Feeds

No pr0n, no interference - puritan broadband is go

Point-free tests confirm what Ofcom already knew

Remote control for virtualized desktops

The FCC has completed tests confirming that deployment of its porn-and-cost-free network won't interfere with incumbent operators, as already established by Ofcom and Czech deployments.

The tests were completed during September, and state unequivocally that a deployment of Time Division Duplexing technology won't interfere with T-Mobile's Frequency Divisioned network lurking nearby. Licensees of the spectrum, known as Advanced Wireless Spectrum (AWS), will be allowed to deploy any technology they want, including TDD, and that worried incumbent operator T-Mobile.

These tests were demanded by T-Mobile despite the same issue having been thoroughly investigated by UK regulator Ofcom when looking at WiMAX deployments, and both technologies happily coexisting on neighbouring frequencies in the Czech Republic.

In fact, the tests were such a waste of time that two members of congress were moved to write to the chair of the FCC iterating this fact, and pointing out that the demands were little more than a delaying tactic by T-Mobile. That remains speculation, but the tests have now established that radio spectrum operates the same on both sides of the Atlantic and clears the way for the FCC to auction off the 25MHz of spectrum to anyone prepared to offer advertising-supported broadband to 50 per cent of the US population within four years.

The (very) technically minded might enjoy the full analysis direct from the FCC (pdf); but in summary, the level of interference that could be generated is not significant, regardless of the technology the auction winner decides to deploy.

It remains to be seen if anyone will be tempted to bid for the spectrum, which starts at 2155MHz but comes with significant public service guarantees including a promise to prevent users accessing inappropriate content. The economic situation has deteriorated slightly since June, when the proposals were published, and even then the business model was suspect. There's also the problem of finding a filtering technology to remove all that grot, and one that the whole USA finds acceptable. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.