Feeds

Verizon's open-door policy yields dip stick

Get your fuel tanks ready

3 Big data security analytics techniques

The first third-party device has been approved for connection to the Verizon network under the Open Development Initiative, and it's a very exciting electronic dip stick.

Verizon announced last November that it would be approving third-party devices for connection to their network, offering an alternative to buying handsets from the operator. The announcement prompted predictions of Google phones and homebrew handsets, with blogs gushing forth about how anyone could build their own mobile phone and completely change the industry. The reality is, as ever, rather more mundane.

SupplyNet Communications, a 21-person company based in Illinois, has the honour of getting first approval - for an electronic dip stick that sends a text message when tanks of liquid are running low. This is a fine example of just the kind of application that network operators would like to see more of, but hardly a revolution in telecommunications.

Verizon says it has spoken to a few companies about handsets, but most of the approvals will be along the same sort of lines as the electronic dip stick. Operators love that kind of application, as it utilises unused capacity while bringing in regular income. Swiss Telecom once considered embedding mobile phones in every set-top box just for updates, and we'll no doubt see mobes in all sorts of devices in the next few years as operators seek to squeeze every drop of value from their spectrum allocation.

Most of the kit Verizon approves will probably be this sort of embedded application, though we can always the hope the company will give approval to something more interesting.

European readers will have a hard time understanding all this, since the operator-approval model comes with the GSM standard and over here everyone has been free to build GSM kit since its inception. But in the US operators have traditionally had much more control over what's connected to their networks, so an electronic dip stick is still pretty exciting. ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.