Feeds

BONDI gives mobile widgets a day in the sun

Alliance counts Opera and LiMO as friends

Designing a Defense for Mobile Applications

The Open Mobile Terminal Alliance has launched version one of its Web-2.0-widget platform BONDI with a reference implementation, software developer's kit and endorsements from Opera and the other Linux consortium.

BONDI is a selection of extensions to ECMAScript (the scripting language formally, and informally, known as JavaScript) to give digitally-signed scripts access to phone functions, including location, contacts, camera and messaging functions - enabling a scripted application to integrate with the phone environment in just the way that iPhone WebApps failed to do.

The OMTP is where operators are supposed to say what they would like to see, while manufacturers and software vendors nod sagely and go on to incorporate a completely different feature set more suited to their aims than those of their customers. Browser developer Opera has just become involved with the OPTP, along with the not-Android-or-Access Linux consortium LiMo, which seems to be under the impression the world needs three flavours of Linux for mobile phones.

But regarding mobile widgets, most of the industry seems to agree that a standardised set of APIs would be good for everyone. Still, Sony Ericsson recently told us they saw the proprietary Xperia "Panels" as a platform differentiator - so not everyone is singing from the same songsheet quite yet.

Ericsson is an OMTP sponsor and Sony Ericsson an advisor, so hopefully they'll come round to the idea of a standard platform, or implement both in an attempt to confuse developers and users equally. Implementing BONDI isn't technically very difficult, but securing it is: only "authorised" applications will be able to access the BONDI APIs. It's still far from clear who will be doing the authorising.

Network operators are the obvious choice, and would like the opportunity to further reduce churn that way - "leave us and all your applications will stop working!" But manufacturers won't stand for that, and neither will users, so it's far from clear who will be signing the apps that are allowed to run on BONDI-compliant handsets.

Not that there are any such handsets yet, though there is a reference implementation that runs under Windows, so developers can start to get a feel for the platform and what it's capable of. The project is consulting on both the technical details and the security mechanisms, the latter of which will most likely be the detail that will make or break the standard. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.