Feeds

No pr0n, no interference - puritan broadband is go

Point-free tests confirm what Ofcom already knew

Top 5 reasons to deploy VMware with Tegile

The FCC has completed tests confirming that deployment of its porn-and-cost-free network won't interfere with incumbent operators, as already established by Ofcom and Czech deployments.

The tests were completed during September, and state unequivocally that a deployment of Time Division Duplexing technology won't interfere with T-Mobile's Frequency Divisioned network lurking nearby. Licensees of the spectrum, known as Advanced Wireless Spectrum (AWS), will be allowed to deploy any technology they want, including TDD, and that worried incumbent operator T-Mobile.

These tests were demanded by T-Mobile despite the same issue having been thoroughly investigated by UK regulator Ofcom when looking at WiMAX deployments, and both technologies happily coexisting on neighbouring frequencies in the Czech Republic.

In fact, the tests were such a waste of time that two members of congress were moved to write to the chair of the FCC iterating this fact, and pointing out that the demands were little more than a delaying tactic by T-Mobile. That remains speculation, but the tests have now established that radio spectrum operates the same on both sides of the Atlantic and clears the way for the FCC to auction off the 25MHz of spectrum to anyone prepared to offer advertising-supported broadband to 50 per cent of the US population within four years.

The (very) technically minded might enjoy the full analysis direct from the FCC (pdf); but in summary, the level of interference that could be generated is not significant, regardless of the technology the auction winner decides to deploy.

It remains to be seen if anyone will be tempted to bid for the spectrum, which starts at 2155MHz but comes with significant public service guarantees including a promise to prevent users accessing inappropriate content. The economic situation has deteriorated slightly since June, when the proposals were published, and even then the business model was suspect. There's also the problem of finding a filtering technology to remove all that grot, and one that the whole USA finds acceptable. ®

Security for virtualized datacentres

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
Consumers agree to give up first-born child for free Wi-Fi – survey
This Herod network's ace – but crap reception in bullrushes
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
New EU digi-commish struggles with concepts of net neutrality
Oettinger all about the infrastructure – but not big on substance
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.