Category: Net Neutrality

Lessons learned from the FCC decision

In the FCC ruling today, the commission criticized both the technology and the transparency of Comcast’s network management practices.  Network management in and of itself is not a problem, as the Commission has said in their FCC principles protecting consumer access to the Internet. The […]

Read more

A Case Study in Transparency

One of the overriding themes in the Network Neutrality debate, and what triggered much of the recent activity with Comcast and the FCC, has to do with transparency.  Or in the recent words of FCC Chairman Kevin Martin, “Consumers must be completely informed about the […]

Read more

Ono and ISP Coziness

Some of you may have seen the coverage that Ono picked up today because of it’s ability to optimize P2P transaction speeds by enabling more topologically optimal distribution – all while requiring no interaction with the ISP. On one hand, I’m happy about this, as […]

Read more

U.S. Broadband Not Soooo Bad..

Yesterday ITIF published a special report titled Explaining International Broadband Leadership. The report was aimed at digging into why the U.S. ranked a dismal 15th in broadband performance among OECD nations, as indicated in reports available here, and what variables might spur expanded broadband performance. […]

Read more

Blunt Instruments

In his written statement to the Senate Committee on Commerce, Science and Transportation on Tuesday of this week, FCC Chairman Kevin Martin referred to a particular method of traffic management as a “blunt means to reduce peer-to-peer traffic by blocking certain traffic completely.” The blunt […]

Read more

Net Neutrality’s Unintended Consequence

Most of the discussion surrounding net neutrality to date seems to revolve around fixed broadband consumers complaining that ISPs are unjustly mucking with their traffic, discriminating between different traffic types, and providing prioritization without their consent — and the providers shouldn’t be. Rob took a […]

Read more

5 Ways to Molest Internet Users

A good bit of the attention garnered by DMK’s ToorCon presentation focused on how ISPs are employing Provider-In-The-Middle Attacks (PITMAs) to collect ad-related revenue from their customers, and how security “of the web” ends up being fully gated by the security of the ad server […]

Read more