Feeds

FCC balks at AOL/Time Warner wedding

Not using the M-word....yet

  • alert
  • submit to reddit

Intelligent flash storage arrays

On Friday, just after AOL and Time Warner shareholders gave their overwhelming final blessing to the proposed $123 billion merger, the US Federal Communications Commission (FCC) spoiled the party by demanding additional information from both companies in its investigation into issues related to competition, Reuters reports.

The FCC is asking pointed questions about AOL's new television service, wondering what services AOL-TV subscribers will get, and what deals the company has made with cable operators. The Agency also requested information about AOL's investment in TiVo, a personal television service which allows viewers to schedule programming, the wire service says.

The FCC also wants to look into Time Warner's cable system and will examine documents related to plans for Road Runner, a joint venture owned by Time Warner, Microsoft and Compaq.

The Agency also asked for a list of all companies in which either AOL or Time Warner holds a stake of five per cent or more, as well as the price to be asked of ISPs to gain access to the merged company's cable systems.

And if that wasn't enough, US watchdog organisation Consumers Union announced Friday that it will challenge the ownership links between AT&T and the proposed AOL/Time Warner mono.... em, very large corporation.

Together, the companies would control more than half of the cable lines in the US, Consumers Union reckons. They would also control access to over half of the Internet subscribers who connect through standard modems and three-quarters of broadband customers.

"These transactions could allow AT&T and AOL/Time Warner to undercut competition and inflate cable and Internet charges," Consumers Union stated on Friday.

Precisely what the FCC seems to have in the back of its mind too, though few analysts expect it to reject the proposal outright. What we're seeing here is probably more of a 'close read' of the two companies' various projections and rosy promises, with an eye to closing the loopholes. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.