Feeds

Vodafone opens gates to barbarians

App-wielding hordes get global access, billing system

Internet Security Threat Report 2014

Vodafone is set to announce a standard set of APIs, allowing third parties to create applications integrated with Vodafone servers around the world, including tapping the operator's billing system for micropayments.

In an announcement billed as (yet again) "redefining the mobile internet," Vodafone is unveiling a set of standard APIs that will work in every region in which the operator has a presence. This will allow developers to create applications and roll them out around the world, as long as they don't mind their market being limited to Vodafone's 289 million customers.

Operators have long allowed third parties access to internal services, particularly SMSC's for messaging and often with access to billing systems, too. But this has generally been on a case-by-case basis and only sharing limited functionality. Not only does that require developers to work with each operator in turn, but platforms are often fragmented even within the same operator - particularly where international expansion has been managed through acquisition - so developers often have to negotiate, and code, for every operator, in every region.

Not that today's announcement is the first attempt to address this problem: Vodafone makes much of the new API's ability to bill for small transactions, allowing developers to include the "insert coin to continue" functionality they've been hoping for. But Vodafone is also part of the "PayForIt" consortium, which provides the same functionality across multiple networks. PayForIt operates though gateways that take a cut of the money, so developers will have to decide on the value of being cross-network.

It's also worth noting that these new APIs are coming out of the Joint Innovation Lab (JIL), so should be applicable to the other JIL members in time - adding Verizon and China Mobile would put the JIL in charge of applications provided to more than 700 million mobile-phone users.

Obviously applications will need to be certified to have access to the APIs, something the JIL was already planning along with on-device APIs to allow (suitably signed) widgets with access to local, and network, resources - all of which should be revealed over the summer.

If this all sounds a bit familiar then it should - it's just what was promised, and in some ways delivered, by Qualcomm's BREW platform. Customers have rebelled against the level of control exercised by BREW operators, and Qualcomm has failed to expand the idea much beyond the USA. The JIL might prove a more benign controlling authority, but it will remain in charge of what you can do with your mobile phone. ®

Intelligent flash storage arrays

More from The Register

next story
YOU are the threat: True confessions of real-life sysadmins
Who will save the systems from the men and women who save the systems from you?
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Ofcom snatches 700MHz off digital telly, hands it to mobile data providers
Hungry mobe'n'slab-waving Blighty swallows spectrum
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.