Feeds

Fring looks to ID to boost ego coffers

Hopes operators will foot the bill

Application security programs and practises

Fring, maker of free phone software used to access a variety of loss-making services, reckons there's money to be made hosting identities for network operators. But the company's commitment to end users could be its undoing.

Fring's software consolidates a user's identities on the various loss-making services that are so popular these days - Facebook, Twitter, Skype, Google Talk, and the like - integrating them into a single interface that extends the on-device address book to include presence and status information. We've already covered various attempts by the company to generate revenue, but this time hosted identities are expected to bring in the readies.

The Fring client only connects, directly, to the Fring server, unlike applications such as Slick Messenger or IM+ that establish multiple connections from the handset to the various services. This means that Fring can easily support a whole lot of services, but it also forces the company to keep a huge number of servers running - an ongoing expense which desperately needs a business model to survive.

The latest wheeze is to get operators to pay Fring to run the servers, in exchange for offering customers a branded version of the client. This is, apparently, completely different from the inserted adverts that the company has already trialled: this is "branding", not advertising, and users don't mind that.

The Fring client is to be pre-installed on phones from Samsung, the Innov8 and the OmniaHD, which is impressive if not revenue generating. Austrian operator A1 is also offering a branded version of the client, so at least one operator is interested in hosting punters' on-line identities.

Other operators are also interested, but Fring's insistence on owning the customer relationship may discourage many.

Operators want to host identities to prevent churn - number portability means one can take one's number to any operator, but there is no regulation requiring operators to forward e-mail accounts, or social-networking identities.

Fring promises that users won't be locked to a network to use its service, punters will be able to switch networks and still log on to the same Fring account - exactly the functionality operators don't want, and will prevent them paying Fring for the service. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Rural mobile coverage: Tweeting twits to join chirping tits in UK's national parks
Yup, someone IS gabbering behind you on the hiking trail
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.