You are here

July 2009

My National Broadband Plan Comments to FCC -- Press Release & Actual Filed Comments

FOR IMMEDIATE RELEASE                                         

July 21, 2009                                                                                          

Contact:  Scott Cleland

703-217-2407

 

 

NetCompetition.org Files Reply Comments on National Broadband Plan NOI

Plan should ensure Government & private sector can work together and aren’t at cross-purposes

 

Where does choice come from?

Choice, having the benefit of a selection of different alternatives to choose from, springs from the risk and opportunity of market competition  -- not from Government economic regulation.

Google: "Security is part of Google's DNA" -- ("Do Not Ask")

"Security is part of Google's DNA" is Google's slogan to soothe security concerns about its services much like "competition is one click away" is Google's antitrust slogan to soothe antitrust concerns about its dominance. 

While Google claims security is metaphorically in the "DNA" or "genetic code" of their many cloud applications, "DNA" is also Google code for "Do Not Ask."

"Do Not Ask" is Google's unspoken MO -- method of operation.  

Helping the FCC Analyze Broadband Tradeoffs

"People are not approaching this from the perspective of helping us analyze what the trade-offs are" said FCC Broadband Coordinator Blair Levin about public comments to the National Broadband Plan -- per Multichannel News.  

  • Industry's comments have attempted to be very focused on helping the FCC understand and appreciate the many explicit trade-offs involved in this very important proceeding.

A recap of the key trade-offs facing the FCC:

Where else will a viable competitive alternative to Google come from, if not from a Yahoo-Microsoft deal?

The core question at the heart of the DOJ's review of the proposed Yahoo-Microsoft search partnership is where else will competition to Google's increasing dominance come from, if not from the proposed Yahoo-Microsoft search partnership? 

The DOJ has deep and current expertise in this market given their investigation of the Google-Yahoo ad partnership last fall and DOJ's current investigation of the Google Book Settlement. The DOJ also appreciates the facts that:

A Maslow "Hierarchy of Internet Needs?" -- Will there be Internet priorities or a priority-less Internet?

A central policy question concerning the future of the Internet, cloud computing, and the National Broadband Plan is whether there should be Internet priorities or a priority-less Internet?

  • The crux of the grand conflict over the direction of Internet policy is that proponents of a mandated a neutral/open Internet insist that only users can prioritize Internet traffic, not any other entity. 

To grasp the inherent problem and impracticality with a mandated neutral or priority-less Internet, it is helpful to ask if the Internet, which is comprised of hundreds of millions of individual users, has a mutual "hierarchy of needs" just like individuals have a "hierarchy of needs," per Maslow's famed, common sense "Hierarchy of Needs" theory.

P2P breach endangered President/First Family -- The open Internet's growing security problem -- Part XIV

New evidence of very serious Internet security problems sheds new light on why Senate Chairman Rockefeller has taken such a forceful leadership role on cybersecurity and why President Obama made increasing cybersecurity a national security priority in his 5-29 cybersecurity address.

  • Computerworld reported testimony before a Congressional oversight panel that sensitive details about a Presidential safe house, Presidential motorcade routes, and every U.S. nuclear facility were leaked on the Internet via a LimeWire P2P application. 
  • This serious Internet security problem with P2P applications was also the subject of a 2007 U.S. Patent and Trademark Office (PTO) report , which documented the severe security implications of P2P file-sharing programs that commonly have technological features that induce sharing of information that people did not want or expect to be shared.

The continued seriousness of P2P file-sharing breaches have prompted House Oversight Committee Chairman Edolphus Towns "to call for a ban on the use of peer-to-peer (P2P) software on all government and contractor computers and networks," per Computerworld.   

Precursorblog is on Hiatus for Vacation

Precursorblog is on hiatus for vacation.

Pages