Comcast Disses Net Neutrality By Blocking Online Services
According to a report from AP, Comcast actively violates the idea of Net Neutrality, interfering with attempts by some customers to share files online.
Here is a look at the report:
The interference, which The Associated Press confirmed through nationwide tests, is the most drastic example yet of data discrimination by a U.S. Internet service provider. It involves company computers masquerading as those of its users.
If widely applied by other ISPs, the technology Comcast is using would be a crippling blow to the BitTorrent, eDonkey and Gnutella file-sharing networks. While these are mainly known as sources of copyright music, software and movies, BitTorrent in particular is emerging as a legitimate tool for quickly disseminating legal content.
While I realize it's a slippery slope argument, I do worry when ISPs start to block certain types of traffic on their networks. Sure, they may be blocking BitTorrent today, but they may block other Web sites in the future. And as a consumer if I pay Comcast for broadband, I want to be able to control my Web experience.
I can hear some of you typing your e-mails already. Traffic shaping is a necessity for proper network management. All Comcast is doing is just making sure that it can deliver consistent quality of service. Not true:
Comcast's approach to traffic shaping is different because of the drastic effect it has on one type of traffic -- in some cases blocking it rather than slowing it down -- and the method used, which is difficult to circumvent and involves the company falsifying network traffic.
Comcast is going out of its way to block a specific type of traffic here and that is the kicker.
What do you think? Does Comcast have the right to manage its own network, even if that right interferes with Net Neutrality? Or is Comcast setting a potentially dangerous precedent?
Virtualization At The Desktop?
Examine how more than 250 companies plan to adopt server virtualization technology in this recent InformationWeek Research report, Server Virtualization.
The BI Explosion
Examine the business intelligence strategies of 500 companies, including deployment drivers and challenges, spending plans, and vendor selection, in this recent InformationWeek Research report.
Business Spending On Mobile Data Set To Surge
While consumer content has taken its fair share of dollars, enterprises are still spending about 23 percent more on mobile data services than all the teenagers in the U.S. put together. And ABI Research says those figures are about ready to ramp up.
Google's Search Business Runs On 75% Profit Margin
Just when you thought it was safe to go back into the ocean, someone reminds us just how deadly the shark out there really is. In this case the Great White in question, Google, is even more profitable than many of us had dared to consider.
Linux Will Be Worth $1 Billion In First 100 Days of 2009
What's Linux worth? The question has been a favorite of technology groups and cocktail party conversations ever since a character named Jeff V. Merkey offered $50,000 for a copy of Linux. The offer was a ploy. Merkey wanted it under the BSD license, which would have undermined the terms of the GPL. So he didn't get it. But we know, at least, that $50,000 proved to be a low bid.
Get Better Results from your IT investments In today’s environment, you need to get the most out of your assets and people … all the while serving the strategic needs of your business and dealing with growth and acquisition issues. In addition, it is critically important to quantify results of those investments for leadership and accurately track service level agreements.
Deploying Advanced Security in an Empowered Branch This webcast will explore how to extend advanced security capabilities into your branch network, including:
· How Network Admission Control (NAC) can apply to branch endpoints
· How to deploy Intrusion Prevention Systems (IPS) in a branch architecture
· How to address branch content and messaging security vulnerabilities
Independent Research Firm Uncovers BPM Trends You Shouldn’t Miss Join this interactive web seminar hosted by BEA Systems, featuring Forrester Analyst Colin Teubner as we explore why organizations are seeking to improve the efficiency, effectiveness, and strategic value of key business processes. Find out where BPM is going next and where it can have the greatest impact across your organization.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: InfoWeek@update.informationweek.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
InformationWeek Daily Newsletter
A free service of InformationWeek and the TechWeb Network.
Copyright (c) 2007 CMP Media LLC
600 Community Drive
Manhasset, N.Y. 11030
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.