Feeds

MP3-to-FM transmitters unbanned in UK

iTrip, iCast etc legal - provided they're CE certified

Choosing a cloud hosting partner with confidence

It's official - it's now legal in the UK to use the iTrip and other low-range FM transmitters to send songs from your MP3 player to a radio. The once banned products can now not only be sold over here but connected to iPods without the owner being nabbed by engineers sniffing out pirate radio stations.

The devices were unbanned this past Friday following a year-long attempt to change the law by UK wireless regulator Ofcom. After proposing to change the law, waiting for interested parties to comment on the proposals, drafting the legislation modification, and waiting for further comments from the public and other stakeholders, Ofcom finally altered the 1949 Wireless Telegraphy Act.

There's one catch: the only low-power FM transmitters that are now legal are those that carry the CE mark. Griffin Technology, maker of the iTrip, the first iPod-to-radio FM transmitter, received its CE certification in the Spring of 2006. ®

Related reviews

Gear4 BluEye iPod-phone adaptor
Audioengine A5 amplified iPod speakers
Eye-Theatre video glasses for iPod
Apple iPod Shuffle 2G
Apple's second-generation iPod Nano
SanDisk Sansa e250 MP3 player

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.