Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] FCC Says to Itself: "We're Doing Well..."

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Broadband stimulus and the FCC's Internet policy statement

,----[ Quote ]
| This week's hoopla over at the Federal Communications Commission focused on 
| the launching of a Notice of Inquiry that is seeking comment on a National 
| Broadband Plan, which the agency must produce for Congress by February of 
| 2010. "If we do our job well," interim FCC Chair Michael Copps told an Open 
| Commission meeting audience on Wednesday, "this will be the most formative—
| indeed transformative—proceeding ever in the Commission’s history."     
`----

http://arstechnica.com/tech-policy/news/2009/04/broadband-stimulus-and-the-fccs-internet-policy-statement.ars


Recent:

Reboot the FCC

,----[ Quote ]
| The solution here is not tinkering. You can't fix DNA. You have to bury it.
| President Obama should get Congress to shut down the FCC and similar
| vestigial regulators, which put stability and special interests above the
| public good. In their place, Congress should create something we could call
| the Innovation Environment Protection Agency (iEPA), charged with a simple
| founding mission: "minimal intervention to maximize innovation." The iEPA's
| core purpose would be to protect innovation from its two historical enemies—
| excessive government favors, and excessive private monopoly power.
`----

http://www.newsweek.com/id/176809


My comment to the FCC on DRM

,----[ Quote ]
| DRM is a disaster for everyone involved with it, because it cannot do what it
| claims but imposes large costs in the process of failing. The people who have
| sold DRM technologies to Big Media are frauds playing on the ignorance of
| media executives, and both the media companies and the consumer have suffered
| greatly and unnecessarily as a result.
|
| DRM cannot do what it claims for at least three reasons. First, pirates
| readily bypass it by duplicating physical media. Second, DRM algorithms
| cannot “see” any data that the host device does not present to them; thus,
| they can always be spoofed by a computer emulating an environment in which
| the DRM algorithm thinks release is authorized. Third, for humans to view or
| hear the content it must at some point exit the digital realm of DRM to a
| screen and speakers; re-capturing the data stream at that point bypasses any
| possible protections.
`----

http://esr.ibiblio.org/?p=734
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAknj4EsACgkQU4xAY3RXLo4EuQCdFXrNNc29k3nx0jCb5of1tMzo
XIMAoI9K0i0RvNzsq6TzGbsqQ2lyPtDb
=5QDL
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index