Feeds

Truphone enhances its presence

And adds SMS and 3G

Security for virtualized datacentres

Truphone, the VoIP provider for Nokia Series 60 devices with decent connectivity, has added presence to its offering, as well as making it work over 3G networks - where the operator allows it, of course.

Truphone has been one of the most voracious critics of network operators trying to exclude VoIP from their data services, or even disabling the function on handsets, because unlike the competition Truphone is aimed at non-technical customers so needs to be tightly integrated into the normal phone experience.

The new features demonstrate that, with users now being offered Truphone as an option to send an SMS, in just the same way as that option already appears when they make a phone call. A presence service moves contacts in to, and out of, address-book groups when they are connected to the Truphone service (and thus can be contacted for free). The intention is to allow contacts to know which profile a user has selected (silent, meeting, etc.), but for the moment you can only tell if someone is there or not.

The software is much better at noticing, and connecting to, Wi-Fi networks - certainly faster than the last version, and it will now work with 3G networks too.

Other VoIP clients, such as Fring and Skype, have long worked over 3G, but Truphone was limited to Wi-Fi to keep things simple and avoid the data charges (ironically, the simplicity argument is put forward by Vodafone as an excuse to remove the VoIP capability from the Nokia N95, at least in the UK). Customers with unmetered data have asked for 3G compatibility, and version 3 supplies that at the cost of some simplicity in connection management.

The tight integration of the Truphone client with the Series 60 applications; address book, dialler and messaging, is a demonstration of what is possible with an open phone OS, and a stark reminder of the kind of thing which will be impossible (at least from a third party) on Apple's iPhone. Users would have trouble identifying where a manufacturer's application ends and Truphone starts, which is perhaps just what Apple wants to avoid.

Version 3 of the Truphone client is available as beta now, with a couple of known bugs. Full release is expected this week. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Net neutrality protestors slam the brakes on their OWN websites
Sites link up to protest slow lanes by bogging down pages
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Who us, SHARE infrastructure? Networks reject gov proposal
Execs pour scorn on 'national roaming' outline – report
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.