Welcome!

Cloud Security Authors: Liz McMillan, Elizabeth White, Yeshim Deniz, Zakia Bouachraoui, Terry Ray

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, SDN Journal

@CloudExpo: Article

Network Neutrality, Victory or Disappointment? | Part 2

This decision looks likely to set the pattern for ISP regulation in the U.S. for some time to come

In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion.

The U.S. government has not enacted legislation to actually define and require Internet openness or to specify what level of non-openness is acceptable, if any. So openness is a concept without legal definition or backing, which means that individual opinions vary on what constitutes fettering and what doesn't. And attempts by the FCC to fill this gap with the Open Internet Order triggered this court action.

The debate, as constructed just now, offers two alternatives: Do ISPs have the right to manage Internet traffic preferentially, thus by most definitions fettering that traffic? Or do governments have the right to prevent ISPs from managing Internet traffic preferentially, thus clearly fettering the Internet by engaging in regulation of its players?

The FCC in the past has held the view that regulating the ISPs to prevent fettering is a lesser evil than allowing the ISPs to manage their traffic.

The recent U.S. federal court decision agreed with the ISPs that the FCC should not regulate ISP activity. Note that this decision is not based on the pros and cons of openness, but on the limits to the authority of the FCC. The court stated, "Our task as a reviewing court is not to assess the wisdom of the Open Internet Order regulations, but rather to determine whether the Commission has demonstrated that the regulations fall within the scope of its statutory grant of authority."

Whatever the reason, it seems that ISPs are now free to offer preferential quality of service to edge providers and edge providers are free to pay them money for the privilege.

What can happen next? Taking this to the U.S. Supreme Court is something that pro-neutrality advocates must be considering, but since the issue is not about neutrality, but rather FCC jurisdiction, the chances of success are likely to be slim.

What about a move to change the scope of FCC jurisdiction? This could be achieved by legislation that specifically defines Internet openness, makes it a legal requirement and empowers the FCC to oversee it. Not much chance of that happening anytime soon.

Alternatively, the FCC could make the case that Internet access should be defined as a common carrier service, which would make it subject to the same kind of oversight as traditional phone services. Judge Silberman in his (partially) dissenting opinion fears this possible consequence, while the New York Times encourages the FCC to go for it. Why the difference? Apparently Silberman dislikes government regulation more than he dislikes corporate manipulation of Internet traffic, while the New York Times just happens to take the contrary view. The divisions continue, and it seems that extending the jurisdiction of this FCC ruling in this way is not much more likely than new legislation.

Altogether, this decision looks likely to set the pattern for ISP regulation in the U.S. for some time to come, and we should start thinking about the implications it will have on the future. If we look closely, we may find that for the winners in this case, it may turn out not to be such a big deal after all, and those who view this as an unmitigated disaster may be relieved that it's not as bad as they feared.

If this decision stands, as seems likely, there are a number of possible repercussions to consider. In what ways will the ISP competitive landscape be transformed? How will edge providers respond? How does the role of applications change in a world in which fettering is normal, and how will that impact the software companies? Will there be a knock-on effect on the venerable institution of inter-ISP peering charges? And what will be the impact on the billing needs of all these players in a world made much more complex?

Leave a comment to let us know where you think these new developments will lead us.

More Stories By Esmeralda Swartz

Esmeralda Swartz is VP, Marketing Enterprise and Cloud, BUSS. She has spent 15 years as a marketing, product management, and business development technology executive bringing disruptive technologies and companies to market. Esmeralda was CMO of MetraTech, now part of Ericsson. At MetraTech, Esmeralda was responsible for go-to-market strategy and execution for enterprise and SaaS products, product management, business development and partner programs. Prior to MetraTech, Esmeralda was co-founder, Vice President of Marketing and Business Development at Lightwolf Technologies, a big data management startup. She was previously co-founder and Senior Vice President of Marketing and Business Development of Soapstone Networks, a developer of resource and service control software, now part of Extreme Networks.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...