David Weinberger does a great job summarizing a paywalled report by Benoît Felten and Herman Wagter, who investigated ISP usage patterns in five-minute-increments to see if "bandwidth hogs" were really a problem for ISPs.
They found that there is indeed a set of users who download a whole lot: “The top 1% of data consumers…account for 20% of the overall consumption.” But half of these “Very Heavy consumers” are doing so on plans that give them only 3Mbps, as opposed to the highest tier of this particular ISP, which is 6Mbps. So, even with their heavy consumption, their bandwidth usage is already limited. Further, if you look at who is using the most bandwidth during peak hours, 85.3% of the bandwidth is being used by those are not Very Heavy users.
Here’s the point. ISP assumes that Very Heavy users (= “data hogs” = “people who use the bandwidth they’re paying for”) are responsible for clogging the digital arteries. So, the ISPs measure data consumption in order to preserve bandwidth. But, according to Benoît and Herman’s data, the vast bulk of bandwidth during the times when bandwidth is scarce (= peak hours) is not taken up by the Very Heavy users. Thus, punishing people for downloading too much inhibits the wrong people. Data consumption is not a good measure of critical broadband usage.
Put differently: “42% of all customers (and nearly 48% of active customers) are amongst the top 10% of bandwidth users at one point or another during peak hours.” The problem therefore is not “data hogs.” It’s people going about their normal business of using the Net during the most convenient hours.
Are “data hogs” the problem?
Most people don’t look at any news, or at one news site; using social media a lot (even without the intention of looking for news) means that sometimes you’ll end up clicking a news link — so heavy social media users, on average, are consuming a wider media diet than those who do not use […]
In 2012, Google introduced Certificate Transparency, an internet-wide tripwire system designed to catch cryptographic “certificate authorities” who abused their position to produce counterfeit credentials that would allow criminals, governments and police to spy on and tamper with secure internet connections.
Yesterday’s massive ransomware outbreak of a mutant, NSA-supercharged strain of the Petya malware is still spreading, but the malware’s author made a mere $10K off it and will likely not see a penny more, because Posteo, the German email provider the crook used for ransom payment negotiations, shut down their account.
The Fader Stealth Quadcopter from TRNDlabs packs incredible flight performance into a package small enough to land on your phone screen, and it’s available now in the Boing Boing Store.The Fader’s six-axis gyroscope module gives it perfect balance in the air. This makes the onboard 720p HD camera all the better for shooting amazing flight […]
Although fully autonomous vehicles aren’t yet allowed on public streets, they are poised to dominate the roads in the not-too-distant future. But before that happens, Apple, Google, Uber, and other companies now investing in self-driving tech are going to need talented developers that can account for the dizzying array of factors at play when a […]
The PiCar-V learning kit comes with everything you need to build a Python-powered robot, and it’s currently being offered in the Boing Boing Store.