Feeds

The beginner's guide to near field communications

Wave me the money

Security for virtualized datacentres

Near-field communications (NFC) will take off very quickly - once it's clear who can make money from it.

From the look of it, 2011 is the year that it will all become clear.

Mobile handset vendors are rushing to incorporate NFC into their roadmaps, with several high profile NFC-enabled handset launches pencilled for mid-2011.

RIM recently hinted at incorporating the technology into new BlackBerry devices, the iPhone 5 is widely expected to include an NFC chip, and Samsung and Nokia are understood to be planning several NFC-enabled phones.

Mobile operators are gearing up too. In the UK, for instance, O2 is building out an NFC team and forecasts that near field communications will enter the consumer mainstream in mid-2011. Orange UK is equally bullish, forecasting sales of 500,000 NFC-enabled phones this year.

So what's the fuss all about?

N-Marks the spot

NFC uses low-powered radios to communicate tiny amounts of information over very short distances - 100mm or less.

An NFC device, typically a mobile phone, can talk to compatible smart cards and readers, and other NFC devices, and it incorporates technologies used by public transport systems for ticketing and payments.

In Europe and the US, the term “NFC” is used synonymously with the "N-Mark" standard maintained by the NFC Forum.

N-Mark has expanded steadily, and its inclusion of standards used in mass-transit systems allow the NFC Forum to claim hundreds of millions of units deployed, despite the fact that only half a dozen NFC-capable devices have been launched, and none has yet been successful.

Applications for NFC include making a fast payment, or pairing a device with a router, or even exchanging business cards with a colleague.

Two applications that do offer an obvious revenue stream are stored-value payments and location advertising.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Oi, Tim Cook. Apple Watch. I DARE you to tell me, IN PERSON, that it's secure
State attorney demands Apple CEO bows the knee to him
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Monitors monitor's monitoring finds touch screens have 0.4% market share
Not four. Point four. Count yer booty again, Microsoft
Getting to the BOTTOM of the great office seating debate
Belay that toil, me hearty, and park your scurvy backside
Hey, Mac fanbois. HGST wants you drooling over its HUGE desktop RACK
What vast digital media repository could possibly need 64 TERABYTES?
In a spin: Samsung accuses LG exec of washing machine SABOTAGE
Rival electronic giant tries to iron out allegations
Lumia rebrand begins: Nokia's new UK web home is Microsoft.com
Yarr, them Nokia logos walking the plank and into the drink
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.