Feeds

Telefonica gobbles up Jajah

A realised VoIP business plan

Internet Security Threat Report 2014

VoIP outfit Jajah got its Christmas wish, €145 million in cash from mobile operator Telefonica.

Telefonica, which operates as O2 in the UK, has bought Jajah lock, stock and barrel, gaining a presence in social networking sites as well as the opportunity to up sell services to the millions of users who signed up for the cheap phone calls Jajah offers.

Jajah competes with Skype and its ilk, offering low-cost Voice over IP phone calls routed over the internet, but differs in that calls are set up through the Jajah server which makes outgoing calls to both parties - so no VoIP encoding is required on the client side. That makes the service easy to use, and compatible with any phone system, but it also means Jajah isn't as cheap to use as rivals that rely on VoIP for end-to-end connections.

In a world where Twitter is worth a billion dollars €145m isn't really that much money, and Jajah has business customers to whom Telefonica would like to be selling services. The service is also well integrated into social networking services including Facebook, MySpace and Twitter.

Jajah users might not be as profitable as normal customers, but they do generate income (in the shape of termination fees paid for all those incoming calls) which makes Jajah a better partner than, for example, Skype. Telefonica would also like a presence on the social networking scene, so it can up sell to consumers as well as businesses.

For the moment Jajah will continue as a separate brand, while the operator tries to work out how to sell a lower-quality voice service without cannibalising their existing offerings, but at least that potential competitor is now in house, and thus more easily tamed.

Internet Security Threat Report 2014

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?