Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

In 2018, the Federal Communications Commission repealed the Net Neutrality laws that were in place for several years with a vote of 3-to-2. This has allowed the ISPs to control the Internet again. Today, we present you with a brief reminder, and update the situation as we roll into 2019.

Our Internet?
Commercially-available Internet services have been made available for the better part of 30 years. It is available and utilized almost everywhere in the U.S. As broadband began to take off, there was a very noticeable shift in the way that ISPs governed high-speed internet. Today, as most applications require the use of high-speed Internet, it becomes more important than ever for people to have access to affordable high-speed Internet.

For the past seven years, legislators have attempted to pass a law that would secure an open Internet in the future. These attempts have failed miserably. Cases like Verizon Communications, Inc. vs. FCC haven’t helped the cause much, as the attempts to make broadband Internet service a utility were thwarted in the courts. Today, nobody really knows who is going to control the Internet in the days to come. Currently it is in the hands of the ISPs, but that doesn’t seem likely to stay that way. It seems like an issue that is split down party lines, so the controlling factor seemingly depends on what party controls the executive branch of the government. Without legislative intervention, that likely won’t change anytime soon.

What Is Going on with Net Neutrality Now?
Almost immediately after the last shift in 2018, lawsuits were filed and they seem to keep coming. States, advocacy groups, neutrality lobbies, and companies have all started lawsuits against the FCC both for their handling of the situation and for the repeal of net neutrality itself.

To see if the repeal of net neutrality is working to benefit consumers, you simply have to consider the following two points:

  1. Net Neutrality is hindering broadband investment. In 2018, the Big Four spent much less than it did prior to the repeal of the net neutrality laws. It was the first time in three years that investment has been reduced.
  2. It doesn’t make sense for ISPs to throttle Internet traffic. These companies reportedly slowed internet traffic without telling customers as soon as six weeks after the repeal. Websites such as YouTube, Netflix, and Amazon Prime were the most targeted for throttling. Verizon, specifically, was put into hot water after slowing speeds that led to slower EMS response times in sections of California battling record forest fires last year.

Despite the political bickering, there are similar views on some issues. Most governing bodies would like to see fast, open, and unobstructed Internet. There are older FCC mandates that have worked to prohibit ISPs from creating anticompetitive and harmful practices in the past, but whether these mandates would be enforceable with current FCC investment thwarted is unknown.

Individuals roundly support net neutrality laws. They simply don’t like the idea that corporations, whose stated purpose is to make as much profit as possible, hold control over how bandwidth is utilized. Only time will tell who is right.

If you would like to do something about it, go to https://www.battleforthenet.com/ and sign up. Do you believe market forces will keep ISPs honest, and the Internet open? Leave your thoughts in the comments section below.

Windows 7 Support Available, For a Price
Tip of the Week: Creating Process Documentation
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Network Security Productivity Productivity Data Software Managed IT Services Outsourced IT Data Backup Business IT Support Innovation Mobile Devices Ransomware Computer Tech Term Data Recovery Hardware Microsoft Small Business Google Cloud Computing Backup Business Continuity Internet of Things Managed Service Provider Smartphone Efficiency Remote Monitoring Upgrade Android Business Management Data Management Social Media Windows 10 Paperless Office IT Support User Tips Smartphones Disaster Recovery VoIP Encryption Workplace Tips Phishing Windows Managed IT Communication Artificial Intelligence Browser Cybersecurity Risk Management Windows 10 Save Money Facebook Collaboration BYOD Saving Money Server Mobile Device Management App Holiday communications Mobile Device Bandwidth Bring Your Own Device BDR Vendor Management Apps Recovery Passwords Gmail Office 365 Automation Applications Managed IT Services Government Firewall Unified Threat Management Wi-Fi Network Document Management Employer-Employee Relationship Compliance Robot Infrastructure Money Data storage Telephone Systems SaaS Managed Service Going Green Vulnerability Hosted Solution Business Technology Website Information Wireless Microsoft Office Password Content Filtering Analytics Virtualization IT Management Tip of the week Quick Tips Scam Healthcare Big Data Project Management Antivirus Chrome Customer Relationship Management Miscellaneous Computing Data Security Regulations Data loss Office IT Service Blockchain Training Printing Computers Storage File Sharing Tablet Remote Computing Files Help Desk Apple Customer Service Router Social Two-factor Authentication Politics Work/Life Balance VPN Virtual Reality Unified Communications YouTube Licensing Remote Workers WiFi Virtual Private Network Downtime Network Management Internet Exlporer End of Support Health Assessment IoT Administration HIPAA Budget LiFi Server Management Education Access Control Information Technology How To Monitors Machine Learning Mobility Operating System Alert Mobile Security Electronic Medical Records Employees Outlook Uninterrupted Power Supply IT solutions Mouse Company Culture Google Drive How To Samsung Word Sports Settings Chromebook Flexibility Business Growth Redundancy Private Cloud Avoiding Downtime The Internet of Things Mobile Computing Software as a Service Tech Support Hacker Smart Technology Digital Payment Remote Monitoring and Management Upgrades Users Maintenance Management Wireless Technology Legal Twitter Net Neutrality Patch Management Spam Websites Identity Theft Retail Cortana Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Display Permission Processors Travel Hard Drive Features Comparison Identity Botnet Authorization Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Cooperation Gadget Best Practice Mobile Favorites Mail Merge Update Test Touchscreen Techology Virtual Desktop Cache Electronic Health Records VoIP Sponsor Specifications High-Speed Internet Consultation Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Windows 7 Legislation IT Technicians GPS Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Professional Services SharePoint Staff Conferencing Address Roanoke — Central Technology Solutions Supercomputer Identities MSP RMM Disaster Resistance Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Black Friday Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Mirgation Tracking Dark Web Motherboard Google Maps OneNote Bluetooth Marketing Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Cyber Monday technology services provider IT Budget Hard Drives Google Docs Proactive Tech Terms Proactive IT Gadgets Notifications Remote Worker User Error Language eWaste Read Only Spyware Course Buisness Cables Backup and Disaster Recovery Black Market Smart Tech Cabling Humor Managed Services Provider Shortcut Migration Writing Emoji Data Warehousing Backups Employee-Employer Relationship Wasting Time Operations Drones Enterprise Content Management Finance Firefox Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Computing Infrastructure Point of Sale Deep Learning Network Congestion Wires Human Error Time Management Networking Current Events Cost Management E-Commerce WannaCry Computer Repair Technology Tips Chatbots Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive IT Consultant Error Printers Cybercrime