Feeds

Ericsson to babysit 3's UK phone network

What's the hourly rate?

Internet Security Threat Report 2014

3 is to hand over control of its 3G phone network in the UK to Ericsson as part of a massive seven-year managed services deal.

More than 1,000 staff from 3 are to be transferred to Ericsson as part of the deal, although the giant operator has confirmed that no redundancies will be made as part of the move.

Financial details were not released but reports claim the agreement could be worth in the region of $3bn (£1.7bn).

A part of the deal the Swedish phone giant will be responsible for the management, operation and performance of 3's network and IT infrastructure in the UK, although the Hutchison Whampoa-owned company retains ownership of the network and IT assets.

Announcing the deal today 3 UK's chief exec Bob Fuller said the agreement was the "most efficient way to own and manage infrastructure of this kind".

Ericsson already has deals in place with 3 in Australia and Italy, where it manages the cellco's multi-vendor networks and in Sweden, where it looks after 3's messaging platform. ®

Intelligent flash storage arrays

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.