Welcome!

Cloud Security Authors: Elizabeth White, Liz McMillan, Yeshim Deniz, Ed Featherston, Pat Romanski

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, SDN Journal

@CloudExpo: Article

Carriers, Apple, Google, Microsoft... Fighting Over Slices of the Pie

Part 3 | Do the bit-carriers really have an open playing field to do what they want?

Much of the dialog over net neutrality seems rather dated. This is understandable, since the debate has been going on since last century.

The January 14th Federal Appeal Court decision in favor of the Internet access providers gave those companies (apparently) a degree of latitude to selectively block or prioritize edge provider services. We know that they want to do this, even though they might be coy about admitting it. Verizon, the plaintiff in the recent appeal case, issued a statement saying that nothing much will change as a result of this decision. We all expect Verizon and the other ISPs to take advantage of this change to the maximum extent they can. If they don't their shareholders might be a bit upset, after spending all that time and money.

However, there's more to this than the presence or absence of the FCC's now depleted Open Internet Rules, now substantially demolished. Do the bit-carriers really have an open playing field to do what they want? Since this debate started, the Internet has moved on. As a result the expectations of the access service-providers on one side, and the network neutrality proponents on the other, may both have to be revised. In my last blog on the topic of net neutrality, I hinted that there might be other factors in play that could make the whole concept less simple than it was when the topic first became hot. One of these factors is the role (and power) of the device manufacturers. Let's start there.

Apple was one of the first companies to demonstrate that there's more than one way to build a walled garden. While the Internet access providers dreamed of an end to net neutrality so they could control and charge for the flow of media from edge providers to content providers, Apple and others have already succeeded in doing something similar, and without spending huge amounts on legal actions and lobbying. And without upsetting their customers much, either.

In the mobile world, users of iPhones are pretty much limited to the apps chosen by Apple and offered in the Apple App store. By and large, those Apple-selected apps, which often dominate the users' experience, define the edge providers that the iPhone can access. Of course, general-purpose web browsing is still available, but most people live quite happily within the walled garden of apps approved by Apple. Apple led the way in circumscribing user behavior in this way, but the fashion quickly caught on. Android users have the Google (Play) store, and Windows Mobile users have the Windows Phone Store.

We can see the same thing happening for fixed-line Internet customers using desktops and notebooks. Oddly, Linux users were the first to experience the app-store approach. Some Linux distributions have long provided their users with an easy route to install approved applications from online repositories; non-approved apps are still available, it's just harder work to get them. With recent releases of Apple OS/X (Snow Leopard onward), the default way of buying software is via the Apple store; buying direct from a third-party vendor is starting to feel like a rather exceptional thing to do, as users are challenged when they try to bypass the store and have to tweak some security settings to make it possible to install a non-official app. From Windows 8.1 onward, Microsoft Windows users have their own App store too.

I don't believe there is anything suspicious going on here. Apple, Google, Microsoft, and the open source community are all aiming to make life simpler and easier for users, and at the same time create a user environment that is more structured, and controlled. These large corporations and communities are not forcing users into these walled gardens. They are enticing users to come inside and be safe and comfortable. For most ordinary users, this is seen as a fair trade: a win-win situation. Users can always take a walk in the wild woods outside if they want to, it's just that increasingly they don't want to.

Meantime, the US access providers have been busy in their efforts to remove the constraints imposed on them by the FCC. Now, theoretically, they are free to block and favor edge providers as much as they like. Well, perhaps not completely. Google, Apple, MS, and a lot of other companies in the web-connected device business have already built up their own portfolio of favorite web-enabled apps, providing device users with information services, online games, social networking, streaming media services, cloud services and more. Any attempts by the bit carriers to block or favor any of those online services would impact on the perceived value of all those net-connected devices, one way or another. The device manufacturers are now a firmly established part of the Internet value chain, and as such they will not be passive. If an access provider wants to provide preferential service to an edge provider, then the access provider needs to be sure the preferential user experience is not thwarted by the user's device. Or, if an access provider wants to downgrade an edge-provider's service it might be prudent to clear the ground with the device companies first, because they will want to know whom to point the finger at when their device users complain that certain apps no longer work the way they used to.

It seems that the Internet access providers might have to tread carefully here. Today, access ISPs are differentiated just by price for bandwidth, not much else. As long as the service is passably reliable, users can use any ISP. But, by definition any level of blocking or favoring will make a difference. It must, because if it didn't make a noticeable difference, no edge provider would pay for it. The device manufacturers are bound to take notice. Worst case, the device companies can explicitly tell users which ISPs will provide the best user experience for their devices and portfolio of apps, and which are to be avoided. Best case, the access ISPs will have to share the loot with the device vendors to keep them happy.

Either way, it will be interesting to watch the game. Starting with the iPhone, the device companies have mostly called the shots when it comes to defining the user experience. It's not likely they will be content to see this court decision changing that substantially.

More Stories By Esmeralda Swartz

Esmeralda Swartz is VP, Marketing Enterprise and Cloud, BUSS. She has spent 15 years as a marketing, product management, and business development technology executive bringing disruptive technologies and companies to market. Esmeralda was CMO of MetraTech, now part of Ericsson. At MetraTech, Esmeralda was responsible for go-to-market strategy and execution for enterprise and SaaS products, product management, business development and partner programs. Prior to MetraTech, Esmeralda was co-founder, Vice President of Marketing and Business Development at Lightwolf Technologies, a big data management startup. She was previously co-founder and Senior Vice President of Marketing and Business Development of Soapstone Networks, a developer of resource and service control software, now part of Extreme Networks.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
I think DevOps is now a rambunctious teenager - it's starting to get a mind of its own, wanting to get its own things but it still needs some adult supervision," explained Thomas Hooker, VP of marketing at CollabNet, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
It is of utmost importance for the future success of WebRTC to ensure that interoperability is operational between web browsers and any WebRTC-compliant client. To be guaranteed as operational and effective, interoperability must be tested extensively by establishing WebRTC data and media connections between different web browsers running on different devices and operating systems. In his session at WebRTC Summit at @ThingsExpo, Dr. Alex Gouaillard, CEO and Founder of CoSMo Software, presented ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
WebRTC is great technology to build your own communication tools. It will be even more exciting experience it with advanced devices, such as a 360 Camera, 360 microphone, and a depth sensor camera. In his session at @ThingsExpo, Masashi Ganeko, a manager at INFOCOM Corporation, introduced two experimental projects from his team and what they learned from them. "Shotoku Tamago" uses the robot audition software HARK to track speakers in 360 video of a remote party. "Virtual Teleport" uses a multip...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.