Feeds

Qualcomm turns a pretty penny on FLO spectrum

AT&T throws $2bn at unwanted spectrum

High performance access to file storage

AT&T has paid almost $2bn for the frequencies Qualcomm has been using to broadcast its MediaFLO service.

Qualcomm paid $683m for the two 6MHz bands, which used to carry analogue TV transmissions and cover 300 million people. For the last few years Qualcomm has been broadcasting TV-to-mobiles under the MediaFLO brand. Unfortunately no-one has been watching so now AT&T has offered $1.93bn with a view to supplementing its LTE download speeds.

MediaFLO is Qualcomm's proprietary technology for broadcasting TV to mobile phones, but despite being technically as capable as the competition it failed because no-one wants to watch broadcast TV on their phones - streamed TV on the move is a big hit, but broadcast TV is unwanted and unloved.

MediaFLO was one of the most successful, but only because Qualcomm poured money into it in the unswerving belief that if they built it we would watch. While other technology companies tried to sell their TV broadcasting to existing network operators, Qualcomm bought the spectrum, built the network, and then let mobile network operators (including AT&T) sell the service under their own brands. But even then no-one wanted to watch, and the service will finally shut down in March.

That investment is certainly more than the billion dollars or so that Qualcomm is making on the radio spectrum, so the project can't be considered profitable though the development of MediaFLO did lead to bundles of patents that might yet prove valuable.

DailyWireless has a list of some of the other technologies that tried to provide broadcast TV, though not exhaustive it does demonstrate how many companies believed they could compete with a YouTube stream. But it could have been worse - Europe nearly reserved an entire frequency for the service despite no-one wanting it.

AT&T will be using the spectrum - a pair of channels starting at 722MHz - to supplement its LTE download speeds, using a bonding protocol that's currently under development (scheduled for the next 3GPP version, Release 10). Ideal for delivering those YouTube streams that so effectively undermined the market for MediaFLO and its competitors. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.