Browse Definitions :
Definition

dumbphone (dumb phone)

A dumbphone (also seen as dumb phone) is a mobile telephone that, unlike a smartphone, has little-to-no computing or internet capacity.  

Smartphones have become so sophisticated that they are for all intents and purposes miniature computers with the ability to make and receive voice calls -- which may be one of their less commonly-used features. Like the cell phones of decades ago, dumbphones are used mostly for calling. The devices typically enable texting, albeit through methods that don’t require a full keyboard such as multi-tapping or text on nine keys (T9). Some dumbphones include features such as MP3 players and simple games, in which case they are sometimes called feature phones.

Dumbphones don’t require data plans and are typically much cheaper to own and operate than smartphones. Because they don’t have many features, the devices have lower power requirements and can run for several weeks on a charge. With their limited connectivity, dumbphones also provide a security advantage over smartphones.

Dumbphones initially targeted the senior demographic whose members often found smartphones too complicated to use. However, the simple devices are becoming more popular across all age groups for people who have tired of being constantly connected. In the United States, 24 million dumbphones were purchased in 2015, and the market continues to increase.

See the Wall Street Journal's report on the return of the dumbphone:

This was last updated in November 2016

Continue Reading About dumbphone (dumb phone)

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close