Feeds

Why so shy on pay-by-wave, Nokia?

New site pushes NFC but the elephant is holding a purse

High performance access to file storage

Nokia has launched a new website promoting Near Field Communications without any mention of the pay-by-wave systems that have got everyone else so excited.

The site lists all the things one might want to do with an NFC handset, such as sharing pictures, pairing devices and reading passive tags to get local information, but nowhere is there any mention of the proximity-payment systems which are becoming synonymous with the contact-less technology.

Nokia's current NFC phones can't do proximity payments, which may explain the company's reluctance to push that particular application, and NFC does have a host of other useful capabilities – but the lack of obvious revenue stream has pushed them into the background.

It's worth remembering that Bluetooth didn't take off until operators realised the mark-up on a Bluetooth headset was better than a telephone, and as European operators own shops they mandated Bluetooth in handsets, something that never really happened in the USA. Being able to swap business cards with a tap of the phone is fun, but it isn't making money for anyone.

Despite Nokia's reluctance to promote payments though NFC it is still presenting a public discussion on the subject next week, in with the London School of Economics. The subject is how security fears are stifling wireless payments, though we're not convinced they are considering how quickly companies (other than Nokia) are pushing ahead.

Next year's London Olympics, for example, will be awash with wireless payment systems, with Coca-Cola apparently considering NFC vending machines within the site and Visa ensuring that the venue is a showcase for its PayWave tech (and that the competitor's PayPass platform isn't in evidence).

Nokia keeps trying to remind us that NFC isn't just about payments, which is all very well and good, but the Finns are going to have to support those payment systems eventually if it isn't going to be left behind entirely. ®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.