Feeds

iThing builder Foxconn applies to be mobile network operator in China

Wants its customer's customers' customers

Secure remote control for conventional and virtual desktops

Foxconn, maker of Apple's iPhone, wants to own a mobile phone network in China and has applied for an MVNO licence.

Under Chinese law Foxconn, formally known as Hon Hai Precision Industry Co. Ltd, cannot own an MVNO itself and so is partnering with an unnamed Chinese internet company, according to an MVNO Dynamics report.

That anonymous company is one of the 10 businesses which are through to a third round in applying for a licence through China Telecom.

Vertically integrating from hardware manufacturer to telco isn’t new for Foxconn, which has a 14.99 per cent stake in 4G Taiwanese MVNO Asia Pacific Telecom. It recently spent $375m on a five per cent stake in SK Group’s IT unit, which in turn owns a stake in SK Telecom, Korea’s largest mobile phone company.

Foxconn claims that it is not looking to get into competition with its customers – or even worse, its customers’ customers – but just wants to provide an end-to-end service for its devices.

Apple is already known to be shifting an element of iThing manufacture to Foxconn rival Pegatron, so the move into services may well be a reaction from Foxconn which wants to prepare for a time beyond peak Apple. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.