Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Examining the FCC’s Efforts to Fix Internet Access in the US

Examining the FCC’s Efforts to Fix Internet Access in the US

Internet connectivity is an increasingly important component to a business’ capabilities in this day and age, as well as all the more crucial to an individual’s everyday life. However, with financial difficulties restricting this access for many, the Federal Communications Commission has stepped in. With a $50 subsidy being made available to low-income homes each month, this situation warrants a closer look.

On Thursday, February 25, the FCC unanimously adopted a program that would discount broadband internet service to low-income households by up to $50 each month ($75 for those on tribal lands) and a one-time discount of $100 on a computer or tablet, utilizing $3.2 billion of the $900 billion coronavirus relief package that Congress approved back in December.

This has been shown to be a prescient need, as the average bill for stand-alone broadband service (calculated by the Wall Street Journal) totals about $66 per month. Unfortunately, this fee is too expensive for many, even without the additional challenges presented by the pandemic.

Eligible households include those that are already participating in pandemic relief or low-income Internet programs, households eligible for free or reduced lunch meals, Medicaid and SNAP recipients, Pell Grant recipients, and the recently unemployed. This program is set to be opened sometime in the next few months.

However, there are a few potential issues surrounding this situation—first, the limited funds allotted to a massive pool of eligible households. With 117 million households being made eligible, the $3.2 billion won’t last all that long… and once it dries up, so will the program.

This isn’t the end of the problem by any stretch, either. Millions of families across the country currently lack any form of broadband access, creating a serious problem as the pandemic has forced many schools and workplaces into remote operations. This problem is likely even bigger than figures would suggest.

Here’s why: while the official total released by the Federal Communications Commission estimates that 18 million people lack reliable connections to the Internet from their home, the methods used to count these households can easily skew the data. In order for a ZIP code to be seen as broadband-compatible, just one household within that block has to have Internet service. Considering that remote areas have census blocks that can stretch hundreds of square miles, this measurement seems to be woefully inadequate.

Hopefully, these measures are the first few steps toward a more equitable and accessible quality of Internet service, as the need for it has finally been made clear.

What do you think? Is this the measure that people need right now, or is it too little for too few? Leave your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Windows Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Microsoft Office Managed Service Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking Internet of Things IT Support Spam Office 365 Telephone Systems Information Remote Information Technology Covid-19 Managed Service Provider Alert Social Engineering Mobility Router Recovery Employer-Employee Relationship Bandwidth BDR Big Data Remote Monitoring Password Money App History Encryption Mobile Computing Applications Application Human Resources Law Enforcement Data Breach Managed IT Blockchain Paperless Office Apps How To Office Tips Training VPN Data Storage Patch Management Government Remote Computing Private Cloud Mobile Office Bring Your Own Device Data Management Work/Life Balance Data Security Flexibility Marketing Wireless WiFi IT solutions Infrastructure Google Drive Entertainment Voice over Internet Protocol Gmail Website Budget Settings Avoiding Downtime Vulnerability Two-factor Authentication Windows 7 Word Mouse HaaS Servers User Error Meetings Cleaning Software as a Service Telephone System Staff Risk Management Machine Learning Hacker End of Support Connectivity Remote Work Education Physical Security The Internet of Things Lithium-ion battery Safety Sports HIPAA Redundancy USB Keyboard Vendor Firewall Conferencing Managed Services Display Scam Virtual Reality Data Protection Apple Social Employee/Employer Relationship Save Time Vendor Management RMM Computing Unsupported Software Data storage Business Technology Automobile Content Management Access Control Charger Wearable Technology Compliance Virtual Assistant Retail Hard Drives Computing Infrastructure Authentication Instant Messaging OneNote Virus Going Green Computer Care Robot Digital Signage Excel Current Events Unified Threat Management Telephony Biometrics Computer Accessories Samsung Virtual Desktop Battery Update Shadow IT Legal Value Procurement Workplace Strategy DDoS Net Neutrality Spam Blocking Google Docs Internet Exlporer Electronic Medical Records Help Desk Identity Theft Printer SharePoint Printing Bluetooth PDF Hiring/Firing Customer Service Environment Proactive IT Augmented Reality Managed Services Provider Fraud Best Practice IT Consultant Fax Server Database YouTube Remote Worker Remote Workers Business Intelligence Black Market SaaS Cryptocurrency Humor Audit Worker Processor IT Management Document Management Solid State Drive Comparison Wireless Technology Network Congestion Hard Drive Botnet eWaste How to IT Plan Downtime CES Wire WIndows 7 Smartwatch Evernote IBM Ergonomics Travel Uninterrupted Power Supply Smart Technology Development Shortcut OLED Flash Colocation Cost Management Millennials PCI DSS Printers Virtual Machine Fiber Optics Smart Office Social Networking Employee Software Tips Wireless Charging Monitor Supercomputer 2FA Emails Messaging Cabling Sync Workforce Policy Virtual Private Network Hypervisor Running Cable Trend Micro User Cables PowerPoint Reputation Windows Media Player Streaming Media Dark mode Netflix Tech Support Two Factor Authentication SMS Content Default App Memory Nanotechnology Techology Root Cause Analysis Telecommuting Laptop Procedure Project Management Saving Time Music Shopping Managing Stress Google Search HBO Cortana Customers Knowledge dark theme AI Audiobook IT Infrastructure Skype Digital Signature Bing Data loss Cameras Touchpad FinTech Warranty Troubleshooting Social Network HVAC Outlook Google Apps Science Leadership Politics Investment Start Menu Analysis Advertising Employee/Employer Relationships Devices Screen Mirroring Loyalty Employees Administrator Windows 365 Books Distributed Denial of Service Enterprise Content Management Customer Relationship Management ISP Frequently Asked Questions Notifications Windows 10s Video Conferencing MSP ROI Mobile Accountants Analyitcs Bitcoin Thought Leadership Programming Shortcuts Cast Credit Cards Printer Server Sales Microchip Point of Sale Emergency Personal Password Management Cryptomining Tip of the week Password Manager Relocation webinar Public Cloud Multi-Factor Security Employer Employee Relationship Supply Chain Management Professional Services Antivirus Batteries Twitter Video Games Assessment Monitoring Search Engine Windows 8.1 Digitize NIST Worker Commute Windows Server 2008 Business Mangement Windows 8 Trending IT service Experience Windows Server 2008 R2 Tools Smart Tech Addiction Scalability Amazon Television Customer relationships Email Best Practices IT Assessment Business Owner Manufacturing Recycling Tablet Practices NarrowBand Wiring Domains Managed IT Service Cache Search Security Cameras Amazon Web Services Public Computer Computer Tips Virtual CIO Transportation IaaS OneDrive Safe Mode Maintenance Biometric Security Regulations Criminal iPhone Hosted Computing Consultant Bloatware Computer Fan Rootkit Peripheral GDPR Using Data Wireless Internet Online Shopping Analytics Digital Security Cameras Benefits Copiers File Sharing 5G Tablets Files Workers Inventory Best Available Entrepreneur FENG Specifications Chromecast Quick Tip Camera

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code