Feeds

GSMA talks up embedded phones

Competition to get the price down

3 Big data security analytics techniques

The GSM Association has launched a competition to encourage smaller and more standard embedded 3G modules - all in the name of getting us to own more telephones.

Now that everyone has a mobile phone the GSMA is increasingly focused on getting us to own several, but with punters remarkably unwilling to carry more than one handset the idea is to embed mobile telephony into gadgets and devices: bringing connectivity where none was previously available, or wanted, or (in many cases) needed.

The competition is open to anyone who can manufacture an embedded 3G GSM module, with optional 2G compatibility and (ideally) a PCI interface: entries to be received by the first of October (details in pdf). The GSMA isn't offering much in the way of prizes, beyond introductions to member companies - though the value of that shouldn't be underrated - and lots of exposure including at the conference formally known as 3GSM* in Barcelona next February.

The idea of all this is to get some economy of scale to encourage the push into cars, health-tracking gadgets, and meters monitoring our use of electricity and gas; as well as embedded in our TVs and videos. Everywhere you might conceivably consider putting Wi-Fi is ripe for an embedded mobile phone, according to the GSMA, which is why everyone will be wanting a femtocell to carry all that traffic.

There is precedent here - many cars, and satellite navigation systems, already embed a mobile telephone to download updated information and report accidents. Amazon's Kindle e-book reader packs a 3G CDMA connection (which is why we won't see it outside the USA for a while). Most Kindle users never see it, but the connection on Sprint's network is used to download magazine subscriptions and books automatically. So a gadget-interested American with a modern car could well already have three mobile phones with them - why not a few more?

Network operators are desperate to find more revenue, and the always-on-but-never-busy nature of embedded devices suits the mobile networks perfectly, if they can get the price down to something sensible - they're unlikely to get down to the $5 cost of a Wi-Fi chip, but the possibility of revenue generation makes such a low price unnecessary. ®

*Mobile World Congress - but even the GSMA can't bring itself to use that name in the competition documents, simply referring to the event as "Barcelona".

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.