Feeds

First WiMAX handset launched, again

But even Clearwire reckons LTE is the future

High performance access to file storage

Americans will get a 4G handset in the summer from HTC and operating over WiMAX, though even America's WiMAX operator admits that LTE is technology of the future.

The handset is called the EVO, rather than "supersonic" as was rumoured, but the specs remain the same as it sports Android OS running on Qualcomm's Snapdragon processor, the EVO is also the first 4G telephone operable in America, for as long as Sprint continues to run its WiMAX network.

"The architecture of our network is designed to be able to add on LTE should we need to," Bill Morrow, CEO of Sprint joint venture Clearwire told the CTIA trade show in Las Vegas. "We consider ourselves technology agnostic."

Hardly a ringing endorsement for the WiMAX standard. Just to underline the options, Morrow spelled it out: "We can sunset one technology going forward if we need to in the future."

The decision to go with WiMAX was all about speed - not speed of the network, but speed to market as Sprint's CEO explained: "LTE will most likely be the larger of the two 4G standards, but for us, we couldn't wait."

Clearwire is probably right in that deploying LTE won't be that much of a challenge - once one has licensed spectrum, hired locations and built base stations, the cost of the technology isn't such a big deal. And Clearwire is still expanding its WiMAX network while noting that every base station built could be used for LTE if necessary.

At CTIA there's much talk of interoperable handsets supporting both LTE and WiMAX, though Computerworld reports that AT&T was pretty dismissive of the idea, as well it might be. The rest of the world isn't interested in interoperable 4G, and even America can't offer the economies of scale needed to make that happen.

But at least WiMAX networks now have a handset - two if you count the last "world's first WiMAX handset" which was launched by HTC back in 2008. That's two more than the LTE networks which are limited to data services while the operators sort out the minor detail of how to carry phone calls over their 4G phone network. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.