Feeds

Another day, another mobile platform

Incompatible with maximum growth

  • alert
  • submit to reddit

SANS - Survey on application security programs

Perhaps to the surprise of many, next-generation mobile data services appear to have received a generally warm welcome in Europe, with services such as Vodafone Live! reporting unexpectedly high take-up. But there is a looming threat from a lack of cross-device compatibility that could well damage the revenue-earning potential of such services.

The problem with new mobile data services lies not with the services themselves but with the devices used to access them. Operating systems, application environments and hardware platforms for mobile devices are proliferating at an alarming rate. The unfortunate upshot of this proliferation is lack of cross-device compatibility. Even where an application environment is ostensibly device-independent, there is no guarantee that the same application will run on every device so equipped.

The best (or worst) example of this so far is mobile Java (J2ME). A lack of advanced features in the original MIDP specification for mobile phones, has seen handset vendors add their own custom libraries and APIs to the software in an effort to increase functionality and make it compatible with their hardware.

As a result, developers currently have to tweak their applications to each device's particular specifications, not a good use of valuable programming time. Meanwhile, content providers are required to maintain multiple versions of an application in order to service users of different devices.

Looking beyond J2ME, base operating systems for mobile devices are also multiplying, creating an additional problem for content providers. Palm OS- and Pocket PC-powered devices are now increasingly being joined by Symbian OS and even Linux-based alternatives. And there are numerous others.

The situation is further compounded by the multiple hardware reference platforms now available for mobile devices, and the numerous form factors devices can take even when built on the same hardware and software foundations.

While it is unreasonable to expect companies that have invested millions of dollars developing systems to back out of the race, something has to give. What is needed is a software platform that is genuinely independent of the underlying operating system and hardware, and also gives content providers the opportunity to differentiate their offerings in terms of branding. Such systems already exist. And for the sake of the industry they should be used.

© datamonitor logo

Datamonitor is offering Reg readers some of its technology research FOC. Check it out here.

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.