Feeds

NFC sees future disappear in a Tag

Printing offer more bytes for your buck

Application security programs and practises

NFC pioneers Tikitag has admitted working on a printed version of their NFC starter kit, and is even hoping to talk to Microsoft about standardising the technology around the software giant's Tag product.

NFC is designed to allow mobile phones to pick up data from nearby unpowered sources, and has been pushed hard by mobile manufacturers (notably Nokia) as the next stage of handset functionality.

Tikitag sells an NFC development kit for those interested in trying the technology: $50 gets you a USB reader and ten tags to play with. But the company admitted, when talking to betaNews, that it'll be launching a visual version of its product come March as buyers are balking at the cost of the tags.

Microsoft's Tag has drawn a lot of attention to the ability of printed codes to provide the only profitable part of NFC for the cost of colour printing, removing the commercial incentive for NFC. Unsurprisingly Jeremy DeClerq, Tikitag's product manager, says the company might well end up talking to Microsoft about standardising the technology.

Tag linking to El Reg

The idea of reading barcodes, or variants thereof, using a mobile phone camera is nothing new. Various companies have developed the idea over the years, and most managed impressive demonstrations involving automated reading of business cards and posters; but to gain acceptance a single ubiquitous standard is needed, and until now no one has had that kind of market power.

Displaying barcodes on a mobile phone screen is nothing new either, as Mobiqa has demonstrated many times. Mobiqa has also started to make use of the flexibility of the technology, such as offering last-minute gig tickets to nearby fans when others fail to arrive, and providing exclusive access to venues for customers of a particular network operator.

NFC can do all this, and is a more elegant technology - but it's only going to get embedded in mobile phones if network operators ask for it, and they aren't going to do that unless they can see revenue. NFC Tags embedded in posters were supposed to provide that revenue stream - enhanced advertising would pay for the hardware and other applications would ride on the back of that. But with Microsoft pushing Tag into that application, it's hard to see how the network operator is going to make money out of NFC.

Perhaps customers will ask for NFC for their ticketing applications, but it's still network operators who push handset design and just as integral cameras came to promote MMS, and Bluetooth was bundled to sell headsets. So NFC needs a revenue-generating application, and one that can't be trumped by Microsoft. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
UN to Five Eyes nations: Your mass surveillance is breaking the law
And Navi Pillay calls for Snowden to be protected
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.