SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The *NEW* Frank Coluccio Technology Forum

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Frank A. Coluccio who wrote (7255)6/3/2004 5:24:51 PM
From: ftth  Read Replies (1) of 46821
 
re: "...although I'd hardly trivialize its [QoS] implementation on a network..."

I'm not following you.

re: "short of providing actual program content."

The line between content, applications, and services gets awfully blurred at times. That's part of the problem with such discussions.

re: "After making the assumption that they also provide mail..."

I wasn't making that assumption. I'm tending to doubt lack of mail servers is a deal breaker for businesses, especially larger businesses. Since you must be seeing otherwise, can you elaborate on the trends you are seeing here, w/r/t business size.

re: "wouldn't you then say that providing security, accounting, access control, ...were also adjunct functions to providing bit- (okay, maybe byte-) pipe functions?"

Yes, adjunct as in mandatory components of having a viable business model? Security is a bit fuzzy since it's such a broad term but certainly I'd agree that some aspect of security is part of their business model, even if strictly for securing their own assets. There are liability issues and ranges of cost and complexity with certain aspects of security so I think it depends. Accounting...sure. Access control...sure. Can't run a for-fee network without them. So I think we're in agreement that a bit pipe carries with it other obligations. But that's not to say there couldn't be layers of all of the above, controlled by a third party content, application, or service provider that uses the bit pipe as a thoroughfare, or even completely outsourced to a separate provider.

content caching and distribution I agree are a stretch, not inextricably linked to operating a bit pipe. Probably a tighter link to a residential bit pipe operator, but I guess it depends whether you mean public or private content assets. I'd add applications hosting to that same list. Probably best left to 3rd party specialist firms, but not to say they couldn't undertake it. That's a lot to bite off for a start-up venture though.

re:"What would [you] have them provide or perform for the customer and have them still be considered a LEC?"

I don't even want to tackle that one. The regulatory outcomes and legal challenges over the coming years will define that for us (let's hope).
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext