Feeds

ACCC wants to check broadband performance

Probes to help ID dodgy services

Application security programs and practises

The Australian Competition and Consumer Commission has proposed a program to monitor and report broadband performance.

In a consultation paper published here, the regulator is looking for industry input into how a performance monitoring program could be rolled out. The ACCC wants to create a “robust” program to monitor data transfer rates and “other quality of service metrics”.

It's asking the local industry to help identify a suitable testing regime, and to help define its scope.

As the ACCC explains, part of its thinking is to create a database that allows users to identify differences between ISPs that go beyond price comparisons. “Comparison data would not only serve to help consumers choose the ‘fastest’ or ‘most reliable’ service but would also enable consumers to weigh up their needs and budget to make an appropriate cost/performance decision”, the consultation paper states.

The regime would also help the ACCC watch out for porkies in ISPs' marketing claims.

Mirroring the approach used in the US, New Zealand and the UK, the ACCC will look for end-user volunteers to take part in the program.

The regulator says it favours a hardware probe as the basis for the test regime, since this is less likely to disrupt users' normal activities, and it states that user data will not be logged by the test system.

The ACCC is also asking whether or not small business should be included in the test regime, how to select both regions and ISPs to take part in the tests, what services and speed tiers should be tested, and how many proges should be deployed.

As well as speed tests, the regulator is considering whether latency, packet loss, jitter, page download speed, and DNS performance should be included in the monitoring. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.