Browse Definitions :
Definition

edge provider

Contributor(s): Matthew Haughn

In communication services, an edge provider is a website, web service, web application, online content hosting or online content delivery service that customers connect to over the internet. Edge providers, which include Google, Amazon, Netflix and Facebook, use the customer's internet service provider (ISP) to deliver content.

In the United States, edge providers are regulated by the Federal Trade Commission (FTC). The choice of the word edge is intended to differentiate content, application and web service providers who operate at the edge of a network from those companies that provide the intranet's core infrastructure.

Customer data management and protection of personally identifiable information (PII) is an important aspect of the debate that surrounds the concept of Net Neutrality. If ISPs are categorized as edge providers or contract carriers instead of as common carriers, they are allowed to share and/or sell customer data as long as the customer has opted in. 

Another important aspect of the Net Neutrality debate is whether or note broadband carriers can block or degrade service for certain edge providers or charge higher fees for prioritizing an edge provider's content delivery. Critics have argued that paid prioritization places an unnecessary financial stress on edge providers and allows ISPs to become powerful gatekeepers who can control and manipulate the free market.

This was last updated in April 2017

Continue Reading About edge provider

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close