Feeds

Mobile API standard puffs on last cigarette

OMTP sings WAC me up before you go go

High performance access to file storage

Operator talking shop the Open Mobile Terminal Platform (OMTP) has sketched out its last three papers before it gets absorbed into the Wholesale Application Community.

The tasty bits of OMTP will get subsumed into the WAC, with the rest due to disappear into the GSMA and OMA from which much of it should probably never have emerged.

Folding the OMTP into the WAC is no surprise – there are too many initialled standards groups around at the moment, and at least the WAC has a clear agenda even if it is a necessarily optimistic one; that of taking on iTunes.

The OMTP was set up with the laudable intention of providing a set of cross-platform APIs through which operators could expose handset, and network, functionality to application developers. Back in 2004 that was going to be in Java, with the late-lamented SavaJe pushing the idea hard.

Since then the OMTP has floundered a bit, producing recommendation documents covering security, voicemail and all sorts of other odds and ends.

The last three – updates to Camera Maintenance, Visual Voicemail and Common Charger, are typical of the unfocused output of the talking shop. Some of the documents are valuable, and some even well written, but most of them ended up as discussion points which, in turn, led to more of the talking that mobile operator staff so enjoy.

In its BONDI project the OMTP found its original goal – cross-platform APIs exposing network and handset functionality, only in JavaScript rather than the original Java and suffering nothing from the change.

However, BONDI requires an authenticating body to sign approved applications, and the OMTP is poorly placed to provide that. So the operator's answer to iTunes, the WAC, takes over BONDI entirely while the other scraps drop into the Open Mobile Alliance (which already defines all sorts of things including MMS, WAP and such like) and the GSMA.

The OMTP's MD Tim Raby has already carved himself out a niche as interim CEO of the WAC, which should smooth the transition, but we'll have to wait until next month to get details of how the WAC is going to operate, and if it really can stand alongside iTunes. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.