Feeds

Everything Everywhere pushes towards 4G, wants to show off its wad

HSPA+ in six months, LTE by year-end

Maximizing your infrastructure through virtualization

Everything Everywhere is planning to deploy 4G into the UK by the end of 2012, but mostly just to remind everyone how much it is investing in UK infrastructure.

The switch to HSPA+, which will see those nearest the transmitters doubling their 3G connection speeds, will happen in the next six months or so, and, if Ofcom will let it, then EE will start deploying 4G (LTE) technology into the 1800MHz band it already owns by the end of the year, in Bristol at least.

It probably won't be the first LTE service launched in the UK, but it will likely be the first one to offer mobility and the first from a cellular operator. Although competitors will point out that EE can do this thanks to its huge spectrum holdings – a portfolio so large than that it is being forced to sell of at least 30MHz of it just to avoid unfair market dominance.

That auction is one of the reasons EE is so keen to tell us about its spending – apparently it is investing £1.4m every day on improving its network infrastructure. It's keen to highlight that, as the operator is under fire over its plans to make something in the region of £400m selling off that 30MHz of spectrum which was allocated to it back in the days when one didn't buy frequencies.

So France Telecom and Deutsche Telecom – joint owners of EE – will be making money from something they were given by the UK government.

But if EE can show it is spending that money improving UK infrastructure then it undermines the outrage one might feel, and gets EE into the lead for 4G deployments.

The Bristol LTE will be slotted into 1800MHz, a band which isn't being widely used for LTE. That's in contrast to the 800MHz band, which is allocated for LTE in Europe, or the 2.6GHz band which is globally recognised as LTE-friendly, but neither of those will come up for auction until the end of 2012 at best. So EE will have some challenges sourcing devices able to make use of its early deployment.

Which means using USB dongles and fixed-access points, rather than connecting handsets or embedding in tablets, but it should still be fast and that's to be appreciated – even if we're all paying for it in the end. ®

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.