Network Neutrality

Charles Curley charlescurley at
Mon Dec 1 15:50:38 MST 2008

On Mon, Dec 01, 2008 at 01:23:20PM -0700, Jason Wright wrote:
> On Mon, Dec 1, 2008 at 1:05 PM, Dave Smith <dave at> wrote:
> > Jason Wright wrote:
> >>

> I don't think it's perfect. It still comes down to your user believing
> he/she is more important than other people. It works most of the time
> unless you get someone who is deliberately hogging bandwidth.

Or the user is utterly clueless. I suspect those are more common than
the deliberately rude.


Charles Curley                  /"\    ASCII Ribbon Campaign
Looking for fine software       \ /    Respect for open standards
and/or writing?                  X     No HTML/RTF in email    / \    No M$ Word docs in email

Key fingerprint = CE5C 6645 A45A 64E4 94C0  809C FFF6 4C48 4ECD DFDB
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : 

More information about the PLUG mailing list