Friday, September 09, 2011

9.9 :: Decries :: More Testing :: Getting to Yes :: Moral Panic Police :: Voodoo Economics :: It was a dumb idea :: Apple Police ::

CyberTelecom News
Federal Internet Law and Policy
Good friends we had Oh good friends we've lost
Along the way hey.
In this great future,
You can't forget your past so dry your tears I say
- Bob Marley, No Woman No Cry

GOP decries FCC's conditional approval of LightSquared wireless plan, WAPO
Republicans questioned Thurs­day why the Federal Communications
Commission fast-tracked an initial approval for a company —
well-connected among Democrats — to provide cellphone service through
satellites, a technology that other agencies say disrupts Global
Positioning System devices, hurricane-tracking systems, and military
and commercial airlines.
More Info:

Lawmakers call for more testing for LightSquared, The Hill
Government officials and lawmakers at a House Science Committee
hearing Thursday said more testing is needed of LightSquared's
proposed wireless network because it could interfere with Global
Positioning System devices, including those used to track hurricanes
and other weather patterns.
More Info:

Getting to Yes: Finding a Fix to ICC-USF, Verizon
Broken policy requires level-headed reforms that advance a greater
good. As we have all painfully seen this year in Washington, this is
easier said than done.
More Info:

Sex, Drugs... And Facebook? Moral Panic Police Blaming Social Networks
For Kids Being Kids, Techdirt
Ah, the moral panic police are out in force yet again. A recent report
from the "National Center on Addiction and Substance Abuse" is getting
some attention for a study which claims that teens who spend more time
on social networking sites like Facebook are five times more likely to
drink, smoke and take drugs. The study also found that kids who watch
reality shows are also more likely to take drugs as well. And, of
course, they seem to automatically assume the causal relationship is
in that direction:
More Info:

Paxfire Sues The Lawyers And Individual Who Filed A Class Action
Lawsuit Over Its Search Redirects, Techdirt
Well, well. Following a research paper that claimed that a company
named Paxfire was teaming up with some ISPs to hijack search terms and
take people directly to certain websites, a class action lawsuit was
quickly filed. Paxfire wasted little time in responding angrily that
the basis of the lawsuit was completely wrong, and saying that it
would seek sanctions against the lawyers for filing it in the first
place. Now the company has
More Info:

Apps for Communities- Reminder to submit entries, FCC
It's the final days of summer and the Apps for Communities entry
deadline's been extended until October 3, 2011. Thanks for all those
who've already submitted; our judges are looking forward to reviewing
your apps. To enter, apply via the portal and add a link
to your team's fully functioning app or demonstration and the source
More Info:

Cole C. Hardy, Twitter's Trademark Problems: Is the Anticybersquatting
Consumer Protection Act Outdated?, JMLS Rev IP Law
Under the Lanham Act there is no remedy for individuals when imposters
register user names with corresponding post-domain paths containing
protected trademarks on social network websites. While Twitter
temporarily experimented with its own verification
More Info:

At a time when "email" was simply a misspelled word, Chief Justice
Warren's opinion in Hanson v. Denckla warned that advancements in
communication and travel must not be read as signaling "the eventual
demise of all restrictions on . . . personal jurisdiction."
More Info:

"Do not complicate routing security with Voodoo Economics", IGP
That was the eye-catching subject line in a recent note from Randy
Bush to the North American Network Operators Group (NANOG) about
secure Border Gateway Protocol (S-BGP). His note critiqued a paper,
Let the Market Drive Deployment: A Strategy for Transitioning to BGP
Security, which was presented recently at SIGCOMM and NANOG meetings.
The paper argued that under certain conditions, the transition to
More Info:

House Panel Demands WikiLeaks-Proof Pentagon, Wired
The Pentagon has labored for months to lock down its data from
WikiLeaks. Now Congress is stepping in to demand it finish the job --
in about, oh, a year and a half. A small section of the 2012 defense
bill, under consideration Wednesday by the House Armed Services
Committee, requires the Defense Department to put ...
More Info:

Yahoo fires chief executive Bartz, BBC
Yahoo's chief executive Carol Bartz is fired by the internet company
after two-and-a-half years in the top job.
More Info:

The PROTECT-IP ACT: circumventing free speech in the name of old
revenue streams, JMLS Rev IP Law
My Chinese friends would look side to side before speaking, perhaps
ensuring that a Party member was not within earshot, and wistfully
call it "leaping the wall." They were speaking of circumventing the
Great Chinese Firewall, usually through VPN encryption. However, I
called it a royal pain. In the first week of my two month stay in
More Info:

"It was a dumb idea": newspaper chain fires copyright troll
Righthaven, Ars Technica
The new chief executive of MediaNews Group, publisher of the Denver
Post and 50 other newspapers, said it was "a dumb idea" for the
nation's second-largest newspaper chain to sign up with copyright
troll Righthaven.
More Info:

Ian Rubenstuunk, The Throw Down Over Takedowns: An Analysis of the
Lenz Interpretation of 17 U.S.C. § 512(f), JMLS Rev IP Law
Recently, a YouTube user and mother of two, Stephanie Lenz, filed a
lawsuit against Universal Music Corporation which had the potential
for broad impact on the internet. Everyone from politicians, to
teachers, to musical artists could have gained more
More Info:

Yochai Benkler, A Free Irresponsible Press: Wikileaks and the Battle
over the Soul of the Networked Fourth Estate, Harvard CLLR
[I]t is very necessary that we should not flinch from seeing what is
vile and debasing. There is filth on the floor, and it must be scraped
up with the muckrake; and there are times and places where this
service is the most needed of all
More Info:

Google's Green Computing: Efficiency at Scale Sept 2011, Google
It's common to hear about new data centers being built, and it may
seem as if the energy used by "the cloud" is a growing problem.
However, services provided by the cloud can be remarkably efficient.
In many cases, data centers hosting cloud services are more efficient
than the in-house office servers they replace. These efficiency gains
come from maximizing server
More Info:

How cloud-based Gmail is energy efficient, Gigaom
Google says switching to Gmail can be close to 80 times more
energy-efficient for an organization than in-house email, particularly
for smaller companies. On Wednesday, the search engine giant unveiled
a report looking into just how much energy can be saved by
organizations using Google's cloud-based Gmail compared to companies'
own locally hosted email.
More Info:

Tracy A. Steindel, A Path Toward User Control of Online Profiling, MTTLR
Online profiling is "the practice of tracking information about
consumers' interests by monitoring their movements online."1 A primary
purpose of online profiling is to "deliver advertising tailored to the
individual's interests," a practice known as online behavioral
advertising (OBA)
More Info:

Police investigating accusations in bizarre lost iPhone 5 case, Ars Technica
Apple and possibly some San Francisco police officers may have
overstepped legal bounds in attempting to retrieve yet another missing
iPhone prototype that was reportedly left behind at a San Francisco
bar. The SFPD has now begun an internal investigation into allegations
that officers were involved in a late July search of a San Francisco
home where Apple had apparently tracked the missing device.
More Info:

SF police launch probe into iPhone search, CNET
The San Francisco Police Department is looking into how officers
assisted Apple in searching for an iPhone prototype.
More Info:

Toward a Standard Benchmark for Computer Security Research, CMU
Unlike benchmarks that focus on performance or reliability
evaluations, a benchmark for computer security must necessarily
include sensitive code and data. Because these artifacts could damage
systems or reveal personally identifiable information
More Info:

Zen and the Constitutionality of Twitter 'Cyberstalking', Citizens
Media Law Project
If you thought a spat between Buddhists couldn't devolve into a
federal cyberstalking case of dubious constitutionality, consider the
More Info:

VoIP Confusion, AT&T
Reactions to the submission of the ABC Plan and the announcement of
the unprecedented joint framework for reform have been overwhelmingly
positive. I think it's fair to say that virtually everyone agrees with
the premises that we must transform universal service into a program
focused on broadband, not POTS (plain old telephone service), and we
must, at the same time, reform intercarrier compensation in a
More Info:

Website ::
Blog ::
Delicious ::
Twitter & Facebook :: Cybertelecom
Google Group :: cybertelecom-l

AUP ::
Cybertelecom is Off-the-Record. Otherwise play nicely.

Link to us!

No comments: