Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Internet

A Global Consortium to Build New Trans-Pacific Cable System “FASTER”

News release: “A consortium of six global companies announced that they have signed commercial agreements to build and operate a new Trans-Pacific cable system to be called “FASTER” with NEC Corporation as the system supplier. The FASTER cable network will connect the United States to two landing locations in Japan. The total amount of investmentContinue Reading

Security Vulnerabilities in Automobiles Subject of Investigation

Andy Greenberg – Forbes: “…This fact, that a car is not a simple machine of glass and steel but a hackable network of computers, is what Miller and Valasek have spent the last year trying to demonstrate. Miller, a 40-year-old security engineer at Twitter, and Valasek, the 31-year-old director of security intelligence at the SeattleContinue Reading

Delivering a Customer-Focused Government Through Smarter IT

Beth Cobert, Steve VanRoekel, and Todd Park: “As technology changes, government must change with it to address new challenges and take advantage of new opportunities. This Administration has made important strides in modernizing government so that it serves its constituents more effectively and efficiently, but we know there is much more to do. Last year, a groupContinue Reading

Guide to International Research Resources

“This guide is intended as a repository of resources specifically for research using materials produced and collected in other countries. The main resources included here are links to national libraries, national bibliographies and union catalogs. Additional regional resources have been included where appropriate. Navigation can be done through the tabs at the top or the table ofContinue Reading

Visualizing language usage in New York Times news coverage throughout its history

Chronicle – Tracking New York Times Language Usage Over Time, Alexis Lloyd:  “News publishing is an inherently ephemeral act. A big story will consume public attention for a day, or a month or a year only to fade from memory as quickly as it erupted. But news coverage, aggregated over time, can provide a fascinating “firstContinue Reading

Uniform Fiduciary Access To Digital Assets Act – Draft

National Conference of Commissioners on Uniform State Laws, June 14, 2014 [snipped from Draft]: “The purpose of this act is to vest fiduciaries with the authority to access, control, or copy digital assets and accounts. It is important to understand that the goal of the Uniform Fiduciary Access to Digital Assets Act (UFADAA) is to removeContinue Reading

Virginia has the fastest Internet in the US – Study

PCWorld: “If you want the fastest broadband Internet in the US, consider moving to Virginia. That’s the takeaway from a new bit of research from communications firm Broadview Networks, which ranks average broadband speeds for all 50 United States and the District of Colombia. Virginia tops the list with an average connection speed of 13.7 megabits per secondContinue Reading

Privacy in Online Markets: A Welfare Analysis of Demand Rotations

O’Brien, Daniel P. and Smith, Doug, Privacy in Online Markets: A Welfare Analysis of Demand Rotations (July 1, 2014). FTC Bureau of Economics Working Paper No. 323. Available for download at SSRN: http://ssrn.com/abstract=2477052 “We compare the private and social incentives for privacy when sellers can commit to transparent privacy policies that are understood by consumers. TheContinue Reading

A Path to Understanding the Effects of Algorithm Awareness

Hamilton, K., Karahalios, K., Sandvig, C. & Eslami, M. (2014). “A Path to Understanding the Effects of Algorithm Awareness.” In CHI Extended Abstracts on Human Factors in Computing Systems (alt.CHI). ACM, New York: “The rise in prevalence of algorithmically curated feeds in online news and social media sites raises a new question for designers, critics, andContinue Reading

Agile in the Federal Government: Improving Execution

Agile in the Federal Government: Improving Technical Execution – ccpace: “As discussed in the first paper in this series Agile in the Federal Government: Scrum and Beyond, the history of Agile adoption in industry took the path of usage of eXtreme Programming (XP) followed by the combination of Scrum and XP. In the government, theContinue Reading

Two Factor Auth

Two Factor Auth (2FA): “Two-step verification, abbreviated to TSV (not equal to two step authentication TSA nor to Two-factor authentication, abbreviated to TFA) is a process involving two subsequent but dependent stages to check the identity of an entity trying to access services in a computer or in a network with just one factor or secret,Continue Reading

IBM’s New Processor Uses Little Energy and Functions Mimic Human Neural Networks

New York Times – John Markoff: “Inspired by the architecture of the brain, scientists have developed a new kind of computer chip that uses no more power than a hearing aid and may eventually excel at calculations that stump today’s supercomputers. The chip, or processor, is named TrueNorth and was developed by researchers at IBM andContinue Reading