TV broadcasters and the military have lots of prime spectrum, and the battle over how any of it gets redistributed to wireless companies to feed the data demands of smartphone and tablet owners will be a key part of the communications policy landscape in the second term of the Obama administration.
So too is the possibility that President Obama will sign an executive order for his agencies to make sure the sectors they regulate–especially energy and communications companies–are better protected against cyber threats, including potentially disastrous attacks by botnets, or gangs of remotely controlled infected computers.
On the first point, the U.S. Federal Communications Commision has started designing new auctions that would compensate broadcasters that are willing to hand over their licenses, but broadcasters are reluctant to hand any spectrum over. The New York Times today blogged on this topic, and also the lawsuits the commission faces over its requirements that carriers support roaming and treat everybody’s bits equally – a concept known as “net neutrality.”
On the cyberthreat landscape, I spoke yesterday with Melissa Hathaway, who served briefly as the White House cyberczar at the beginning of Obama’s first term and is now a consultant. She says that in recent years some 80 bills in some way touched on cybersecurity, but none became law. Two months ago, reports surfaced that Obama would issue an executive order aimed at strengthening cyber protections of critical infrastructure. A draft leaked out; it highlighted the need to protect the energy and communications sectors and talked vaguely about creating an “information exchange framework” so that private companies and government agencies could learn about emerging threats more rapidly. It’s not clear what’s being considered today, but Hathaway predicted President Obama would sign an executive order before the year is out.
If any order translates into new regulations, it could mean new headaches for all sectors that have to deal both with increasing cyber threats and with increasing efforts by policymakers to somehow stay on top of those threats.
Embracing CX in the metaverse
More than just meeting customers where they are, the metaverse offers opportunities to transform customer experience.
Identity protection is key to metaverse innovation
As immersive experiences in the metaverse become more sophisticated, so does the threat landscape.
The modern enterprise imaging and data value chain
For both patients and providers, intelligent, interoperable, and open workflow solutions will make all the difference.
Scientists have created synthetic mouse embryos with developed brains
The stem-cell-derived embryos could shed new light on the earliest stages of human pregnancy.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.