Feeds

Android goes Skype, iPhone to follow soon

Only not really

High performance access to file storage

Skype has announced an Android version of its mobile VoIP service, and hinted that an iPhone client is in the works too - but anyone expecting proper mobile VoIP on Android will be disappointed with Skype Lite.

Officially still in beta, the Skype Lite service works in the same way as Skype's UK offering with network operator 3. A voice channel is used to make a local call which is then converted to VoIP back at the office, with one essential difference: Skype Lite users pay for that local call.

Remarkably Skype has managed to spin this into a feature: "Call on Skype wherever you are - no WiFi or 3G required", as though the ability to make phone calls over the phone network were something new. There are, of course, savings to be had for long distance and international calls, especially if those called are logged on to Skype.

Currently Skype Lite is available for a range of Java handsets ,and given that Android runs something akin to a Java Virtual Machine for all applications the port is unsurprising. An iPhone port will be more technically challenging as well as difficult to get into the Apple Application Store: partner operators are unlikely to be happy about a Skype Lite client turning their international calls into local ones, and if it can be stopped simply by asking Apple, with no public explanation needed, then they're likely to do just that.

Truphone managed to get their VoIP client onto the store, but only by removing the ability to work over 3G connections. The Skype Lite Java client connects over GPRS or similar to keep an updated list of Skype contacts, as well as allowing messaging to those contacts.

Skype isn't going to make a lot of money out of this - it's enabling users to make more SkypeOut calls, but the real aim is keeping punters logged in for longer. That way, the hope is, they'll be more likely to adopt Skype as a central part of their life - there's also the happy matter of a load of cheap publicity for porting a Java application onto a Java-based platform (Android). ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.