Feeds

T-Mobile UK confirms VoIP ban

But it may change its mind on IM

High performance access to file storage

T-Mobile UK believes VoIP isn't sufficiently consistent or capable of providing calls of a high enough quality calls to be allowed into its mobile phone network, the carrier said to day in response to revelations it has effectively banned the technology from its latest data-oriented airtime package.

However, the company did say it is considering allowing the use of instant messaging on its network "later in the year". For now, though, IM is likewise off-limits to the company's customers.

Earlier this week, Reg Hardware revealed that the terms and conditions underpinning T-Mobile UK's Web 'n' Walk Professional airtime package, which focuses on GPRS and 3G data connectivity, makes it clear VoIP and IM are not to be used.

"Use of Voice over Internet Protocol and Messaging over Internet Protocol [over the service] is prohibited by T-Mobile," the Ts&Cs read. "If use of either or both of these services is detected, T-Mobile may terminate all contracts with the customer and disconnect any SIM cards and/or Web ‘n’ Walk cards from the T-Mobile network."

We asked T-Mobile to comment on the policy. It said: "Voice over Internet Protocol (VoIP) in a wireless environment is an emerging technology. In our view, the technology is not yet of a consistent or high enough level of quality to offer a good customer experience on the T-Mobile network. This situation may change in the future, but for now we believe it is in the best interests of our customers to restrict the use of VoIP technology. We are also looking to provide an Instant Messaging (IM) solution for our customers later in the year."

Will T-Mobile's attitude relax when it enables its HSDPA 3G network? That technology will "allow customers to experience speeds of up to six times faster than current 3G speeds", the carrier told us. Its recently launched Web 'n' Walk Pro Data Card is "mobile broadband ready", according to T-Mobile, suggesting that while the 3G card isn't broadband now, it will be when HSDPA becomes available.

Hopefully, the big bandwidth boost will allow customers to use Skype as quite a few of them, if Reg Hardware readers are anything to by, want to do. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.