/ Most Viewed

The 12 GHz Battle

A big piece of what the FCC does is to weigh competing claims to use spectrum. It seems like there have been non-stop industry fights over the last decade on who gets to use various bands of spectrum. One of the latest fights, which is the continuation of a battle going on since 2018, is for the use of the 12 GHz spectrum. The big wrestling match is between Starlink's desire to use the spectrum to communicate with its low-orbit satellites and cellular carriers and WISPs... more

Obama Cyberattack Executive Order Extended by Trump Administration

"The ability for the government to sanction cybercriminals will last for at least one more year," Martyn Williams reporting form IDG News Service. more

In Search of the Killer 5G App

AT&T and Comcast recently joined forces and joined the 5G Open Innovation Lab. This is a venture that has been funding start-ups and others working in 5G research. Along with looking to improve 5G edge technology, a primary goal of the OAI Lab is to search for killer apps for 5G. The two big companies join the other founding members of the effort, which includes Dell, Intel, Microsoft, Deloitte, and Nokia. more

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more

WiMAX Has Early Lead Over LTE, Says New Report

Mobile WiMAX will outpace LTE over the next few years due to its head start on deployments, reports In-Stat. While WiMAX and LTE will take very different paths, the report suggests Mobile WiMAX already has commercial deployments where as LTE won't be commercially available until late 2009. more

The Worrying Prospects for Digital Trade Under President Trump

US leadership and influence online stems from US innovation and corporate risk-taking. But it also is the direct result of US Government policy. In the early days of the web and e-commerce, the Clinton administration recognized they had to figure out a strategy to reconcile the internet, which is global, with laws and regulations, which are domestic. Instead of demanding negotiations for shared global rules, Administration officials put forward a set of principles, which they called the Framework for Global Electronic Commerce. more

Lost in Translation? Bridging the Gap between Technology and Governance

It is reassuring that, with the WCIT underway, there is increasing awareness of the threats to the Internet posed by a number of the amendments, significantly in many cases supported by authoritarian governments. There is less awareness of the serious economic implications of some of the proposed ITR amendments. While it is highly unlikely a doomsday scenario will unfold at the WCIT itself, it is clear that substantial changes to Internet governance are possible over the next several years. more

2016 US Presidential Election Likely to Have Major Impact on Broadband Expansion and Regulation

"The 2016 presidential election is likely to have a major impact on how the US government tries to expand broadband deployment and how it regulates Internet service providers," writes Jon Brodkin in Ars Technica. more

US Senators Push Bill to Boost Internet, Communication Channels for Iranians

Voice of America reporting: "U.S. lawmakers say they plan legislation that would fund efforts to help Iranians receive and send information despite government restrictions. Independent Senator Joe Lieberman said Thursday that the bill intends to help the Iranian people stay 'one step ahead of the Iranian regime.'" Also a related report by AFP. more

US DMCA Rules Updated - Now Legal to Hack Devices, Cars, Video Games, If Done in ‘Good Faith’

The U.S. government has released an updated version of the Digital Millennium Copyright Act (DMCA), adding a list of new exemptions that will protect cybersecurity professionals from prosecution over reverse-engineering of products for research purposes. more

The Privacy Shield Governing EU-US Data Flows Gets European Approval

"EU-U.S. commercial data transfer pact clears final hurdle," Julia Fioretti today reported in Reuters: "A commercial data transfer pact provisionally agreed by the EU executive and the United States in February received the green light from EU governments on Friday." more

Mozilla Launches Monitor Plus, A Comprehensive Privacy Service

Mozilla is launching Mozilla Monitor Plus, a premium service priced at $8.99 per month annually, promising to detect and remove users' personal information from over 190 data broker sites. more

Google and Facebook Join Forces to Directly Connect Los Angeles to Hong Kong via Undersea Cable

TE SubCom, leading provider of undersea communications technology and marine services, along with Facebook, Google, and PLDC (Pacific Light Data Communication Co. Ltd.), have announced that they will co-build the Pacific Light Cable Network (PLCN), a 12,800 km transpacific submarine cable system that will provide the first direct undersea route between Hong Kong and Los Angeles, California (USA) with ultra-high capacity transmission. more

Chromebooks, Google’s Long-Waited Laptop, to Ship Next Month

Google yesterday dove deep into its Chrome notebook project at its annual Google I/O conference. The company has had the notebook operating system in beta for almost two years now. Google announced the first market-ready Chromebooks from partners Samsung and Acer. The Chrome OS is dependent on the cloud for storage and various web-based applications. The result is a machine that boots in a matter of seconds and carries very little in the line of native hardware. more

How to Secure Your Data During Coronavirus

Nobody loves a good crisis more than a hacker and, by anyone's definition, coronavirus is a big, fat stinking crisis that almost everyone on earth is sitting in the middle of. For most of us, a crisis brings out the best. First responders and the healthcare systems are replete with stories of superhuman sacrifice and commitment to others. Unfortunately, it is this commitment to the work at hand that puts cybersecurity on the back burner and increases the chance of a breach, break-in, or general mischief. more