Mobile communications devices have come a long way from just being phones. For many of us the computing power available on a new phone exceeds that of our first computers. On the most basic level, mobile technology refers to any device capable of utilizing mobile networks to perform basic communication functions like voice calls and short message service (more commonly called SMS or text messaging). More powerful devices, termed "smartphones," can perform functions normally associated with computers: receiving and sending email, web-browsing, and connecting to private email networks. Many phones also include decent quality camera and video features, with easy upload to a variety of sites and services where they can be shared with a wide audience instantaneously.
With an ever-expanding range of new devices available and never-ending marketing jargon, the landscape of mobile computing can be confusing for any accidental- or non-techie. Additionally, ubiquitous phones with fuller feature-sets offer new and different ways to connect with and engage communities with which your nonprofit or library works. This article — the first in a two-part series on mobile technologies — aims to explain the basics of how they work and what to consider when using them at your nonprofit or library. The second part in the series covers how nonprofits and libraries can embrace these devices within our organizations and how to leverage mobile for the social good.
Mobile technology, as with computers in general, has become more affordable even for those of us working in the nonprofit and library sectors. Unlike computers however, you don't necessarily get to do more things faster; your voice calls don't getting clearer, and your text messages don't get delivered faster. If anything, due to the increasing load, the performance of those basic functions may even have degraded. Still, like computers, mobile devices have moved from small monochrome screens to large color ones, and from ten-key pads to full thumbpads or touchscreens. This advance in technology is offering new ways of interaction and productivity in the workplace.
Just like computers, mobile phones and tablets need operating systems to power these devices. Here are the three most popular smartphone operating systems based on new smartphones sold:
Although many would argue that one brand/OS/device is better than another it should solely depend on your own needs and preferences. While the number of "apps" (more on this later) or programs that run on mobile devices is often used as a selling point, if an app is functional and well supported, it would be made for more than just one platform. Other differentiators include the presence a keyboard, size and weight, and the user friendliness of the main interface. And a phone is only as good as its voice and data service offered, so reviewing the plans and service reliability in your area should also play a role in your decision. Read on for more on networks.
In addition to smartphones, larger devices with touchscreens seven inches and larger are entering the market. Popularized by Apple's iPad, tablets like the Samsung Tablet running Android or RIM's Playbook are being heralded as the advent of a new computing trend. Although for now they are used mostly as content consumption devices, (you wouldn't want to compose your grant report on an iPad), you can certainly view and comment on it adequately on-the-go. Because of their increased screen size, many enterprises are embracing tablets as a legitimate productivity tool in addition to a laptop or mobile phone, sometimes merely as devices to connect to full-fledged virtual machines and servers. As more devices come out in the future we can expect to find more ways to use them.
If mobile devices are becoming more like computers that are truly mobile, we also need programs that can run on these devices. Developers are creating "apps" or mini-applications for phones that extend the basic functionality of your phone or tablet. Many apps are free, while others charge a small fee, all of which are designed to enhance your phone or tablet experience. Because your device is likely to be connected all the time however, one way these free apps are free is that they serve ads to your device when you use them, unless you pay for the premium version. This "freemium" model — where basic version of an app is free but addition features require a subscription premium — we often see in the cloud application space as well.
A quick browse on the app marketplace would suggest that most apps are either for entertainment, "applified" versions of popular websites, and lightweight versions of desktop programs. But beyond those categories there are many that make specific use of a phone or tablet's functionality that make them unique. For instance, all smartphones have at least a back-facing camera, while some have front- and back-facing ones. In theory, this makes them ideal devices for videoconferencing. Unfortunately there is still no easy way to do so between networks and platforms. Other apps that use the camera's capabilities include Google Goggles, which allows a user to take a picture or barcode and returns search results, or Instagr.am, an iPhone app that makes it easy to share photos in your social networks. Another feature that many apps utilize is the GPS function that captures a device's location. The popularity of apps that let you "check-in" to different locations, a feature that even Facebook is adopting, suggests that more apps will find innovative ways to use their unique capabilities. In the second part of this series, we will discuss how mobile can be leveraged for your organization.
This ability to consume content or interact with others depends on the availability of reliable and high-speed cellular networks. Although most devices can utilize standard wireless networking in your office or at a public library, the allure of mobile computing is that you can connect from anywhere where there is mobile carrier reception. While the United States still lags behind Europe and Asia in terms of affordability and speed, you can adequately use a smartphone or tablet in areas where you have reception with your carrier. It's certainly possible to not use any mobile network for a device (for example, some tablets are WiFi only), but having a device that can connect to a mobile network adds flexibility.
Your device, however, remains locked with your carrier; you cannot use an iPhone registered and configured with the ATT network with Verizon, nor can you use your T-Mobile Galaxy Tablet on Sprint's network. Partly due to this lack of portability, network carriers offer the option to subsidize the initial cost of a device, but require you to commit to a data contract. Others offer lower monthly charges with no contract but you pay more upfront. These contracts also impose data limits and overages if your usage exceeds that of your plan. If you are considering purchasing mobile devices for your organization, be sure to consider your needs before entering into a contract, and carefully read the terms and conditions of your data plan.
In terms of networks, each carrier boasts their performance and coverage over another. Here are some common terms and acronyms used by U.S. carriers:
So what does all this mean from an IT manager or accidental techie's point of view? For many nonprofits or libraries, using your personal devices for work purposes does not seem all that new. But because of this wider trend of "consumerization," social sector users benefit as well. For example, the move from on-premise services to the cloud reinforces the adoption of mobile technologies. In the past where you would have to setup VPN to allow external access to files on the network, you can opt to collaborate online using any device that can connect via the Internet.
As most nonprofits and libraries are probably are not resourced enough to be secured against all threats, mobile devices — and the confidential data they hold — opens another front that needs to be protected. Although checking email or downloading and opening and emailed file on your personal phone may seem innocuous enough, are you prepared to notify your clients and funders that you misplaced a personal phone or tablet on which you downloaded confidential information?
Accessing online data, which requires secure logins from any device, is only one measure against data leakage and loss. Built-in VPN and encryption for certain devices are a good start, but like every other IT policy, nothing beats a sensible and easy-to-understand approach to security. If you plan on getting mobile devices for your employees, be sure to have a proper use and replacement policy, and if they were to bring in their own devices, advise them of the potential risks to the organization. Compliance to specific laws notwithstanding, IT managers need to communicate clear guidelines of usage to employees using personal devices. Conversely, it is also possible that with their own devices the monetary loss to the organization might be less, and they are less likely to be misplaced.
We've only begun to scratch the surface in terms of possibilities for mobile computing. Netbooks, smaller notebook computers that were affordable but underpowered, brought a false dawn to this trend. But with manufacturers and developers bringing cheaper hardware and better apps, we can expect even more ways to use these technologies.
In part two of this series, we will look into how this trend affects those of us in the nonprofits, libraries, and NGOs and the opportunities to expand our missions as creators of mobile computing rather than just users.
Image: Tin can phone, Shutterstock
Join today to access donations and discounts for your nonprofit or library.
Already a member?