Feeds

World's biggest app store starts stocking shelves

Joint Innovation Lab opens for business

Build a business case: developing custom apps

Vodafone's Joint Innovation Labs is open for business, promising to approve applications in ten days and eventually provide access to more than a billion customers.

The 'Lab was set up a couple of years ago by Vodafone and China Mobile, with the intention of setting standard APIs for AJAX-style applications. Those APIs were updated on Wednesday and developers can now submit their applications to Vodafone 360, with the option of hitting every Vodafone customer worldwide and taking the traditional 70 per cent cut of the sale price.

Computer Weekly reports that 20 price points are available, ranging from 50 pence to a tenner, with some variation for local currencies. Approved applications will appear in the Vodafone 360 stores of all the selected markets, and already run on 50 different models of handset including the flagship '360 models.

Those applications are developed using JavaScript/HTML/CSS, but JavaScript extended with special JIL APIs to allow interaction with local resources and other applications. The JIL is far from alone in promoting such an approach: Palm's WebOS applications work just the same way, and the OMTP (Open Mobile Terminal Alliance) BONDI standard is supposed to provide the same thing - not to mention the W3C which is headed in the same direction, and various proprietary approaches.

Clearly there's a need for these standards to be merged, and that will happen eventually, but for the moment there are annoying differences in process and capability. JIL even offers a conversion facility, so widgets developed using engines from Nokia, Opera or Apple can be converted into JIL applications at the push of a button.

Verizon and Softbank are also signed up to the JIL, so a JIL-compliant application should eventually be available to more than a billion customers in more than 70 countries - which has got to be worth paying some attention to. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
PwC says US biz lagging in Internet of Things
Grass is greener in Asia, say the sensors
Ofcom sees RISE OF THE MACHINE-to-machine cell comms
Study spots 9% growth in IoT m2m mobile data connections
O2 vs Vodafone: Mobe firms grab for GCHQ, gov.uk security badge
No, the spooks love US best, say rival firms
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.