Premium Content

Access "Olympic Games 2012: Preparing for a mobile data deluge"

Published: 26 Nov 2012

This year’s Olympic Games in London have been touted as the most connected in history.  With an estimated one billion people set to watch the events and millions more expected to log on to keep track of all the action, all aspects of connectivity had to be examined in the lead-up to the event. But the real difference with London 2012 is the mobile aspect.  The increase in adoption of smartphones and tablets over the past four years has been enormous, and the number of devices that will be used to access Games coverage has posed a huge challenge for the organisers. There is little they could do about the connections of mobile networks around the world but, when it came to the Olympic venues themselves, mobile operators have been hard at work with the Olympic Delivery Authority (ODA) to make the experience as seamless as possible for visitors. A report published today by the Institute of Engineering and Technology (IET) gave us a behind the scenes glimpse of the planning involved.     Data traffic of Olympic proportions Planning began back in 2009 when the UK ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...