Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

In 2018, the Federal Communications Commission repealed the Net Neutrality laws that were in place for several years with a vote of 3-to-2. This has allowed the ISPs to control the Internet again. Today, we present you with a brief reminder, and update the situation as we roll into 2019.

Our Internet?
Commercially-available Internet services have been made available for the better part of 30 years. It is available and utilized almost everywhere in the U.S. As broadband began to take off, there was a very noticeable shift in the way that ISPs governed high-speed internet. Today, as most applications require the use of high-speed Internet, it becomes more important than ever for people to have access to affordable high-speed Internet.

For the past seven years, legislators have attempted to pass a law that would secure an open Internet in the future. These attempts have failed miserably. Cases like Verizon Communications, Inc. vs. FCC haven’t helped the cause much, as the attempts to make broadband Internet service a utility were thwarted in the courts. Today, nobody really knows who is going to control the Internet in the days to come. Currently it is in the hands of the ISPs, but that doesn’t seem likely to stay that way. It seems like an issue that is split down party lines, so the controlling factor seemingly depends on what party controls the executive branch of the government. Without legislative intervention, that likely won’t change anytime soon.

What Is Going on with Net Neutrality Now?
Almost immediately after the last shift in 2018, lawsuits were filed and they seem to keep coming. States, advocacy groups, neutrality lobbies, and companies have all started lawsuits against the FCC both for their handling of the situation and for the repeal of net neutrality itself.

To see if the repeal of net neutrality is working to benefit consumers, you simply have to consider the following two points:

  1. Net Neutrality is hindering broadband investment. In 2018, the Big Four spent much less than it did prior to the repeal of the net neutrality laws. It was the first time in three years that investment has been reduced.
  2. It doesn’t make sense for ISPs to throttle Internet traffic. These companies reportedly slowed internet traffic without telling customers as soon as six weeks after the repeal. Websites such as YouTube, Netflix, and Amazon Prime were the most targeted for throttling. Verizon, specifically, was put into hot water after slowing speeds that led to slower EMS response times in sections of California battling record forest fires last year.

Despite the political bickering, there are similar views on some issues. Most governing bodies would like to see fast, open, and unobstructed Internet. There are older FCC mandates that have worked to prohibit ISPs from creating anticompetitive and harmful practices in the past, but whether these mandates would be enforceable with current FCC investment thwarted is unknown.

Individuals roundly support net neutrality laws. They simply don’t like the idea that corporations, whose stated purpose is to make as much profit as possible, hold control over how bandwidth is utilized. Only time will tell who is right.

If you would like to do something about it, go to https://www.battleforthenet.com/ and sign up. Do you believe market forces will keep ISPs honest, and the Internet open? Leave your thoughts in the comments section below.

Windows 7 Support Available, For a Price
Tip of the Week: Creating Process Documentation
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 25 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Hosted Solutions Malware IT Services Privacy Productivity Hackers Internet Network Security Data Productivity Data Backup Software Outsourced IT Managed IT Services Business Innovation IT Support Mobile Devices Ransomware Microsoft Data Recovery Computer Hardware Tech Term Google IT Support Small Business Efficiency Backup Cloud Computing Business Continuity Internet of Things Smartphone Managed Service Provider Upgrade Android Communication Remote Monitoring Paperless Office User Tips Disaster Recovery Business Management Social Media Data Management Windows 10 Phishing Smartphones Encryption Collaboration VoIP Workplace Tips Windows Windows 10 Managed IT Services Managed IT Artificial Intelligence Browser Risk Management Server Cybersecurity communications Facebook Save Money Mobile Device BYOD Passwords Office 365 App Mobile Device Management Holiday Saving Money Robot Bandwidth Compliance Bring Your Own Device Business Technology Apps BDR Vendor Management Gmail Password Applications Automation Recovery Analytics Virtualization Network Government Firewall Unified Threat Management Employer-Employee Relationship Wi-Fi Chrome Document Management Vulnerability Managed Service Money Hosted Solution Telephone Systems Website SaaS Information Data storage Going Green Content Filtering Wireless Microsoft Office File Sharing IT Management Tip of the week Quick Tips Scam Big Data Healthcare Project Management Help Desk Antivirus Infrastructure Data loss Miscellaneous Data Security Computing Blockchain Regulations Training Office IT Service Printing Computers Storage Tablet Remote Computing Files Settings Two-factor Authentication Router Unified Communications VPN Customer Service Apple Social Politics Work/Life Balance Customer Relationship Management Virtual Reality Downtime Virtual Private Network Websites Identity Theft Wireless Technology Legal Twitter Licensing Network Management Internet Exlporer HIPAA Assessment IoT Administration LiFi How To End of Support Health Education Server Management Access Control Cooperation Budget Mobile Security Employees Information Technology Monitors IT solutions Uninterrupted Power Supply Alert Company Culture Electronic Medical Records Machine Learning Mobility Operating System Outlook RMM Mouse Sports Word How To Samsung Redundancy Google Drive Gadgets Proactive Software as a Service Flexibility Business Growth The Internet of Things Chromebook Avoiding Downtime Private Cloud Management Mobile Computing Smart Technology Users Tech Support Remote Monitoring and Management Maintenance Patch Management Hacker Networking Net Neutrality Spam Upgrades YouTube WiFi Remote Workers Digital Payment Enterprise Resource Planning Bookmarks Current Events Options Distributed Denial of Service Computer Repair Annual Convention WPA3 Financial Servers Data Breach Notes Printer Alerts Shared resources Comparison Physical Security Identity Telephony Permission Alt Codes Retail Cortana Hard Drive Sync Features Voice over Internet Protocol Google Calendar 3D Printing Law Enforcement Geography Authorization Display Cookies Public Cloud Disaster Trending Cryptocurrency Mobile Travel Favorites Mail Merge 5G Managed IT Service San Diego Botnet Fleet Tracking Procurement Technology Laws PowerPoint Processors Mobile Device Managment Electronic Health Records Software Tips VoIP Sponsor Hacks OneDrive Office Tips Specifications Virtual Desktop Test Touchscreen Typing Techology Cache Windows 7 Legislation Unsupported Software IT Technicians Virus Gadget High-Speed Internet Consultation Best Practice Lenovo Permissions Update Nanotechnology Star Wars Automobile Monitoring Computer Care Bitcoin Conferencing Address Wireless Internet Break Fix Social Networking Asset Tracking Statistics Professional Services SharePoint Staff Recycling Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions MSP GPS Disaster Resistance Security Cameras Unified Threat Management Social Engineering Hotspot USB Transportation Mobile Data Mirgation Development Zero-Day Threat Superfish Fraud Screen Reader Utility Computing Consulting Search Windows 8 Save Time Augmented Reality Crowdsourcing Managing Stress Meetings Instant Messaging Dark Web Motherboard Marketing OneNote Supercomputer Bluetooth Identities Virtual Assistant Downloads Buisness eWaste G Suite Read Only History Spyware Course Hard Disk Drives Dark Data Cyber Monday Personal Information technology services provider Tracking Tech Terms Proactive IT Remote Worker User Error Safety Language Migration Cables Taxes Backup and Disaster Recovery Google Wallet Smart Tech Managed Services Provider Google Maps Shortcut Operations Notifications Enterprise Content Management Finance Firefox Data Warehousing Employee-Employer Relationship IT Budget Hard Drives Google Docs Wasting Time Cabling Humor Solid State Drives Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Black Market Backups Teamwork Technology Tips Chatbots Wires Human Error Time Management Drones Writing Emoji Cost Management E-Commerce WannaCry Multi-Factor Security Wearable Technology Vulnerabilities Point of Sale Authentication Deep Learning Network Congestion Microsoft Excel Modem Connectivity Hacking Solid State Drive Database Cybercrime CrashOverride Web Server Regulation Cameras Motion Sickness CCTV Administrator Relocation Students Hard Disk Drive Webcam Printers IT Consultant Emergency Error