New iPass Exchange Could Change Wi-Fi Hotspot Revenue Model

By

Mobile operators have known for some time that smart phone and tablet users frequently use Wi-Fi connections, habits that offload demand from the wireless networks to the fixed line networks, simultaneously improving user experience.

Aside from end user preferences, total data demand on wireless networks is exploding. See more here.

The new iPass Open Mobile Exchange is a carrier-grade platform for service providers to integrate public Wi-Fi networks with 3G and 4G, allowing providers to seamlessly connect customers to preferred Wi-Fi networks, while adding the ability to support “for fee” access across different affiliated networks.

The platform incorporates the world’s largest commercial-grade Wi-Fi network with a highly reliable authentication and transaction settlements infrastructure, iPass said. That might allow users of one mobile network’s hotspots to use the iPass network partner hotspots, for example, as a roaming network.

At the same time, the exchange offers a way to monetize an asset that has proven a difficult stand-alone business. Up to this point, Wi-Fi networks have proven to be a value add for a fixed line broadband access service, where users got access to the public access facilities as an amenity for buying a fixed service, or using a mobile broadband service.

The exchange creates a monetization opportunity for roaming on other Wi-Fi networks. Read more. In principle, the new exchange allows mobile service providers to create a revenue-generating capability from their Wi-Fi networks where previously such networks had been amenities or features.


Gary Kim is a contributing editor for TechZone360. To read more of Gary’s articles, please visit his columnist page.

Edited by Rich Steeves

Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Editor

SHARE THIS ARTICLE
Related Articles

Unlocking Recruiting Potential: Leveraging LinkedIn Messaging API

By: Contributing Writer    9/20/2023

In the cheap place of hire, the strength of useful contact could be extreme. On the other hand, where details flow at the race of bright, businesses &…

Read More

Safe and Sound: A Guide to Auditing and Strengthening Digital Data Protection

By: Contributing Writer    9/12/2023

In today's heavily digital economy, data represents one of a company's most valuable assets and a key competitive advantage. But maximising the potent…

Read More

How to Conduct a Data Security Audit to Assess Vulnerabilities

By: Contributing Writer    9/7/2023

Businesses today retain a lot of data about both internal operations and their customers. This information is one of your strongest assets, but that a…

Read More

How Cyber Attack Can Ripple a Company's Operation

By: Contributing Writer    8/30/2023

Cyber attacks and Data breaches are pretty common these days. In the first half of 2022, businesses lost an average of $4.35 million. At the same time…

Read More

Cybersecurity: How to Stay Secure and Be Compliant

By: Contributing Writer    8/25/2023

The internet plays a huge part in our daily lives. We use it to find information, book tickets, pay bills and collaborate on work projects. Cybersecur…

Read More