David Weinberger does a great job summarizing a paywalled report by Benoît Felten and Herman Wagter, who investigated ISP usage patterns in five-minute-increments to see if "bandwidth hogs" were really a problem for ISPs.
They found that there is indeed a set of users who download a whole lot: “The top 1% of data consumers…account for 20% of the overall consumption.” But half of these “Very Heavy consumers” are doing so on plans that give them only 3Mbps, as opposed to the highest tier of this particular ISP, which is 6Mbps. So, even with their heavy consumption, their bandwidth usage is already limited. Further, if you look at who is using the most bandwidth during peak hours, 85.3% of the bandwidth is being used by those are not Very Heavy users.
Here’s the point. ISP assumes that Very Heavy users (= “data hogs” = “people who use the bandwidth they’re paying for”) are responsible for clogging the digital arteries. So, the ISPs measure data consumption in order to preserve bandwidth. But, according to Benoît and Herman’s data, the vast bulk of bandwidth during the times when bandwidth is scarce (= peak hours) is not taken up by the Very Heavy users. Thus, punishing people for downloading too much inhibits the wrong people. Data consumption is not a good measure of critical broadband usage.
Put differently: “42% of all customers (and nearly 48% of active customers) are amongst the top 10% of bandwidth users at one point or another during peak hours.” The problem therefore is not “data hogs.” It’s people going about their normal business of using the Net during the most convenient hours.
Are “data hogs” the problem?
A long time ago, Veronica Belmont was featured in a blooper reel for her old TV show in which she clowned around with a Cthulhu t-shirt, wiggling back and forth and saying “So lifelike.” A creepy Internet person turned the moment into a GIF that has followed her around ever since, so that other creepy […]
Last February, Lenovo shocked its security-conscious customers by pre-installing its own, self-signed root certificates on the machines it sold. These certificates, provided by a spyware advertising company called Superfish, made it possible for attackers create “secure” connections to undetectable fake versions of banking sites, corporate intranets, webmail providers, etc.
The Code Black is our top-selling drone of all time—and for good reason. This powerful, palm-size drone is not only insanely fun to fly, but can capture some serious video footage from up above. With a flight time of about 10 minutes and an ultra-smooth ride, it’s a great introductory drone for anyone looking to […]
Don’t get handcuffed by Apple’s standard 3-foot Lightning cord (that you’ve most likely already lost), treat yourself to 10 feet of luxurious charging convenience. The Colossal is certified by Apple for its high-end quality, and designed to support full use of your phone while you power up. You can also get it in a 2-pack […]
Today and tomorrow only we are offering an additional 15% off the entire Boing Boing store (some exclusions may apply). Simply use coupon code: BLACKFRIDAY at checkout! Below are a few of our favorites from the store: First Generation Lytro 16GB Camera: The First Consumer Camera to Capture the Entire Light FieldAdobe Training Videos: Lifetime Subscription: 6,000+ Adobe […]