recommended reading

How Much Good Will Facebook's Internet-for-Everyone Plan Do?

Flickr user babyben

Facebook along with six other telecom and tech companies has unveiled a grand plan to bring Internet connectivity to the 4 billion humans who don't yet have access, a move that "tries to pair humanitarian goals with the profit motive," as The New York Times's Vindu Goel explains it. You can read all about the plan here, and watch a video, complete with JFK speech voiceover, about it at Internet.org, the effort's online home. The idea sounds incredible. But that's about as far as this dream goes. Much like Elon Musk's Hyperloop, the devil is in the details. I's not exactly clear how Zuckerberg and co. have a plan to get the Internet to the untethered masses or if it's the best way to do so. 

But set that aside for a second: what is the humanitarian goal these for-profit organizations are trying to attain? In a paper called "Is Connectivity a Human Right?" we get a "rough outline" of how the group plans on getting Internet everywhere:

  • Making internet access affordable by making it more efficient to deliver data.
  • Using less data by improving the efficiency of the apps and experiences we use.
  • Helping businesses drive internet access by developing a new model to get people online

The report then elaborates on the making the Internet more efficient part, which is the important part it ensures the following: "If the industry can collectively make progress here, then it is possible for operators to build even more profitable models while offering data at significantly lower costs per megabyte." (Emphasis ours.) All of the technical improvements — like stronger signals, cheaper caching, and getting the government to allocate spectrum "more efficiently" — have to not just maintain, but increase profit margins for those involved. What doesn't get much discussion is what benefit the 4 billion people Facebook hopes to connect will get from all this. Even that is cast in business benefit. "Giving everyone the opportunity to connect is the foundation for enabling the knowledge economy."

Read the entire story at Quartz.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.