Feeds

So, will IM replace SMS?

And who can talk to who?

High performance access to file storage

News from 3GSM that some of the biggest mobile phone networks are planning to join up to push instant messaging (IM) over mobiles needs a little thought. The PC community has long settled into islands of IM services which can almost never talk to one another.

This is not so much due to technical difficulties (which is often claimed to be the case), but is down to unwillingness of the various suppliers to adopt the same format.

As we understand it, Microsoft has always wanted to communicate with other IM systems on other networks such as Yahoo, AOL and Google, but its motives are clearly to reach onto those environments and replace the customer reliance on their home software and effectively undermine their rivals.

Which is why programming teams work night and day and issue constant release updates from those companies in a vigil to ensure that interoperability is impossible. When in actual fact for the customers it is desirable.

So why don’t Vodafone, Orange, T-Mobile and China Mobile see it the same way, and why are they happy to work together to make it easy to IM between networks?

We believe this is borne of the same fear as the other wired IMs. The cellcos have a long history of having bridges to competitor networks. After all, communication is what their services are about. But what they don’t want is to sponsor an alien, possibly Microsoft owned, IM on their own handsets which might compete with SMS services.

What would be a total disaster for any of the cellcos is if SMS messages were diluted by IM, where that IM was supplied by someone else. It could take as much as 20 per cent of most operators' profits away at a stroke. And Yahoo, Microsoft, AOL, Google and Skype have all announced initiatives to put their services, such as email and IM software onto handsets.

Under the initiative, there are a total of 15 operators including those listed above plus O2, Telefonica, T-Mobile and Turkcell, covering 700m mobile phone users which have agreed in principle to use a single standard for IM, across all networks from some point later in 2006. Vodafone and Orange also said that they want to be the first to get interoperability working, while Orange plans to offer a common IM service between Orange customers and Wanadoo broadband customers.

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.