Language Selection

English French German Italian Portuguese Spanish

The end of the (free) pipe dream?

Filed under
Web

What's gone wrong? Your service provider has abandoned the principle of network neutrality - that a particular service should be treated the same no matter who provides it. Unlike traffic shaping, which prioritises time-sensitive services such as internet telephony over less critical ones like music downloads, lack of network neutrality means that you no longer have a free choice of internet telephony service, as your ISP slows down or even refuses to carry the traffic of providers who haven't paid.

Although ISPs in the UK currently maintain neutrality, the issue is becoming a big one in the United States, with Senate hearings being held amid the clash of lobbyists. Service providers want network neutrality to be the law.

Telecommunications infrastructure providers on the other hand, frustrated that their stock is clapped in irons in the hold while that of Google and other service providers admires the view from the crow's nest, are planning a mutiny. They want a piece of that $2 billion-per-quarter treasure chest.

Ed Whitacre, the chief executive of SBC, a large telecoms company, summarised their frustration last year when he said: "Why should the service providers be allowed to use my pipes? The internet can't be free in that sense, because we and the cable companies have made an investment and for a Google or Yahoo! or Vonage or anybody to expect to use these pipes for free is nuts!"

So should telecoms companies be allowed to discriminate?

Full Story.

I'm all for making a buck...

But come on, we pay them quite enough for the poor service they already provide. And just how are they going to differentiate between a telephone call, an mp3 download, and an e-mail?

*******
http://myfirstlinux.com

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Today in Techrights

Linux 4.7.5

I'm announcing the release of the 4.7.5 kernel. All users of the 4.7 kernel series must upgrade. The updated 4.7.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.7.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st... Read more Also: Linux 4.4.22

Android Leftovers

Security News

  • Friday's security updates
  • Impending cumulative updates unnerve Windows patch experts
    Microsoft's decision to force Windows 10's patch and maintenance model on customers running the older-but-more-popular Windows 7 has patch experts nervous. "Bottom line, everyone is holding their breath, hoping for the best, expecting the worst," said Susan Bradley in an email. Bradley is well known in Windows circles for her expertise on Microsoft's patching processes: She writes on the topic for the Windows Secrets newsletter and moderates the PatchMangement.org mailing list, where business IT administrators discuss update tradecraft.
  • Yahoo is sued for gross negligence over huge hacking
    Yahoo Inc (YHOO.O) was sued on Friday by a user who accused it of gross negligence over a massive 2014 hacking in which information was stolen from at least 500 million accounts. The lawsuit was filed in the federal court in San Jose, California, one day after Yahoo disclosed the hacking, unprecedented in size, by what it believed was a "state-sponsored actor." Ronald Schwartz, a New York resident, sued on behalf of all Yahoo users in the United States whose personal information was compromised. The lawsuit seeks class-action status and unspecified damages. A Yahoo spokeswoman said the Sunnyvale, California-based company does not discuss pending litigation.
  • Yahoo faces questions after hack of half a billion accounts
    Yahoo’s admission that the personal data of half a billion users has been stolen by “state-sponsored” hackers leaves pressing questions unanswered, according to security researchers. Details, including names, email addresses, phone numbers and security questions were taken from the company’s network in late 2014. Passwords were also taken, but in a “hashed” form, which prevents them from being immediately re-used, and the company believes that financial information held with it remains safe.