Just as Chinese Internet users do not care about content outside the Great Firewall even after it’s unblocked, Free Basics users will likely continue to use the restricted bundle of services provided by Facebook and its partners even after they convert to paid, full Internet access.
A good catalogue, Internet data caps and online piracy – Netflix has its work cut out for it in India.
The outcome document produced of the 10-year review of the World Summit on Information Society has some glaring omissions
The debate between Murthy and Facebook raises issues that speak to the larger net neutrality discussion within India.
The business of democracy is transacted over multiple spaces – both mainstream media and alternative – and to concentrate the ownership of a medium is to limit the possibilities of a diverse public discourse.
The Government should strive to ensure that every Indian has access to the full Internet and not just some corner of it chosen by Facebook or any other technology company.
A quote by Musk on spacex.com states that if the company became able to reuse rockets, “the cost of access to space will be reduced by as much as a factor of a hundred”.
Whether the regulator is attempting a deeper look or trying to negate the support that was drummed up for net neutrality earlier this year, it desperately needs to be more open and forthcoming about its consultation process.
More than questions of funding and sponsorship, Freedom House’s ‘Freedom on the Net’ report needs to be open about the problems with its methodology and approach to defining and measuring challenges to the Internet.
Even if offenders purchase new phones, they will be betrayed by their associations to others in the network.
Under the terms of a new deal, a Deutsche Telekom subsidiary will hold Microsoft customer data in “trust” in Germany, thus putting it out of reach of US government subpoenas
From a professional perspective, no longer can producers of video content think about a singular platform, but must make sure that the content is available across a number of platforms, in a number of formats, which all have individual specifications.
Every time you read an article on The New York Times, your browsing history could be disseminated to as many as 44 third-party domains.
Today is Hollywood actor Hedy Lamarr’s 101st birthday. It is being celebrated not only by movie fans but telecom engineers all over the world. Why could that be? Hedy Lamarr was born Hedwig Eva Marie Kiesler, and hit headlines as an actress with a nude swimming scene in […]
The all-too-familiar tale of digital disruption that we’ve seen play out in television, transportation, accommodation and music hasn’t quite applied to the printed word.
SelfCompileApp isn’t artificially intelligent but it is remarkably deadly because it could push already-nervous civil-servants over the edge.
As technology critic Evgeny Morozov points out, this is welfarism funded by clicks and not taxes and is accompanied by the erosion of citizen privacy and public interest.
Genetic engineering and horizontal gene transfer are phrases that have been used with delight by scare-mongers with limited appreciation of subtleties essential to their understanding.
India needs to steer international policy discussions at the World Summit on Information Society review to align with its domestic policy priorities.
At the heart of the new cyber-weapons problem is the forced confrontation of our historically most effective forms of defence with their own limitations.
If companies like Facebook, Google and Microsoft stand to earn revenues from Digital India, they should be made to contribute to the Universal Service Obligation fund which, in turn, can be used to advance public interest in specific ways.
It’s time the government standardised its communications online and made relevant information available and intuitively accessible.
Narendra Modi will be mistaken if he thinks American companies will treat the NDA differently from the previous regime.
Modi’s one-hour long speech, which was peppered with jokes, rhetorical flourishes and history lessons, was a logical culmination of his Silicon Valley and US tour.
With a strong emotional pitch, softball questions and Facebook HQ as friendly ground, the PM hits a home run – with one eye firmly on home
Modi’s method of reaching out to Silicon Valley marks a sharp difference with the approach of Chinese President Xi Jinping.
Before it was quickly retracted, the draft National Encryption Policy’s recommendations were so intrusive on privacy that they were as good as saying “don’t use encryption”.
Inspired by the disclosures of NSA whistleblower Edward Snowden, a campaign for a new global treaty against government mass surveillance was launched today in New York City.
Wales answers questions on zero-rating and net-neutrality, how digital connectivity will play a role in achieving global development, and access to openly available content.
The problem with a master key is ensuring it stays safe and secret. If someone were able to find out what the key is, then the secure system is completely broken.
Volkswagen has set aside €6.5 billion to cover the costs of the growing scandal over cheating on emissions tests in the US. Putting a number on the cost further down line will be far harder, however, as it is a crisis which calls into question the ethical credentials […]
The larger issue is that the NDA government, of late, has shown a pronounced tendency to use use a sledgehammer to kill a fly.
While it was still ‘alive’, the policy was widely panned for being ambiguous at best and for suggesting the government wanted to assume an autocratic stance on access to encrypted information.
Users of social networks in general, and of social networking kingpin Facebook in particular, are ill-equipped to evaluate the price they’re paying in this trade.
The department proposes some practices that effectively run counter to the philosophy of encryption – of data as well as devices.
Going after companies like Hacking Team alone is meaningless because they fulfil a need, albeit one we may not have fully understood but whose legitimacy manifests from time to time.
In the post-9/11 period, if a captured terrorist was found to possess an F-91W, the person was assumed to have been trained in bomb-making.
Article updated. The collaborative coding platform GitHub became the subject of a DDoS attack on August 25, its second this year after having been targeted by a massive attack in March. The issue first appeared at 3.05 pm IST, according to GitHub’s status log, when administrators began inspecting “connectivity […]
Get up to speed on the day’s top news.
The names of various prominent figures appearing in the data base have already been published, some of whom insist they never used the site.