- Aug 6 :: Comments Due USF School Library Eligibility List
- Aug 8 :: 2000 :: MCI WCOM / Sprint Merger Application Withdrawn from FCC
- Aug 13 :: 1912 :: Radio Act of 1912 signed into law
- Aug 14 :: 1969 :: FCC Approves MCI's Application to provide service between Chicago and St Louis
- Aug 21 :: Replies Due FCC USF Erate Schools Library Eligibility List
- Aug 22 :: NTIA Privacy Stakeholder Meeting
- Aug 29 :: NTIA Privacy Stakeholder Meeting
- Aug 30 :: 1969 :: First ARPANET IMP Delivered
- Aug 31 :: 1981 :: IBM Releases 1st IBM PC
This chapter considers partially (non)rival infrastructure and congestion. Specifically, it explains and analyzes congestions problems and solutions. It begins with the basic economic model of congestion, which assumes homogenous uses, and discusses various approaches to managing congestion.
- Where Are the AccuWeather Satellites?, Telefrieden :: Keyword: [Broadband]
- Comcast Sees 156,000 New Broadband Subscribers - Slows Number of Basic Cable Defections, DSLReports :: Keyword: [Cable]
- In U.S. broadband, cable is eating the Bells’ lunch, Gigaom :: Keyword: [Cable]
- Some Clearwire WiMax Sites Shuttered as iDen Dies - Sprint Plows Through Major Network Overhaul, DSLReports :: Keyword: [Wimax]
- AT&T Picks Up Nextwave Wireless To Help Avoid Spectrum Crunch, Forbes :: Keyword: [Wireless]
FCC Chairman Announces Jobs-Focused Digital Literacy Partnership Between Connect2Compete and the 2,800 American Job Centers, FCC :: Keyword: [Literacy]
We know today’s job market is more competitive than ever, but trying to find a job without knowing how to use the Internet is becoming nearly impossible. Over 80% of Fortune 500 companies, from Target to Wal-Mart, require online job applications. In the next decade,
- Backpage Gets Important 47 USC 230 Win Against Washington Law Trying to Combat Online Prostitution Ads , Tech & Marketing Law Blog :: Keyword: [47 U.S.C. § 230]
Brett M. Frischmann, The Internet and the Network Neutrality Debate, SSRN :: Keyword: [Neutral]
This chapter explores how infrastructure theory applies to the Internet and in particular the network neutrality debate. The chapter demonstrates how the infrastructure analysis, with its focus on demand-side issues and the function of commons management, reframes the network neutrality debate, weights the scale in favor of sustaining end-to-end architecture and an open infrastructure, points toward a particular rule (which the chapter articulates and defends), and
- Verizon to pay $1.25M FCC fine; forced to allow tethering apps, CNET :: Keyword: [Neutral]
Switzerland tops fixed broadband ranking, while Korea leads in wireless broadband, OECD :: Keyword: [Broadband]
Switzerland tops for the first time the OECD fixed broadband ranking, with 39.9 subscribers per 100 inhabitants, followed closely by the Netherlands (39.1) and Denmark (37.9). The OECD average is 25.6, according to new OECD statistics.
- FBI, DEA Worry IPv6 Makes User Tracking Harder - Worry IPv6 Whois Data Won't Be Kept Accurate, DSLReports :: Keyword: [IPv6]
- A Data-Driven View of IPv6 Adoption, Akamai :: Keyword: [IPv6]
- "Globally, Internet Traffic Passes Through 13 Root Servers" (!), CircleID :: Keyword: [Root]
AT&T announced today that it has agreed to acquire NextWave Wireless, Inc. NextWave holds licenses in the Wireless Communication Services (WCS) and Advanced Wireless Service (AWS) bands.
- The Power of Licensed Spectrum, AT&T :: Keyword: [AT&T]
- Public Knowledge: Comcast Caps Violate NBC Merger Conditions - Group Urges Regulator to Act on Comcast's 'Unfair Advantage', DSLReports :: Keyword: [Comcast]
- Group petitions FCC to go after Comcast following data caps controversy, Ars Technica :: Keyword: [Comcast]
- Comcast Q2 Profits Top Estimates; Shares Head Higher, Forbes :: Keyword: [Comcast]
- Facebook Shares Drop Below $20; Why It Could Drop A Lot More, Forbes :: Keyword: [Facebook]
- Its Financial Future In Question, Facebook Tries To Tell A Different Story, NPR :: Keyword: [Facebook]
Our approach to Trust & Safety and private information, Twitter :: Keyword: [Twitter]
We want to take a moment to explain some of our general Trust and Safety policies and procedures, and address the specific case at hand that has unfolded over the past 48-hours (we normally don’t address matters pertaining to individual accounts for the privacy of the account, but here the relevant communications are now public).
- Twitter Apologizes For Freezing Critical Journalist's Account: 'Not Acceptable', Forbes :: Keyword: [Twitter]
- The Guy Adams Case Demonstrates Twitter's Need for an Appeals Process, EFF :: Keyword: [Media]
- Olympics Opening Ceremony ranks among biggest social TV events to date [infographic], Lost Remote :: Keyword: [Media]
- Twitter apologizes for Guy Adams 'mess-up', CNET :: Keyword: [Media]
- Twitter admits NBC tie’s role in dispute, FT :: Keyword: [Media]
it is the sense of Congress that the Assistant Secretary of Commerce for Communications and Information, in consultation with the Deputy Assistant Secretary of State and United States Coordinator for International Communications and Information Policy, should continue working to implement the position of the United States on Internet governance that clearly articulates the consistent and unequivocal policy of the United States to promote a global Internet free from government control and preserve and advance the successful multistakeholder model that governs the Internet today.
- Who controls the Internet? Final statement of the Pan African Civil Society Workshop, APC :: Keyword: [ITU]
- Google Applauds Bipartisan Resolution Opposing Increased International Regulation of the Internet, Google :: Keyword: [ITU]
- Blogging ITU: Internet Users Will Be Ignored Again if Flawed ITU Proposals Gain Traction, EFF :: Keyword: [ITU]
- U.S. House to ITU: Hands off the Internet, CW :: Keyword: [ITU]
- US resists losing control of net, BBC :: Keyword: [ITU]
Rob Frieden , Next Generation Television and the Migration from Channels to Platforms, SSRN :: Keyword: [Video]
Consumers have access to an ever increasing inventory of video content choices as a result of technological innovations, more readily available broadband, new business plans, inexpensive high capacity storage and the Internet’s ability to serve as a single medium for a variety of previously standalone services delivered via different channels.
- #NBCFail: spoilers feed prime time, ‘silent majority’ happy, NBC says, Gigaom :: Keyword: [Video]
Privacy Multistakeholder Process: Mobile Application Transparency, NTIA :: Keyword: [Privacy]
This web page provides details on the NTIA-convened privacy multistakeholder process regarding mobile application transparency. On June 15, 2012, NTIA announced that the goal of the first multistakeholder process is to develop a code of conduct to provide transparency in how companies providing applications and interactive services for mobile devices handle personal data.
Notice of Privacy Multistakeholder Process Open Meetings, NTIA :: Keyword: [Privacy]
NTIA will convene a series of meetings through December 2012 of a privacy multistakeholder process concerning mobile application transparency.
FTC Seeks Comments on Additional Proposed Revisions to Children's Online Privacy Protection Rule, FTC :: Keyword: [COPPA]
The Federal Trade Commission is publishing a Federal Register Notice seeking public comments on additional proposed modifications to the Children's Online Privacy Protection Rule.
Email is a fundamental part of the way we communicate today, carrying everything from personal day-to-day communications to important financial communications. Over the past few years more and more users access comcast.net email through our Xfinity Connect site using their web browser. Many customers also use email clients such as Mozilla Thunderbird or the Apple Mail.app.
- Victory Over Cyber Spying, EFF :: Keyword: [Security]
- Senate To Debate Cybersecurity Bill, Daily Dashboard :: Keyword: [Security]
- Cybersecurity Bill Is Blocked by G.O.P. Filibuster, NYT :: Keyword: [Security]
- Cybersecurity Bill Blocked in Senate, WSJ :: Keyword: [Security]
Taking Steps to Prevent Unintentional Network Abuse, Comcast :: Keyword: [Security]
Beginning today, we are taking additional steps to secure our network against abuse or attacks that leverage our customer's network devices without their knowledge. The measures are aimed to protect our customers and the quality of their broadband experience, reduce malicious traffic, and help protect targets of abuse or attack that are outside of our network.
- Spy Chief Called Silicon Valley Stooge in Army Software Civil War, Wired :: Keyword: [Big Brother]
WEC CAROLINA ENERGY SOLUTIONS LLC v. Miller, Court of Appeals, 4th Circuit 2012, Fed Court :: Keyword: [CFAA]
Employer acused former employee of, during last days of employment, misappropriation of company information and violation of Computer Fraud and Abuse Act. "although Defendant Employees may have misappropriated information, they did not access a computer without authorization or exceed their authorized access.
- 4th Circuit Limits the Reach of the Computer Fraud and Abuse Act – WEC Carolina Energy Solutions v. Miller, Tech & Marketing Law Blog :: Keyword: [CFAA]
Nicholas Tsagourias, Cyber attacks, self-defence and the problem of attribution, J of Conflict & Sec L :: Keyword: [Cyberwar]
This article examines the conditions under which a cyber attack can trigger a State’s right to self-defence and argues that the current international law standards for attributing attacks to a State can cover the case of cyber attacks. More specifically, the victim State can use force by way of self-defence against another State if the attack has been committed by the latter’s organs or agents or has been committed by non-State actors tolerated by that State.
- ID theft may cost IRS $21B over next five years, CW :: Keyword: [ID Theft]
- TEXT "STOP" TO PREVENT UNWANTED LAWSUITS, Privacy Law Blogs :: Keyword: [TCPA]
Connect America Fund Kicks Off in Rural California and Nevada with Frontier Communications, FCC :: Keyword: [Connect America]
Today, the FCC kicked off the first announcement of Connect America fund deployment in the nation with events in rural California and Nevada. At ribbon-cutting events, I was joined by Frontier Communications CEO Maggie Wilderotter and met local residents, tribal, and business leaders that will benefit from the opportunities high-speed Internet will deliver to these areas. In these areas, broadband build-out will happen thanks to Frontier Communications, the first carrier to accept Connect America funding.
:: Cybertelecom Website :: Blog :: Delicious :: Twitter :: Google Group cybertelecom-l :: AUP :: Disclaimer ::