Feeds

Android terms point to operator billing

The killer feature customers won't care about

High performance access to file storage

Changes to the small print of the Android Developers' agreement show Google's plan to hand over application revenue collection to network operators - a task they'll be glad to take on.

The changes, highlighted in a post on the Android Developers' blog, adds "authorized carriers" to the list of indemnified parties and creates a new section relating to payment processors, which should push Android handsets to the front of any mobile operator's advertising campaign.

The post even clarifies that the changes are "in preparation for some work we’re doing on introducing new payment options", just in case it wasn't already clear.

Operators would love to be able to sell applications and take advantage of the opportunities presented by in-application purchasing – selling application-specific bandwidth for example - but they also see application sales as compensation for rapidly-declining voice revenue.

Apple's iPhone ecosystem channels all the revenue from applications to Cupertino without the network operator getting a penny. This has inspired Nokia to try the same thing with Ovi, though Ovi does promise operator billing at some unspecified point in the future, while Samsung's Bada unapologetically follows Apple's lead.

That's got operators worried, which is why the GSMA has been diligently working on the OneAPI, which should allow any application to create billable events that function across network operators. So you could download a game from one operator, then change contracts and, within the game, buy an additional level with the cost appearing on the new bill.

Right now the OneAPI is only on trial in Canada, but network operators around the world are signed up to deploy it. It's possible that the changes relate to an operator-specific deal Google has planned, but integration with the OneAPI makes a lot more sense and would be more in keeping with the Google way of doing things.

Even if most of the revenue collected by the operators goes straight to the application developers, with Google perhaps getting a cut for running the Marketplace, the network operators will be happy to be part of the chain - happy enough to ensure that Android handsets form an important part of their heavily-promoted portfolio. ®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.