Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

In 2018, the Federal Communications Commission repealed the Net Neutrality laws that were in place for several years with a vote of 3-to-2. This has allowed the ISPs to control the Internet again. Today, we present you with a brief reminder, and update the situation as we roll into 2019.

Our Internet?
Commercially-available Internet services have been made available for the better part of 30 years. It is available and utilized almost everywhere in the U.S. As broadband began to take off, there was a very noticeable shift in the way that ISPs governed high-speed internet. Today, as most applications require the use of high-speed Internet, it becomes more important than ever for people to have access to affordable high-speed Internet.

For the past seven years, legislators have attempted to pass a law that would secure an open Internet in the future. These attempts have failed miserably. Cases like Verizon Communications, Inc. vs. FCC haven’t helped the cause much, as the attempts to make broadband Internet service a utility were thwarted in the courts. Today, nobody really knows who is going to control the Internet in the days to come. Currently it is in the hands of the ISPs, but that doesn’t seem likely to stay that way. It seems like an issue that is split down party lines, so the controlling factor seemingly depends on what party controls the executive branch of the government. Without legislative intervention, that likely won’t change anytime soon.

What Is Going on with Net Neutrality Now?
Almost immediately after the last shift in 2018, lawsuits were filed and they seem to keep coming. States, advocacy groups, neutrality lobbies, and companies have all started lawsuits against the FCC both for their handling of the situation and for the repeal of net neutrality itself.

To see if the repeal of net neutrality is working to benefit consumers, you simply have to consider the following two points:

  1. Net Neutrality is hindering broadband investment. In 2018, the Big Four spent much less than it did prior to the repeal of the net neutrality laws. It was the first time in three years that investment has been reduced.
  2. It doesn’t make sense for ISPs to throttle Internet traffic. These companies reportedly slowed internet traffic without telling customers as soon as six weeks after the repeal. Websites such as YouTube, Netflix, and Amazon Prime were the most targeted for throttling. Verizon, specifically, was put into hot water after slowing speeds that led to slower EMS response times in sections of California battling record forest fires last year.

Despite the political bickering, there are similar views on some issues. Most governing bodies would like to see fast, open, and unobstructed Internet. There are older FCC mandates that have worked to prohibit ISPs from creating anticompetitive and harmful practices in the past, but whether these mandates would be enforceable with current FCC investment thwarted is unknown.

Individuals roundly support net neutrality laws. They simply don’t like the idea that corporations, whose stated purpose is to make as much profit as possible, hold control over how bandwidth is utilized. Only time will tell who is right.

If you would like to do something about it, go to and sign up. Do you believe market forces will keep ISPs honest, and the Internet open? Leave your thoughts in the comments section below.


No comments yet
Already Registered? Login Here
Tuesday, 12 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Computer Windows 10 Productivity Managed Service Provider Backup Data Backup Ransomware Innovation Outsourced IT Mobile Devices Business Continuity Android Smartphone Managed IT services Hardware Efficiency User Tips Google Data Recovery Disaster Recovery Social Media Upgrade Data Browser Communication IT Support Workplace Tips Managed IT Services Small Business Business Management Cloud Computing IT Support Smartphones App Data Management Office Remote Monitoring Server Miscellaneous Holiday Microsoft Office Internet of Things Phishing communications Paperless Office Office 365 Windows WiFi Network Facebook Encryption Password VoIP Save Money Artificial Intelligence Spam Tech Term Passwords Gmail Big Data Hosted Solution Unified Threat Management Recovery Saving Money Employer-Employee Relationship Robot Risk Management Customer Relationship Management Bandwidth Collaboration Firewall Document Management Cybersecurity Apps Mobile Device Management Customer Service Downtime Operating System Wi-Fi Office Tips Remote Computing How To Government Analytics Money Infrastructure Managed IT Work/Life Balance Chrome Word Compliance Hacker Windows 10 Tip of the week Apple Avoiding Downtime Vendor Management Content Filtering Data Security Printing Social Data storage Website Computing IT Management Business Growth Presentation Mobile Device Virtual Reality Two-factor Authentication Antivirus Redundancy Training Settings SaaS Project Management Data loss BYOD The Internet of Things Outlook BDR Computers Healthcare Business Technology Managed Service Telephone Systems Education Health File Sharing Cybercrime Applications Vulnerability Hacking Mobile Computing Automation Help Desk Going Green Alert Tech Support Wireless Technology Mobile Security Assessment Botnet Licensing Wireless Server Management Virtual Private Network Samsung Information Technology Consultation Digital Payment Humor Meetings Maintenance Laptops Storage YouTube Analyitcs Unified Communications Computer Care Access Control LiFi Tablet Specifications Upgrades Automobile Augmented Reality Budget User End of Support IBM Running Cable Mouse Retail Bring Your Own Device Windows 7 Best Practice Search Legal Regulations Lithium-ion battery Sports Display Proactive IT service Business Owner Patch Management Twitter Cortana Virtualization Scam Net Neutrality Politics Identity Theft Monitors Marketing Administration Remote Monitoring and Management Travel Smart Technology Google Drive Websites IT solutions Physical Security Safety HIPAA Software as a Service VPN Taxes Competition Router Mobile data services IT Budget Writing Personal Information Backup and Disaster Recovery Fleet Tracking business network infrastructure IT Technicians Technology Tips Managed IT Service IT Consultant eWaste Bitcoin Processor Experience Modem IT Sevices Company Culture Techology Hotspot User Error Machine Learning Social Engineering Software Tips Computer Repair RMM Asset Tracking Mirgation Statistics Comparison Mail Merge Break Fix Cleaning Environment Windows 8 Notifications Cookies Domains Vulnerabilities Disaster Resistance Language Printer Relocation Electronic Medical Records Procurement 5G Google Wallet Remote Workers Entrepreneur Migration Bluetooth Black Friday Webcam Address Dark Web Troubleshooting Corporate Profile Crowdsourcing Active Directory Dark Data Application Nanotechnology Public Speaking Geography Proactive IT Computing Infrastructure Quick Tips Private Cloud Users History Remote Worker Drones Information Chatbots Cyber Monday Point of Sale Data Warehousing WannaCry Windows Server Phone System IoT Cables IT Consulting Alerts Time Management SharePoint Error Cabling Professional Services Monitoring Identity Mobility flu season Utility Computing Microsoft Excel User Management Staffing Laptop Hard Drives Wires Data Breach Cooperation Network Management Downloads Virtual Desktop Fort Worth Web Server Update Virtual Assistant Electronic Health Records Blockchain VoIP Batteries GPS Halloween Refrigeration 3D Printing Bookmarks Technology Laws Staff Touchscreen Multi-Factor Security Administrator Google Maps flu shot Cameras Disaster Deep Learning Chromebook Voice over Internet Protocol Fun Cyberattacks Cost Management Lenovo Permissions iPhone Digital Law Enforcement Remote Work Tracking Scary Stories Network Congestion Unsupported Software Favorites MSP Unified Threat Management Flexibility Google Calendar Shortcut Fort Worth IT CCTV Uninterrupted Power Supply Emoji Undo Recycling Superfish Fraud Spyware Gadget File Management Mobile Data Conferencing IP Address Hacks business communications systems Operations Legislation DFW IT Service Solid State Drive Alt Codes Manufacturing Social Networking Management How To Telephone Employees Mobile Office Current Events Internet Protocol Wearable Technology Heating/Cooling G Suite Hard Disk Drive Typing Processors Gadgets PowerPoint Motherboard Enterprise Resource Planning Networking Internet Exlporer Firefox Mobile VoIP Supercomputer Buisness Consumers Zero-Day Threat WPA3 VoIP streamlines Servers Motion Sickness Distributed Denial of Service Cryptocurrency Proactive Maintenance Knowledge Google Docs

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...