Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

In 2018, the Federal Communications Commission repealed the Net Neutrality laws that were in place for several years with a vote of 3-to-2. This has allowed the ISPs to control the Internet again. Today, we present you with a brief reminder, and update the situation as we roll into 2019.

Our Internet?
Commercially-available Internet services have been made available for the better part of 30 years. It is available and utilized almost everywhere in the U.S. As broadband began to take off, there was a very noticeable shift in the way that ISPs governed high-speed internet. Today, as most applications require the use of high-speed Internet, it becomes more important than ever for people to have access to affordable high-speed Internet.

For the past seven years, legislators have attempted to pass a law that would secure an open Internet in the future. These attempts have failed miserably. Cases like Verizon Communications, Inc. vs. FCC haven’t helped the cause much, as the attempts to make broadband Internet service a utility were thwarted in the courts. Today, nobody really knows who is going to control the Internet in the days to come. Currently it is in the hands of the ISPs, but that doesn’t seem likely to stay that way. It seems like an issue that is split down party lines, so the controlling factor seemingly depends on what party controls the executive branch of the government. Without legislative intervention, that likely won’t change anytime soon.

What Is Going on with Net Neutrality Now?
Almost immediately after the last shift in 2018, lawsuits were filed and they seem to keep coming. States, advocacy groups, neutrality lobbies, and companies have all started lawsuits against the FCC both for their handling of the situation and for the repeal of net neutrality itself.

To see if the repeal of net neutrality is working to benefit consumers, you simply have to consider the following two points:

  1. Net Neutrality is hindering broadband investment. In 2018, the Big Four spent much less than it did prior to the repeal of the net neutrality laws. It was the first time in three years that investment has been reduced.
  2. It doesn’t make sense for ISPs to throttle Internet traffic. These companies reportedly slowed internet traffic without telling customers as soon as six weeks after the repeal. Websites such as YouTube, Netflix, and Amazon Prime were the most targeted for throttling. Verizon, specifically, was put into hot water after slowing speeds that led to slower EMS response times in sections of California battling record forest fires last year.

Despite the political bickering, there are similar views on some issues. Most governing bodies would like to see fast, open, and unobstructed Internet. There are older FCC mandates that have worked to prohibit ISPs from creating anticompetitive and harmful practices in the past, but whether these mandates would be enforceable with current FCC investment thwarted is unknown.

Individuals roundly support net neutrality laws. They simply don’t like the idea that corporations, whose stated purpose is to make as much profit as possible, hold control over how bandwidth is utilized. Only time will tell who is right.

If you would like to do something about it, go to https://www.battleforthenet.com/ and sign up. Do you believe market forces will keep ISPs honest, and the Internet open? Leave your thoughts in the comments section below.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Hackers Business Computing Malware Privacy Productivity Email Business Hosted Solutions Microsoft Software Internet Windows 10 Computer Network Security Managed Service Provider Backup IT Services Ransomware Mobile Devices Innovation Smartphone Android Hardware User Tips Google Social Media Managed IT services Outsourced IT Browser IT Support Productivity Workplace Tips Efficiency Communication Disaster Recovery Business Continuity Data Backup Upgrade Data Smartphones Data Recovery Cloud Computing Data Management Small Business App Business Management Holiday Microsoft Office Internet of Things Office Miscellaneous WiFi Server Office 365 Network Windows Facebook Remote Monitoring Save Money Phishing Paperless Office Encryption Spam Tech Term Artificial Intelligence Gmail Big Data Managed IT Services Hosted Solution Recovery Customer Relationship Management Passwords Employer-Employee Relationship Unified Threat Management Bandwidth Firewall Password Robot Apps Remote Computing VoIP Money Work/Life Balance Infrastructure communications Wi-Fi Office Tips Collaboration Chrome Compliance Document Management Risk Management Tip of the week Vendor Management Cybersecurity Apple Avoiding Downtime Word IT Support Hacker Customer Service Mobile Device Management How To Content Filtering Saving Money Government Antivirus Presentation Project Management Business Growth SaaS BYOD Social Managed IT Data loss Downtime Website BDR Outlook Windows 10 Telephone Systems File Sharing Two-factor Authentication Settings Vulnerability Analytics Health The Internet of Things Computers Data Security Alert Hacking Applications Mobile Computing Printing Data storage Tech Support Computing Education Operating System IT Management Cybercrime Virtual Reality Mobile Device IT solutions Safety Wireless Technology Tablet Automobile Upgrades Wireless Business Technology Budget End of Support Specifications Mouse YouTube Unified Communications User Healthcare Legal Patch Management LiFi Retail Scam Twitter Monitors Remote Monitoring and Management Best Practice Politics Travel Lithium-ion battery Regulations Business Owner Identity Theft Google Drive Websites Automation VPN Physical Security Augmented Reality Going Green Marketing Net Neutrality Taxes Botnet IBM Running Cable Virtual Private Network Smart Technology Assessment Samsung Licensing Competition HIPAA Server Management Software as a Service Meetings Bring Your Own Device Search Router Sports Storage Mobile Security Digital Payment Information Technology IT service Maintenance Cortana Humor Virtualization Computer Care Administration Analyitcs Training Error History Electronic Health Records Troubleshooting Migration Virtual Assistant Black Friday Dark Web WannaCry Cryptocurrency Knowledge Nanotechnology Cables Data Breach Computing Infrastructure Time Management Access Control Cabling Cyberattacks Chatbots Phone System Cyber Monday Data Warehousing Web Server Bitcoin Update Staffing Experience IoT Wires Technology Laws Alerts Network Management SharePoint Administrator 3D Printing Bookmarks Identity flu season Lenovo Microsoft Excel Cameras VoIP Windows 8 Chromebook GPS Utility Computing Network Congestion MSP Domains Unified Threat Management Cooperation Touchscreen Downloads Law Enforcement Google Maps Disaster Unsupported Software Favorites 5G Entrepreneur Shortcut Fort Worth Application Superfish Blockchain CCTV Digital Emoji Tracking Users Display Proactive Public Speaking business communications systems Staff Multi-Factor Security Gadget flu shot Uninterrupted Power Supply Mobile Data Conferencing iPhone Hacks Cost Management Permissions Spyware Internet Protocol Flexibility Google Calendar Fort Worth IT Solid State Drive Employees Current Events Management Hard Drives Networking Fraud G Suite How To Processors Laptop Virtual Desktop WPA3 VoIP streamlines Operations Heating/Cooling Legislation DFW IT Service Motion Sickness Hard Disk Drive Social Networking Halloween Google Docs Enterprise Resource Planning Refrigeration Firefox Supercomputer Help Desk Writing Fleet Tracking business network infrastructure Wearable Technology Zero-Day Threat PowerPoint Servers Deep Learning Personal Information Fun Motherboard Scary Stories Mobile Consumers Techology Internet Exlporer IT Consultant IT Budget Machine Learning Social Engineering Asset Tracking data services Backup and Disaster Recovery Mail Merge Distributed Denial of Service Computer Repair Company Culture Undo Disaster Resistance Cleaning Consultation Notifications Relocation Software Tips Remote Workers eWaste IP Address IT Technicians Procurement Statistics Technology Tips Address Managed IT Service IT Sevices Webcam Alt Codes Electronic Medical Records Google Wallet Modem Dark Data Vulnerabilities Proactive IT Hotspot User Error Crowdsourcing Private Cloud Information Environment Mobile Office Mirgation Remote Worker Bluetooth Comparison Redundancy Break Fix Point of Sale Corporate Profile Typing Drones Cookies Buisness Geography IT Consulting Language Quick Tips Printer

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code