David Weinberger does a great job summarizing a paywalled report by Benoît Felten and Herman Wagter, who investigated ISP usage patterns in five-minute-increments to see if "bandwidth hogs" were really a problem for ISPs.
They found that there is indeed a set of users who download a whole lot: “The top 1% of data consumers…account for 20% of the overall consumption.” But half of these “Very Heavy consumers” are doing so on plans that give them only 3Mbps, as opposed to the highest tier of this particular ISP, which is 6Mbps. So, even with their heavy consumption, their bandwidth usage is already limited. Further, if you look at who is using the most bandwidth during peak hours, 85.3% of the bandwidth is being used by those are not Very Heavy users.
Here’s the point. ISP assumes that Very Heavy users (= “data hogs” = “people who use the bandwidth they’re paying for”) are responsible for clogging the digital arteries. So, the ISPs measure data consumption in order to preserve bandwidth. But, according to Benoît and Herman’s data, the vast bulk of bandwidth during the times when bandwidth is scarce (= peak hours) is not taken up by the Very Heavy users. Thus, punishing people for downloading too much inhibits the wrong people. Data consumption is not a good measure of critical broadband usage.
Put differently: “42% of all customers (and nearly 48% of active customers) are amongst the top 10% of bandwidth users at one point or another during peak hours.” The problem therefore is not “data hogs.” It’s people going about their normal business of using the Net during the most convenient hours.
Are “data hogs” the problem?
Twitter user LDLDN posted this image of a racist National Front poster on a lamppost in Camden, a neighborhood in north London — a relatively affluent, diverse neighborhood dominated by a giant subculture market, two huge train stations (St Pancras and King’s Cross), a university, and the British Library.
The ACLU is suing to repeal parts of the Computer Fraud and Abuse Act (CFAA), a 1980s-vintage hacking law that makes it a felony to “exceed authorization” on a remote computer, and which companies and the US government have used to prosecute researchers who violated websites’ terms of service.
June’s Decentralized Web Summit at San Francisco’s Internet Archive was a ground-breaking, three-day combination of workshops, lectures, demos and a hackathon, all aimed at figuring out how to restore the decentralized character of the early internet — and keep it that way.
If you’ve got a coding career on your mind, few programming disciplines will take you farther than a commanding knowledge of the Python language, which is not to be mistaken for parseltongue. Its versatility and ease of use make it a go-to for any coding project…so master Python now with this all-inclusive all-level python programming course […]
The realm of web development is constantly evolving. New platforms, languages, and processes materialize all the time, so staying on top of all that innovation is a tall order.Whether you’re brushing up on new tricks, starting from scratch, or just looking to make your own website a little jazzier, Rob Percival’s new Complete Web Developer Course 2.0 (now […]
Folks used to rely on alarms to protect their home – and before that, the family dog. Now, anyone looking to guard their homes can choose from some high-tech options, including the Amaryllo iCamPRO FHD Home Security Camera (now just $219 in the Boing Boing Store).In fact, this 2015 CES “Best of Innovation” award-winner boasts so many features, it’s […]