CyberTelecom News Weekly
Federal Internet Law and Policy :: An Educational Project
- Sept. 11 :: Berkman Center: Book Launch: Open Access :: Harvard Law School
- Sept. 12 :: FOSI: A Platform for Good - Launch Event :: National Press Club
- Sept. 13 :: Public Knowledge's 9th annual IP3 awards :: Washington DC
- Sept. 15 :: 1998 :: MCI and WCOM become WCOM
- Sept. 19 :: NTIA Privacy Multistakeholder Process Open Meeting :: Washington DC
- Sept. 20 :: Comments Due 9th FCC 706 NOI
- Sept. 21-23 :: Telecommunications Policy Research Conference :: Arlington, VA
- Sept. 24 :: Extended Deadline Comments FTC Modification to COPPA
- Sept. 25 :: GMU: Bronwyn Howell: Regulating Broadband Networks: The Global Data for Evidence-Based Public Policy
[M]any problems that can be thought through in advance are very difficult to think through in advance. They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution. Other problems simply cannot be formulated without computing-machine aid. Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems. - J.C.R. Licklider, “Man-Computer Symbiosis,” IRE Transactions on Human Factors in Electronics, HFE-1 (1960): 4-11, accessed May 21, 2012, http://groups.csail.mit.edu/medg/people/psz/Licklider.html
FCC to measure mobile broadband speeds, WAPO :: Keyword: [706]
The Federal Communications Commission said Thursday that it would begin
to measure the speeds of wireless networks, a move to give consumers
more information on the performance of their wireless providers and to
keep carriers accountable for advertised speeds.
FCC to test mobile broadband performance for consumers, CNET :: Keyword: [706]
The government agency says that the evaluations will be useful to consumers and will "spur competition among service providers."
Former FCC Chairman Kevin Martin lobbies for LightSquared, CW :: Keyword: [GPS]
Two names that have recently been out of the limelight recently turned
up on Tuesday at the U.S. Federal Communications Commission: Bankrupt
would-be mobile broadband carrier LightSquared and former FCC Chairman
Kevin Martin, who was helping to sell LightSquared's story to the
agency.
Broadband Progress Report Map – Another Digital First, FCC :: Keyword: [MAP]
In another digital first for the FCC, we just released an interactive,
web-based map that illustrates our Broadband Progress Report. This
congressionally mandated report assesses how well broadband deployment
and adoption is progressing in the nation. With this new map, our report
is more responsive to both Congress and the American people.
Olympics Stimulate Growth of Wi-Fi Service in Britain, NYT :: Keyword: [WIFI ]
In preparations for the Games, the operators O2 U.K., Virgin Mobile and
BT carved up public places across London, broadcasting open wireless
networks in major squares, airports and subways.
FCC TO LAUNCH MOBILE BROADBAND SERVICES TESTING AND MEASUREMENT PROGRAM., FCC :: Keyword: [Wireless]
The National Broadband Plan (NBP), developed by the FCC, made
recommendations to improve the availability of information for consumers
about their broadband service. The FCC has undertaken a series of
projects as part of its Consumer Empowerment Agenda to realize this
charge, including launching a
FCC Authority Questioned In Wake of Verizon Deal Approval, Teckfreedom :: Keyword: [Wireless]
“There's a common misperception that the FCC somehow gets to review all
deals in the communications industry,” said TechFreedom's Berin Szoka in
an interview with Bloomberg BNA Aug. 27. “
FCC Authority In VZ/SpectrumCo, or “Real Lawyers Read The Footnotes.”, Tales From the Sausage Factory :: Keyword: [Wireless]
Many years ago, I taught a semester of law school as an adjunct. I
assigned the students to read the FCC’s 2005 Internet Policy Statement. I
was dismayed to discover that, after doing the reading, none of them
had
Section 230 Immunizes Links to Defamatory Third Party Content--Directory Assistants v. Supermedia, Tech & Marketing Law Blog :: Keyword: [47 U.S.C. § 230]
Assistants, Inc. v. Supermedia, LLC, 2012 WL 3329615 (E.D. Va. May 30, 2012) [For some reason,...
George S. Ford and Lawrence J. Spiwak , Justifying the Ends: Section 706 and the Regulation of Broadband, Phoenix Center Policy Perspective No. 12-04 :: Keyword: [Open Internet]
Over the past several years, the FCC under Chairman Julius Genachowski
has argued that because broadband is not universally ubiquitous, the
agency may use the “reasonable and timely” standard contained in Section
706 in the Communications Act as an independent source
90% of US households with computers have broadband, Gigaom :: Keyword: [Broadband]
Broadband penetration in the U.S. is continuing to grow, and now stands
at 90 percent of U.S. households that have a computer at home, according
to Broadband Access & Services in the Home 2012, a study by
Leichtman Research Group (LRG). Five years ago, 65 percent of households
with a computer subscribed to broadband service, LRG notes. Its
research shows that broadband subscriptions go up with household
incomes.
comScore Reports July 2012 U.S. Mobile Subscriber Market Share, comscore :: Keyword: [Broadband]
key trends in the U.S. mobile phone industry during the three month
average period ending July 2012. The study surveyed more than 30,000
U.S. mobile subscribers and found Samsung to
Accelerating IPv6 Growth and Sunsetting IPv4, Arbor Networks :: Keyword: [IPV6]
The next-generation Internet Protocol, IPv6, has experienced more growth
in the last 2 years than in any other period in its 18-year existence .
While there are many challenges ahead in the deployment of IPv6, IPv6
is a certain, although eventual, replacement for the currently dominant
IP protocol, IPv4. As deployment of IPv6 gains
Chris
Jay Hoofnagle, Ashkan Soltani , Nathan Good , Dietrich James Wambach,
Mika Ayenson, Behavioral Advertising: The Offer You Cannot Refuse, 6 Harvard Law & Policy Review 273 (2012) :: Keyword: [Advertising]
At UC Berkeley, we are informing political debates surrounding online
privacy through empirical study of website behaviors. In 2009 and 2011,
we surveyed top websites to determine how they were tracking consumers.
We found that advertisers were using persistent tracking technologies
Visiting the White House, "Anytime, Anywhere, and on Any Device", White House :: Keyword: [EGOV]
Today, we're excited to announce some big changes to the way you connect
with the White House. More Americans rely on tablets and smart phones
for news and information than ever before and we've certainly seen these
trends reflected at WhiteHouse.gov. Over the past two years the number
of mobile visits to the site has
Chinese Dissident in Yahoo Case Is Freed After 10 Years, NYT :: Keyword: [YAHOO]
Wang Xiaoning served 10 years after being convicted of state subversion
on evidence provided by the Internet giant Yahoo, which was criticized
for helping Chinese authorities in the case.
Sweden is best at using the Internet, CNN :: Keyword: [Sweden]
Which country is the best at putting the Web to use?
Eldar Haber, Copyrights in the Stream: The Battle on Webcasting, 28 Santa Clara Computer & High Tech. L.J. 769 (2012) :: Keyword: [Webcasting]
The Internet threatens many right holders who consistently battle
against technologies that enable people to use their copyrighted
materials without their consent. While copyright holders have succeeded
in some cases, their main battle against peer-to-peer (P2P) file-sharing
has yet
Castree, Sam, Cyber-Plagiarism for Sale!: The Growing Problem of Blatant Copyright Infringement in Online Digital Media Stores, SSRN :: Keyword: [Copyright]
While much ink and rhetoric have been spilled over cyber-piracy, there
has been little mention of the problem of what we shall call
'cyber-plagiarism': thieves copying completely the works of others and
selling them on online digital media stores like Apple’s App Store and
Amazon’s
Members of Congress Demand Answers for Homeland Security’s Unjust Domain Name Seizures, EFF :: Keyword: [IP DNS]
This morning, a bipartisan group of Representatives, led by Rep. Zoe
Lofgren (D-Calif.), sent a pointed letter to Attorney General Eric
Holder and the Secretary of Homeland Security Janet Napolitano
protesting the recent spat of domain name seizures—executed on dubious
copyright grounds—that have been censoring websites with no due process.
Talking Twitter at the #GOP2012 Convention #2, Twitter :: Keyword: [Media]
While we’re here in Tampa, we’ve been talking to journalists,
candidates, political pundits and more about the way Twitter has
affected the election and their work. Now we’re talking with @BretBaier,
Anchor of FOX News Channel’s Special Report.
#DNC2012: 3 million Tweets and counting, Twitter :: Keyword: [Media]
Although it’s just the first night at the Democratic National Convention
in Charlotte, people have already posted more than 3 million Tweets,
including #DNC2012 and related terms. In comparison, there were 4
million Tweets sent throughout the three days of last week’s Republican
National Convention (#RNC2012).
The Cloud: Understanding the Security, Privacy and Trust Challenges, Rand :: Keyword: [Cloud]
Our research investigated the security, privacy and trust aspects of
cloud computing and determined whether these were sufficiently distinct
to warrant public policy intervention. On the whole, cloud computing
brings into acute focus many security and privacy challenges already
The Privacy Multistakeholder Process Turns to Substance, NTIA :: Keyword: [Privacy]
At the second privacy multistakeholder meeting regarding mobile
application transparency held August 22, stakeholders made substantial
progress on procedural issues to move this process forward. Poll results
from the meeting are available here. NTIA grouped the poll results into
three categories: “general support,” “mixed views,” and
FTC Extends
Deadline to Comment on Proposed Modifications to the Children's Online
Privacy Protection Rule Until September 24, 2012, FTC :: Keyword: [COPPA]
FTC Extends Deadline to Comment on Proposed Modifications to the
Children's Online Privacy Protection Rule Until September 24, 2012
Carol M. Hayes and Jay P. Kesan , At War Over CISPA: Towards a Reasonable Balance between Privacy and Security, Illinois Public Law Research Paper No. 13-03 :: Keyword: [Security]
Congress has recently begun attempting to address cybersecurity threats.
Whenever the topic is raised, alarms sound from both sides of the
political aisle. On one side, the intelligence community stresses that
protection from cybersecurity threats is essential to national security,
BitCoin exchange loses $250,0000 after unencrypted keys stolen, CW :: Keyword: [Security]
Hackers stole about $250,000 from BitFloor, a BitCoin exchange, and it
does not have the money to reimburse account holders, according to the
website's founder.
Court ruling that NSA spying violated 4th Amendment remains secret, Ars Technica :: Keyword: [Big Brother]
Last month, a letter to Congress noted that “on at least one occasion” a
secretive US court ruled that National Security Agency surveillance
carried out under a 2008 act of Congress violated the Fourth Amendment’s
restriction against unreasonable searches and seizures. But the actual
ruling remains secret. Decisions handed down by
Cybercrime costs U.S. consumers $20.7 billion, CNET :: Keyword: [Crime]
An annual cybercrime report has said that over the past 12 months, cybercrime has cost U.S. consumers billions of dollars.
The Law of Cyber-Attack, California Law Review, Vol. 100, No. 4, 2012 :: Keyword: [Cyberwar]
Cyber-attacks have become increasingly common in recent years. Capable
of shutting down nuclear centrifuges, air defense systems, and
electrical grids, cyber-attacks pose a serious threat to national
security. As a result, some have suggested that cyber-attacks should be
FBI: Hackers didn't get Apple IDs from us, CNN :: Keyword: [Hacker]
The FBI on Tuesday said there is "no evidence" to support claims by a
hackers group that they accessed information about millions of Apple
users on a bureau computer.
David W. Opderbeck, Does the Communications Act of 1934 Contain a Hidden Internet Kill Switch?, Seton Hall Public Law Research Paper :: Keyword: [Kill Switch]
A key area of debate over cybersecurity policy concerns whether the
President should have authority to shut down all or part of the Internet
in the event of a cyber-emergency or cyber-war. The proposed
Cybersecurity Act of 2009, for example, contained what critics derided
as an
Universal Service Policies in the Context of National Broadband Plans (OECD Digital Economy Paper 203), OECD :: Keyword: [USF]
This report discusses the main areas in which national strategies to
expand broadband networks affect universal service objectives, proposes
criteria to rethink the terms of universal service policies, and shares
the latest developments across a selected group of OECD countries.
We Believe in America, Telecommunications, and the Internet, Benton :: Keyword: [VOTE]
Meeting in Tampa this week, the Republican Party adopted its 2012
platform self-proclaimed to be “both a vision of where we are headed and
an invitation to join us in that journey.” Telecommunications and,
specifically, the Internet are key planks in the party’s principles and
policies this year.
2012 Democrat Platform Endorses Internet Privacy, EPIC :: Keyword: [Vote]
The 2012 Democratic National Platform supports the administration’s
Internet Privacy Bill of Rights to protect consumer privacy. Separate
provisions in the platform call for privacy protections for broadband
deployment, intellectual property enforcement, and cybersecurity laws;
the Democratic platform opposes voter identification laws.
Democratic Convention on pace to trump GOP in social media, Lost Remote :: Keyword: [Vote]
Perhaps this shouldn't come as a surprise, but the DNC is out to a much
stronger start than the RNC on social media. Twitter said that Michelle
Obama's speech peaked at more tweets per minute (28,003) than Mitt
Romney's speech (14,239). The mayor of San Antonio, Julian Castro, drove
more Twitter conversation than any GOP speaker except for Mitt Romney
Clint Eastwood's RNC Obama chair gets own Twitter account, CNET :: Keyword: [VOTE]
Wow. It doesn't take long for Twitter to tap into the cultural
zeitgeist. Invisible Obama, fast made famous at tonight's RNC, gets an
account that goes from zero to nearly 20K followers in less than an
hour.
Reddit: Obama visit generates most activity ever, CNET :: Keyword: [VOTE]
The president breaks all the rules, breaks a Reddit record, and draws at least 5.3 million views, news stats reveal.
Obama's response to Eastwood most re-tweeted tweet of RNC, CNET :: Keyword: [VOTE]
Clint Eastwood's berating of an invisible Obama launched a viral
"Eastwooding" meme, but it was the president's response that garnered
the most Twitter traction.
Democrats push for open internet, cybersecurity, WAPO :: Keyword: [VOTE]
Democrats late Sunday reiterated support for open Internet policies that
protect free speech and consumer choice, stronger cybersecurity laws
and the protection of movies and songs from online copyright violations.
:: Cybertelecom Website :: Blog :: Delicious :: Twitter :: Tumblr :: Google Group cybertelecom-l :: AUP :: Disclaimer ::
No comments:
Post a Comment