size.
The industry is also working on ubiquitous wireless charging, edge-to-edge screens and many other innovations.
It's all cool stuff. But what I really want is the military superphone the Pentagon is working on.
Why I want a military smartphone
Historically, the military's technology initiatives have been prescient and practical and devoid of those annoying compromises in consumer electronics between what users want and what the industry wants.
Military phones are designed ultimately with the interests of the "users" in mind -- not the interests of the cellphone makers or the service providers.
In some ways, the military's goals for phones are bigger versions of our own goals, but they run counter to the goals of the industry that makes consumer handsets and provides wireless service.
For example, the military wants soldiers to be able to open a Google Maps mashup that shows the location and movements of their allies' forces. They want to make this as easy as possible, while at the same time making it difficult for enemy hackers to see the same information -- even if they get their hands on one of the devices.
That's what we consumers want, too, right? We want to take advantage of powerful location services without putting our privacy at risk.
The industry, however, wants to convince us that in order to enjoy location services, we've got to sacrifice privacy.
The military wants authorized personnel to be able to talk, text and message without the enemy intercepting those messages. So do we consumers.
But the industry wants us to use unsecure text messaging -- it costs them almost nothing, and they can charge us a lot for it. Vendors also want us to use unsecure social networks, unsecure email tools and other unsecure means of communication, all over unsecure Wi-Fi and mobile broadband connections.
The military wants phones with batteries that last a long, long time and can be charged by solar power or by hand-cranked generators, or whatever. So do we.
Alternative-energy solutions built into phones are viewed by the industry as unnecessary and contrary to their obsession with out-slimming the competition.
The military wants indestructible, dustproof, shockproof and waterproof handsets that can be upgraded, augmented and enhanced with standard modular plug-in hardware.
The industry, in contrast, benefits financially from selling fragile phones, because when we drop them on the pavement or in the water, we have to buy new ones.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!