Over the past few years, the battle for net neutrality has had a few more ebbs than flows. Here’s a history of the legal theories that undergird net neutrality arguments. Originally published on Spiceworks.
When President Donald J. Trump nominated Ajit Pai to head the Federal Communications Commission (FCC) in 2017, net neutrality advocates took notice. Pai had spent the past five years working at the FCC where he’s gained a reputation for voting reliably against the net neutrality regulations sought by FCC Chairman Tom Wheeler.
This included Wheeler’s 2015 decision to reclassify broadband internet providers under Title II of…
From HIPAA to SOX to GDPR, the concept of privacy is contingent on keeping personally identifiable information (PII) under the jurisdiction of the person in question. But what is PII? Where did the idea come from? And how are new technologies challenging it as a concept? Originally published on Spiceworks.
Whether you’re an IT pro in the medical world or an IT pro in a small-to-medium-size business, you’re likely familiar with the phrase PII, or personally identifiable information. It’s the key concept in almost any conversation about digital privacy in the U.S.
Predicting the future is a tricky thing — but something that everyone is keenly interested in. And, for that matter, some folks are paid to do. To explore how technology is changing how we work and what the future of the office will be, I reached out to a futurist and emeritus professor for answers. Originally published on Spiceworks.
Ah, the future — depending on where you sit, it’s either coming apart at the seams as Skynet rules supreme or it’s a jobless utopia where a universal basic income obliterates the normal stresses of life.
But for Dr. Arthur B…
While companies use carefully parsed language to suggest that features and tools for dimming the blue light on smartphones and computers can help users sleep, scientists say they’re not so sure. Originally posted on Spiceworks.
With the release of Windows 10 Creators Update back in 2017, Microsoft introduced a new feature called Night Light that lowers the amount of blue light given off by a device’s display at night.
Microsoft isn’t the first tech company to roll out a feature that touts the benefits of “blue light dimmers.” From Apple’s Night Shift feature in macOS to the eponymous tool from…
With the data-sharing framework Privacy Shield now almost three years old and the EU’s GDPR rules in full effect, here’s a look at how the issue of personal privacy is treated differently in the EU and the US and how Privacy Shield addresses it. Originally posted on Spiceworks.
When President Donald Trump signed an Executive Order to strip away privacy rights from non-US citizens in 2017, experts voiced concern that the order might jeopardize the six-month-old Privacy Shield data-sharing agreement between the EU and the US.
As IoT devices continue to proliferate and security concerns rise, here’s what some of the first DDoS attacks can teach us about today’s IoT-fueled DDoS attacks. Originally published on Spiceworks.
The attack came all at once, an orchestrated bludgeon against 13 DNS servers that were an integral part of the internet’s underlying infrastructure. Conducted through ICMP requests, the massive distributed denial-of-service (DDoS) attack hit the Domain Name Server (DNS) provider’s servers so hard that only four were left running. …
As we close in on the 2020 elections, here’s an in-depth look at the history of electronic voting. Originally published on Spiceworks in 2016.
It was 3 a.m. and Jane Platten was staring into a room full of electronic voting machines in Cleveland, OH at the end of a 22-hour day. She pointed mutely over at the machines, which more than 200,000 people had cast their votes into that day.
Earlier that day, the machines had worked as promised, recording electronic records of each person’s vote on a memory card. …
In honor of National Cybersecurity Month, we decided to set our sights on the first computer virus to catch the eye of the FBI. First published on Spiceworks.
On April 2, 1999, law enforcement showed up on the doorstep of David L. Smith. Putting the 30-year-old New Jersey man in handcuffs, officials charged him with developing and unleashing a fast-spreading computer virus that had wreaked havoc on computer systems around the world.
The global search for Smith ended after FBI agents and America Online officials, in cooperation with the New Jersey Attorney General’s office, finally found the author of the…
Brand Content Strategist at Hana in Austin, TX. Formerly with Bazaarvoice & Spiceworks. Proud alum of The College of Wooster.