Feeds

EU telco reform trips over Three Strikes

Back to the drawing board?

Intelligent flash storage arrays

Two years of negotiation and compromises to craft a giant EU telecomms package ended in recrimination this afternoon, after the Parliament fell out over disconnecting hardcore internet downloaders.

The bumper package addressed spectrum usage and technical regulation, but at the last minute, "three strikes" proved a stumbling block. The French had pushed the hardest for a disconnection policy. In the end, greens and socialists failed to vote for the compromise, which saw introduced judicial oversight. Despite passing by 407 votes for - 57 against, with 171 MEPs abstaining - the amendment means the entire package is blocked.

"We're in uncharted territory," Professor Martin Cave, telco regulation expert told us today. Cave was in Strasbourg to witness the vote.

Political consensus unraveled at the last moment, he said, with Parliamentarians reluctant to be seen taking an "anti consumer" stance so close to the election.

The package now moves to a conciliation process. But when the EU returns to the issue, it will be with an entirely new Commission, and a Parliament (after next month's elections) of a different character.

"We're going to be in trench warfare for anything up to fifteen months," said Cave. "It's a pity - spectrum policy and the streaming of regulation have been suspended. Everybody will be spending their time arguing over that instead of developing a broadband strategy for Europe, for example, or looking ahead to what comes after the Lisbon agenda".

One contentious issue that fell off the agenda on the road to Strasbourg was "net neutrality". Google had lobbied for Green MPs to introduce technical regulation of the internet - but that fell by the wayside with sensible compromises eventually agreed.

Networks feared they would be hampered from legitimate network management practices by activists. They now have to make these clear and transparent to end users, and while the regulator could inquire why a technique is being used, there are acceptable uses: such as stopping the network from collapsing. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.