Feeds

O2 kicks out Ericsson server for breaking its network

No third strike for dodgy database

High performance access to file storage

Ericsson's Centralized User Database has been fingered by O2 for a second network outage which hit the operator last week, and will thus be given the boot despite the £10m cost of a replacement.

Last week's outage wasn't as serious as the 21-hour downtime which hit O2 customers in July, but it was down to the same bit of kit – which is why O2 is replacing it with "a proven alternative solution" and has earmarked £10m to pay for the switch on top of the £1.5m that it spends daily on expanding the network.

"We are not prepared to risk this happening to our customers for a third time," says the canned statement from COO Derek McManus, who also talks about "re-focusing our Service Experience Team to be solely dedicated to ensuring the highest level of customer network experience". He adds: "Their performance will now be measured on customers’ confidence in our network."

Confidence is key here. Customers will pay more for reliable connectivity and will avoid any company they don't believe capable of delivering it. One outage may be considered unfortunate, it could happen to anyone, but two looks like a trend and something must be seen to be done.

But the move is bad news for Ericsson. O2 is still working with the telecommunications technology provider, of course – the whole radio network has been outsourced to Ericsson since 2009. The problem at hand is just this shiny new server, so Ericsson will be top of the vendor list to provide a replacement, but it won't be the only name there.

Huawei already has the O2 contract for next-generation kit, so will no doubt be putting its access to O2's Slough headquarters to good use in an attempt to get some kit in place, and one can be sure that the rest of the pack will be lurking nearby.

O2 tells us it is "working through the detail" on the replacement, and all likelihood it will be an existing Ericsson server, just one with less ambition than the CUDB.

It's hard to see how that will restore confidence of ordinary customers, but this is also about restoring the confidence of the industry, and investors, who may care more, and it will likely make O2 a little less gung ho about new servers in future too, for better or for worse. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.