-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Broadband stimulus and the FCC's Internet policy statement
,----[ Quote ]
| This week's hoopla over at the Federal Communications Commission focused on
| the launching of a Notice of Inquiry that is seeking comment on a National
| Broadband Plan, which the agency must produce for Congress by February of
| 2010. "If we do our job well," interim FCC Chair Michael Copps told an Open
| Commission meeting audience on Wednesday, "this will be the most formative—
| indeed transformative—proceeding ever in the Commission’s history."
`----
http://arstechnica.com/tech-policy/news/2009/04/broadband-stimulus-and-the-fccs-internet-policy-statement.ars
Recent:
Reboot the FCC
,----[ Quote ]
| The solution here is not tinkering. You can't fix DNA. You have to bury it.
| President Obama should get Congress to shut down the FCC and similar
| vestigial regulators, which put stability and special interests above the
| public good. In their place, Congress should create something we could call
| the Innovation Environment Protection Agency (iEPA), charged with a simple
| founding mission: "minimal intervention to maximize innovation." The iEPA's
| core purpose would be to protect innovation from its two historical enemies—
| excessive government favors, and excessive private monopoly power.
`----
http://www.newsweek.com/id/176809
My comment to the FCC on DRM
,----[ Quote ]
| DRM is a disaster for everyone involved with it, because it cannot do what it
| claims but imposes large costs in the process of failing. The people who have
| sold DRM technologies to Big Media are frauds playing on the ignorance of
| media executives, and both the media companies and the consumer have suffered
| greatly and unnecessarily as a result.
|
| DRM cannot do what it claims for at least three reasons. First, pirates
| readily bypass it by duplicating physical media. Second, DRM algorithms
| cannot “see” any data that the host device does not present to them; thus,
| they can always be spoofed by a computer emulating an environment in which
| the DRM algorithm thinks release is authorized. Third, for humans to view or
| hear the content it must at some point exit the digital realm of DRM to a
| screen and speakers; re-capturing the data stream at that point bypasses any
| possible protections.
`----
http://esr.ibiblio.org/?p=734
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAknj4EsACgkQU4xAY3RXLo4EuQCdFXrNNc29k3nx0jCb5of1tMzo
XIMAoI9K0i0RvNzsq6TzGbsqQ2lyPtDb
=5QDL
-----END PGP SIGNATURE-----
|
|