Feeds

Sun launches cell phone Java standard

Here come stocks, games, weather and traffic reports

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Sun has developed a standard for putting its Java software onto mobile phones. Called mobile information device, or more concisely MID profile, the standard promises to bring yet more stuff to the titchy screen of your mobile phone.

Did you know that you needed personalised stock quotes that can display graphs and give purchase or sell alerts delivered to your mobile? Well, have no fear for you shall have them. Other Java enabled services planned for your phone include up to the minute weather, restaurant locations, traffic reports, as well as downloadable games.

The idea behind the technology is that Java allows software to run on different devices without having to be specifically tailored for each one. However, in the past it hasn't worked on smaller, low memory devices. Sun has had to wait for screens to get bigger and processors to get faster before the pared down version would work on gadgety things.

Sun is touting this as the next step for consumers, away from text based static content, to properly interactive services. It is also being described as the first indication that the technology is shuffling into the real world, and out of the shadows of white-paperdom.

The MID profile will be used in cellphones from Motorola, Nokia, LG Electronics, Nextel and NTT DoCoMo, and handhelds from Research in Motion. Sun has also lined up a whole host of telcos to provide back-end services for the MID profile phones.

The MID profile standard is based on Java 2 Micro Edition. Other companies that plan to introduce MID profile enabled devices include Sony, Symbian, Matsushita, Siemens and NEC. ®

Intelligent flash storage arrays

More from The Register

next story
Be real, Apple: In-app goodie grab games AREN'T FREE – EU
Cupertino stands down after Euro legal threats
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Bada-Bing! Mozilla flips Firefox to YAHOO! for search
Microsoft system will be the default for browser in US until 2020
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?