Feeds

Google's coup: The internet's first rule book

With love from Brussels

Beginner's guide to SSL certificates

The regulator's rule book for deciding what is permissible on today's roads is very thick indeed. The content, behaviour and performance of "stuff on roads" is massive, and grows by the day. Try hot-rodding your lawnmower – or deciding that on Thursdays, you will only make left turns, and see how far you get.

By contrast, the regulator's rule book for deciding what is permissible on the internet - its content, behaviour and performance - couldn't be simpler. There isn't one.

And that’s the case for most countries in the world. Of course, there are established state laws on business, copyright, and defamation that have been extended to the internet, but that’s not the same thing. So the evolution of the technology is the consequence of the private agreements we enter into, between ourselves and the network operator, as the consenting adults we are.

So today’s internet is an anarchy, where users can drive what they like. And despite the fact that bad, anti-social applications can run riot - and they do - people seem to like it this way. It’s an anarchy which carries the overwhelming consensus of internet users. No one (actually, almost no one) is Marching With Placards demanding that some state agency protect us from ourselves, and write a book of rules specifically for what should be technically permissible.

For almost twenty years, internet engineers have persuaded regulators not to intervene in this network of networks, and phenomenal growth has been the result. Because data revenues boomed, telecoms companies which had initially regarded packet data networking with hostility, preferred to sit back and enjoy the returns.

But that’s changing fast. Two months ago the US regulator, which scrupulously monitors public radio for profanity, and which spent months investigating a glimpse of Janet Jackson’s nipples, decided it needed to start writing technical mandates. And so off it went.

Unnoticed by almost everyone, so did the EU.

"It’s the revenge of the unemployed Telecomms Regulator”, one seasoned observer in Brussels told us this week. “The internet really put them out of business. Now they're back."

Here’s a glimpse into the hitherto unreported politics going on in Brussels. The decisions being made are historic: the consequences dictate the future architecture of our networks, with implications worth billions of Euros.

A whole new rule book

The driving force behind the new rules is surprising. It's not the business world's natural bureaucracies, the telecoms companies with their ancestry as state-owned or state-regulated monopolies. It's actually Google.

Secure remote control for conventional and virtual desktops

Next page: What's on the table

More from The Register

next story
Mighty Blighty broadbanders beg: Let us lay cable in BT's, er, ducts
Complain to Ofcom that telco has 'effective monopoly'
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
Ofcom tackles complaint over Premier League footie TV rights
Virgin Media: UK fans pay the most for the fewest matches
FCC: Gonna need y'all to cough up $1.5bn to put broadband in schools
Kids need more fiber, says Wheeler, and you'll pay for it
NBN Co screws lid on FTTP coffin
Copper and HFC dominate in new corporate plan
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.