Feeds

Joiku gets profit joys from unlimited mobile data

Operators will take convincing, though

New hybrid storage solutions

Hotspot developer Joiku is reaping some uncommon rewards. Its research shows almost a third of users upgraded to an unlimited data plan after buying its hotspot software, supporting the argument that such services can indeed make money for operators.

JoikuSpot turns a Symbian S60 phone into a Wi-Fi hotspot, allowing nearby devices equipped with Wi-Fi to share the phone's 3G data connection without needing cables or Bluetooth pairing. Such software has been frowned upon by network operators who are still getting comfortable with unlimited data plans, and don't want to see themselves struggling to make money like the fixed-line ISPs.

But most mobile users are still paying by the byte, and of 600 JoikuSpot users polled by the company 30 per cent (180) had upgraded to an "unlimited" data tariff after starting to use Joiku. This should earn money for the operator as long as those users aren't overloading the network, and the company reports that the average Joiku user only tots up 72MB a month - well below the "fair use" limitations put on data traffic.

Joiku knows exactly how much data is flowing as the traffic volume is recorded on the company's servers - which should be a concern when the premium version of application only costs €15 for a lifetime licence with the basic version (web only) is free. Running those servers without any recurring income is a shaky business model, constantly requiring new sales to pay for supporting existing users, and Joiku would much prefer to do a deal with network operators interested in increasing sales of unlimited tariffs: which explains the release of the figures.

Unfortunately for Joiku, network operators are much more interested in selling services and content than bandwidth. And when they are selling bandwidth they'd like it to remain separate from their telephony operations, through USB dongles and the like, where it can be more easily controlled. Joiku reckons its software can be equally managed, but will likely face an uphill battle to get operators signed on. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.