Feeds

FCC launches probe into Verizon/Netflix spat

Commission will figure out whether video traffic was deliberately throttled

Secure remote control for conventional and virtual desktops

The Federal Communications Commision (FCC) has announced it will investigate whether Verizon deliberately slowed traffic from Netflix.

Chairman Tom Wheeler issued a statement on Friday that the commission will "collect information" on how the ISP handled traffic from the streaming video service as the two firms were negotiating a direct-access deal.

"Recently, at my direction, Commission staff has begun requesting information from ISPs and content providers," Wheeler said.

"We have received the agreements between Comcast and Netflix and Verizon and Netflix. We are currently in the process of asking for others."

The FCC chairman noted that the commission was only collecting information on the matter, and that no regulatory action is planned in the case at this point.

The move comes as Verizon and Netflix find themselves involved in a dust-up over the handling of streaming video. Netflix, which signed a direct-access deal with Verizon earlier this year, has long noted that its services run slower on Verizon's network than many other ISPs. Verizon, for its part, has denied deliberately throttling Netflix content.

"Internet traffic exchange has always been handled through commercial agreements. This has worked well for the Internet ecosystem and consumers," a Verizon spokesman told The Reg.

"We are hopeful that policy makers will recognize this fact and that the Internet will continue to be the engine of growth of the global economy."

Last week, the spat nearly spilled over into a legal matter when Verizon sent Netflix a cease and desist order over error messages the video streamer popped up which blamed Verizon's network for slow traffic. Netflix has agreed to</stop serving the messages it said were part of a test program.

The conflict strikes at the heart of the net neutrality debate, as many advocates believe that without neutrality protections carriers will pressure services and site operators to pay for "preferred" access to customers and throttle traffic for those who do not. ®

Security for virtualized datacentres

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.