Feeds

Vodafone opens gates to barbarians

App-wielding hordes get global access, billing system

High performance access to file storage

Vodafone is set to announce a standard set of APIs, allowing third parties to create applications integrated with Vodafone servers around the world, including tapping the operator's billing system for micropayments.

In an announcement billed as (yet again) "redefining the mobile internet," Vodafone is unveiling a set of standard APIs that will work in every region in which the operator has a presence. This will allow developers to create applications and roll them out around the world, as long as they don't mind their market being limited to Vodafone's 289 million customers.

Operators have long allowed third parties access to internal services, particularly SMSC's for messaging and often with access to billing systems, too. But this has generally been on a case-by-case basis and only sharing limited functionality. Not only does that require developers to work with each operator in turn, but platforms are often fragmented even within the same operator - particularly where international expansion has been managed through acquisition - so developers often have to negotiate, and code, for every operator, in every region.

Not that today's announcement is the first attempt to address this problem: Vodafone makes much of the new API's ability to bill for small transactions, allowing developers to include the "insert coin to continue" functionality they've been hoping for. But Vodafone is also part of the "PayForIt" consortium, which provides the same functionality across multiple networks. PayForIt operates though gateways that take a cut of the money, so developers will have to decide on the value of being cross-network.

It's also worth noting that these new APIs are coming out of the Joint Innovation Lab (JIL), so should be applicable to the other JIL members in time - adding Verizon and China Mobile would put the JIL in charge of applications provided to more than 700 million mobile-phone users.

Obviously applications will need to be certified to have access to the APIs, something the JIL was already planning along with on-device APIs to allow (suitably signed) widgets with access to local, and network, resources - all of which should be revealed over the summer.

If this all sounds a bit familiar then it should - it's just what was promised, and in some ways delivered, by Qualcomm's BREW platform. Customers have rebelled against the level of control exercised by BREW operators, and Qualcomm has failed to expand the idea much beyond the USA. The JIL might prove a more benign controlling authority, but it will remain in charge of what you can do with your mobile phone. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.