Feeds

FCC boss reshapes hardline stance on Comcast

No fines - this time

Maximizing your infrastructure through virtualization

FCC boss Kevin Martin has said he doesn't want the regulator to fine Comcast for deploying traffic shaping its cable network.

Instead, he wants the FCC to order Comcast to do what Comcast has already promised to do: use more transparent traffic shaping techniques, and disclose them fully to users. Chairman Martin needs the votes of at least two of the five FCC commissioners.

Last week Martin declared that he had "found that Comcast's actions in this instance violated our principles". These require ISPs to provide open access to the network, "subject to reasonable network management". For a while it appeared Martin was preparing some strict discipline for the errant ISP. Although Martin never mentioned fines as a sanction, he has now confirmed these are not an option for the FCC.

"When they show they are blocking access to some sort of content, they have the burden to show that what they are doing is reasonable," said Martin on Friday.

Martin said that it wasn’t just Comcast’s decision to target BitTorrent users that was a problem, but also that it didn’t tell the fellas at the FCC what it was doing and applied the policy indiscriminately, even blocking BitTorrent users who weren’t swapping large files.

Comcast has argued that its "torrent busting" - resetting uploads - simply stalled a few bandwidth hogs so that most Bittorrent downloaders saw a better service.

"The empty 'punishment' allows both sides to claim victory," wrote internet engineer Richard Bennett on his blog.

But Comcast is still spitting feathers - a company spokesperson told the Wall Street Journal: "You can't enforce this because there aren't any rules. It violates all sorts of due processes in the way you are supposed to create rules."

Agitators insist that nothing short of a new law will do.

"Even if the Commission ultimately issues an order against Comcast, there is still a need for legislation to prohibit discrimination by telephone and cable companies while preserving the rights of Internet users and companies that do business on the Internet," said Public Knowledge's Gigi Sohn in a statement.®

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.