More than 40 years ago, the FCC was worried about telephone companies using their power over communications to control the then-nascent (and competitive) data processing marketplace. The Bell System at that point was already banned from providing services that weren't common carriage communications services (or "incidental to" those communications services)... In a 1999 article in the Texas Law Review, Steve Bickerstaff pointed out that Computer 1 meant that no one could provide a "computer utility" service... Today, we'd call the "computer utility" something different -- we'd use the term "cloud computing." more
Cuban requests for Google services are being routed to GCC servers in Cuba, and all Google services that are available in Cuba are being cached -- not just YouTube. That will cut latency significantly, but Cuban data rates remain painfully slow. My guess is that Cubans will notice the improved performance in interactive applications, but maybe not perceive much of a change when watching a streaming video. more
The past couple of weeks have been pretty seminal for anyone concerned about the state of Internet security and the bigger picture as to how much we could - do - and should - trust the Web. These two strange words - WikiLeaks and Stuxnet - have suddenly entered our lexicon and there is a lot to be concerned about in the world of smart grid. more
Google today announced an initiative called "Project Shield", aimed at using its infrastructure to protect free expression online. "The service currently combines Google's DDoS mitigation technologies and Page Speed Service (PSS), which allow websites to serve their content through Google to be better protected from DDoS attacks." Google is currently seeking "trusted testers" and people with sites that serve media, elections and human rights-related content. more
Nathaniel C. Fick, the federal government's inaugural ambassador at large for cyberspace and digital policy, has urged Americans to tone down the anti-China and anti-Russia tough talk on tech in order to establish better relations with nations that have yet to pick a side. more
Procedure matters. It matters whether a defendant can dispose of a litigation right out of the gate, or whether the defendant must suffer the slings and arrows of discovery, motions, and trial before presenting a successful defense. Procedurally, once a litigation has been initiated, defendant has a chance to say, "hey, wait a minute, there isn't actually a cause of action here." It's like someone suing me for being tall. Well, yeah, but there is no recognized cause of action against being tall. more
The U.S. Department of Homeland Security (DHS) published a new rule under the Privacy Act of 1974 in the Federal Register last week, detailing how it intends to expand the information it collects when determining a person's immigration status to include social media handles and potentially even search histories. more
Your wireless carrier (in the U.S., probably AT&T or Verizon Wireless) has a lot of control over the handset you can use and the applications that can run on that device. In fact, wireless carriers routinely ask for (and get) an enormous slice of the revenue from applications that work on their networks, and they force handset manufacturers to jump through all kinds of hoops in order to be allowed to sell devices that can connect to these networks... This has had bad effects on the ecosystem of the wireless world. more
Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more
Today's Internet is a network of networks and seen through the lens of the web. We need to look beyond the engineering history to see the Internet in the context of the broader vision of JCR Licklider, an acoustic psychologist, and his vision of man/computer symbiosis... JCR Licklider would've been thrilled to see such a powerful man-machine symbiosis becoming so normal and having it work so well. Lick, as he was called, can be considered the grandfather of the Internet. more
Google announced Friday that it would now be "personalizing" all searches, not just those for signed-in users. If your browser has a Google cookie, unless you've explicitly opted out, your search results will be customized based on search history. Danny Sullivan, at Search Engine Land, wonders why more people aren't paying attention. more
Are you interested in learning more about Bitcoin, cybercurrencies and Internet payment systems? On Monday, March 3, 2014, at 5:50pm UTC (London, UK) the Technical Plenary of the 89th meeting of the Internet Engineering Task Force (IETF) will be streamed live. The presentations during the "technical topic" part of the plenary will include... more
A few days ago, ABC News ran an "investigative" piece called "Group Probes Ease and Danger of Buying Steroids Online." ABC describes the "group" at issue as "an online watchdog," the Digital Citizens Alliance. That group determined that some of the millions of available YouTube videos encourage steroid use and that YouTube (which is owned by Google) places ads next to steroid-related videos and search results. They argue that Google and YouTube should be held legally responsible for any illegal content linked or posted. more
In the United States, at least 25,000 brick and mortar businesses will close in 2020 due to the Coronavirus (source: Coresight). I believe this will only be the tip of the iceberg. The businesses that fight to stay alive will become 100% dependent on the Internet to generate their revenue. No longer able to rely on foot traffic to their old brick and mortars, the popularity and brand-ability of their websites will solely dictate their ability to survive in the coming years. more
Vigilantism, in cyberspace or a New York subway, gets rejected in the main because more than just one vigilante results in an unlovely chaos. What the Anonymous cyber-vigilantes - those meting out "payback" for commercial decisions about Wikileaks - don't seem to realize is that chaos begets reaction, and in this case the victim may be the Internet itself. more