Facebook Twitter LinkedIn Signup

Letter to FTC Regarding Internet of Things by Dan Caprio (McKenna Long & Aldridge)

On Behalf of the Transatlantic Computing Continuum Policy Alliance, I am pleased to submit these comments in response to the Federal Trade Commission's (FTC) request for public comment on the privacy and security implications of the Internet of Things (IoT). We commend the FTC for holding its IoT workshop November 19, 2013 and apprecite the opportunity to participate.    Read More.

Center for Public Policy Innovation Hosts Policy Forum on the 'Internet of Everything'

On November 7, 2012, CPPI hosted a policy forum for key lawmakers and their staff entitled "Futurist Policy Initiative: Internet of Everything" on Capitol Hill. During the event, which was co-sponsored by Cisco, a world leader in Internet of Everything' (IoE) thought leadership, leading experts from government and the IT industry outlined the key policy and regulatory areas they believe will have the greatest impact on helping to foster the future advancement of IoE, the next big wave of innovation worth an estimated $14.4 trillion in global economic value.    Read More.

Cisco CEO Pegs Internet of Things as $19 Trillion Market

Cisco Systems Inc. Chief Executive Officer John Chambers said that the Internet of Everything -- connected products ranging from cars to household goods -- could be a $19 trillion opportunity.In a keynote presentation yesterday at the International Consumer Electronics Show that also featured comedian Sarah Silverman, Chambers drew a picture of a world in which objects in homes, at airports, at hotels and elsewhere that are connected to the Internet know peoples’ preferences. That could lead to consumers buying more goods, he said.    Read More

The team behind Vicarious, a new kind of artificial intelligence company. Photo: Courtesy of Vicarious

The Quest to Give Computers the Power of Imagination (Wired)

April 25, 2014

Imagine you want to teach a child the meaning of the word “table.” You’d probably point to a few examples in your home–a round wooden kitchen table, a square plastic kiddie table, a massive rectangular dining room table. “This is a table,” you’d say, three or four times, and after a while, the child would start identifying other tables, regardless of their shape, size, or color.

If you want to teach a modern computer the meaning of the word table, the process isn’t much different–except that you can’t stop at three or four examples. When dealing with a machine, you have to show it millions of tables before it can accurately identify a table on its own. This

FCC considers boosting Internet speeds in rural areas
April 24, 2014
(The Hill) - During a meeting on Wednesday, the Federal Communications Commission (FCC) voted to move ahead with plans to improve speeds of Internet service in rural areas....

Facebook CFO stepping down
April 24, 2014
(The Hill) - He will be succeeded on June 1 by David Wehner, Facebook’s current vice president for corporate finance and business planning, though he will stay with the company throug...

Security Experts Continue to Weigh in on Verizon Data Breach Report
April 24, 2014
(HS Today) - Responding to Verizon's 2014 Data Breach Investigations Report (DBIR) released Wednesday, security experts from RedSeal Networks and Neohapsis weighed in on the report’s ...

BAE Systems Unveils Geospatial Intelligence Mobile App for Google Glass
April 24, 2014
(HS Today) - A new app for Google Glass unveiled by BAE Systems is described as “a potential game-changer for the way our military, police, fire and first responders collect data,” BA...

NSA document details foreign intel databases
April 24, 2014
(Federal Computer Week) - The National Security Agency says it is not targeting people inside the United States for surveillance through its efforts to collect foreign intelligence, according to a...

NIST shares tool for vetting mobile apps
April 24, 2014
(Federal Computer Week) - The National Institute of Standards and Technology has launched a web-based application for developers to assess their self-created mobile apps for risk and hosting requi...

It's Now Possible to Wirelessly Charge 40 Smartphones From 16 Feet Away
April 24, 2014
(CIO) - Korean engineers have broken a record by transmitting enough power wirelessly over a distance of about 16 feet to charge up to 40 smartphones at the same time....

Privacy Jitters Derail Controversial K-12 Big Data Initiative
April 24, 2014
(CIO) - Unrelenting privacy concerns finally derailed a controversial big data initiative that promised to deliver more individualized instruction to public school students in th...

CPPI Supporters RSS Feed

Neustar Customer Intelligence Helps a Retailer Break New Ground
(Neustar) - A nationwide wireless carrier was looking to locate new stores. To make informed choices and avoid costly mistakes, they used Neustar Customer Intelligence before investing millions in real estate, co...

The Search Marketing Industry Reacts to Neustar’s Local Search Report
(Neustar) - “A wealth of data about consumer behaviors and attitudes,” says one analyst about the 7th Annual Local Search Study, commissioned by Neustar and partner 15miles and conducted by Comscore. This year’s ...

Smokescreening: Data Theft Makes DDoS More Dangerous
(Neustar) - It’s called “smokescreening” and it’s costing companies big. In 2013, over 50 percent of companies hit by DDoS attacks suffered theft of funds, customer data or intellectual property. Attackers now us...

New FCC Rules Call On Carriers to Play Fair with Rural Residents
(Neustar) - The FCC recently outlined new rules to redress the complaint that some rural residents are getting shortchanged by their carriers when it comes to completing long-distance calls. For years, calls to r...

Three Key Objectives For Network Transformation Success
(Neustar) - Cisco predicts that by 2017, individuals will have an average of five connected devices to accommodate their voice, data and media consumption needs. Consequently, the voice-oriented public switched t...