Feeds

MP3-to-FM transmitters unbanned in UK

iTrip, iCast etc legal - provided they're CE certified

Security for virtualized datacentres

It's official - it's now legal in the UK to use the iTrip and other low-range FM transmitters to send songs from your MP3 player to a radio. The once banned products can now not only be sold over here but connected to iPods without the owner being nabbed by engineers sniffing out pirate radio stations.

The devices were unbanned this past Friday following a year-long attempt to change the law by UK wireless regulator Ofcom. After proposing to change the law, waiting for interested parties to comment on the proposals, drafting the legislation modification, and waiting for further comments from the public and other stakeholders, Ofcom finally altered the 1949 Wireless Telegraphy Act.

There's one catch: the only low-power FM transmitters that are now legal are those that carry the CE mark. Griffin Technology, maker of the iTrip, the first iPod-to-radio FM transmitter, received its CE certification in the Spring of 2006. ®

Related reviews

Gear4 BluEye iPod-phone adaptor
Audioengine A5 amplified iPod speakers
Eye-Theatre video glasses for iPod
Apple iPod Shuffle 2G
Apple's second-generation iPod Nano
SanDisk Sansa e250 MP3 player

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.