AT&T to deliver iPhone tethering 'soon,' says CEO
It's working with Apple to connect laptops to the Web via the iPhone
Computerworld - An AT&T Inc. executive today said that the company is working with Apple Inc. to come up with a way for iPhone owners to use the device as an ad hoc cellular modem to connect their laptops to the Web while they're on the road.
In an interview with blogger Michael Arrington at the Web 2.0 Summit, AT&T Mobility President and CEO Ralph De La Vega said his company would have a sanctioned tethering solution "soon" for iPhone users.
AT&T already provides the service -- where a laptop accesses the Internet through the mobile network by "tethering" it to a cell phone's wireless data connection -- for BlackBerry users at $30 extra a month. It has not, however, officially allowed tethering from the iPhone.
An AT&T spokesman confirmed De La Vega's comments, but declined to provide any more information, including exactly when the service would be available and at what cost.
Although Apple has quashed at least one tethering application by yanking it from the App Store in August, iPhone owners who "jailbreak" their phones can install one of several unsanctioned tethering programs.
One of those programs, PDAnet, was ported to the iPhone by its developer, June Fabrics Technology Inc., and can be downloaded and installed on the iPhone using the open-source Cydia application installer. PDAnet turns the iPhone into the equivalent of a wireless router that then can be accessed from any Mac or Windows laptop.
Current AT&T terms of service for iPhone plans, however, specifically ban tethering. "Furthermore, unlimited plans (except for Data Connect and BlackBerry tethered) cannot be used for any applications that tether the device (through use of, including without limitation, connection kits, other phone/PDA-to-computer accessories, Bluetooth or any other wireless technology) to laptops, PCs, or other equipment for any purpose," AT&T's conditions state.
Read more about Macintosh in Computerworld's Macintosh Topic Center.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!