|Unfortunately for the companies developing these devices, they’ve yet to demonstrate a device that accurately and consistently senses broadcast and wireless microphone signals. The development of these devices is absolutely crucial to the white space debate. If they can’t sense signals, they are essentially useless bricks.
Shelly Palmer, White Space – A Big White Lie
Thanks to Alex Howard for finding today’s “Overheard” quote!
|According to a study by the Pew Internet & American Life Project, released in July, only 38% of rural American households have access to high-speed Internet connections.
Arik Hesseldahl, Bringing Broadband to Rural America
Comcast is constantly looking for where to expand, and looks for areas that have at least 25 homes per one-mile stretch while meeting other criteria, says company spokeswoman Terri Weldon. “We are in business to make a profit,” she says.
Today’s WhatIs.com Word of the Day is white space device.
|For those people that aren’t HVAC engineers, Phase Cooling involves using a refrigeration compressor to compress a gas till it changes phases to a liquid. This liquefied gas is then pumped into an evaporator which is place on your processor/GPU. While inside the evaporator, the liquefied gas changes phases back to a gas, and while doing this it sucks up heat and gets pulled back into the compressor, completing the cycle.
Chris Morrell, Vapor Phase Change Cooling
|The goal of Azure is to provide developers who want to write applications that run partially and/or entirely in a remote datacenter with a platform and set of tools.
Mary Jo Foley, Microsoft’s Azure cloud platform: A guide for the perplexed
Ok. So Azure isn’t all that new. It’s just Red Dog with a new name?
|According to official specifications, USB 3.0 will officially be known as SuperSpeed USB and carry with it a whopping bandwidth of 5 Gbps, which is roughly 1 CD’s worth of data (650 MB) per second.
Tuan Nguyen, SuperSpeed USB More Like HalfSpeed
Ok now it makes sense that Apple ditched FireWire.
|Sorry, Mr. President. Please surrender your BlackBerry.
Jeff Zeleny, Lose the BlackBerry? Yes He Can, Maybe
In addition to concerns about e-mail security, he faces the Presidential Records Act, which puts his correspondence in the official record and ultimately up for public review, and the threat of subpoenas. A decision has not been made on whether he could become the first e-mailing president, but aides said that seemed doubtful.
It makes sense, but it still surprised me. How ironic! Now that he finally gets to work from home, he’ll be the only Dad in the country who can’t text message his kids when it’s time for dinner.
|In print and TV, we see a range of models for divvying up the cost of getting content to the audience—from paid infomercials to ad-supported programming to premium channels—and it’s never quite clear why the same shouldn’t pertain to online.
Julian Sanchez, Is government regulation needed to ensure net neutrality
Because President-elect Obama is in favor of net neutrality, it’ll be interesting to see who he picks for the FCC and whether Obama will endorse Senator Byron Dorgan’s net neutrality bill.
The controversy that surrounds net neutrality laws reminds me a little of what happened with the Equal Rights Amendment back when I was in college. The question then was “Do we really need an equal rights ammendment to the constitution or does the Bill of Rights already provide the legislation we need?
It’ll be interesting to see whether the “new” FCC thinks they can govern effectively with the legislation they already have on the books.
|The Microsoft Operations Framework? I call it ITIL-lite. Same idea of a set of best practices but without the increasing complexity of ITIL.
Niel Nickolaisen, sharing advice from a colleague in the tech tip The Real Niel: ITIL versus MOF
|Elite cybergangs can no longer make great money stealing and selling personal identity data. Thousands of small-time, copycat data thieves have oversaturated the market, driving prices to commodity levels. Credit card account numbers that once fetched $100 or more, for instance, can be had for $10 or less.
Gunter Ollmann as quoted in Internet thieves make big money stealing corporate info
The most fertile turf: AOL, Yahoo and MSN instant messaging; YahooMail, HotMail and Gmail; and MySpace and FaceBook, the free tools that on any given day you’ll find open on millions of workplace PCs. The most coveted loot: e-mail address books, instant-messaging buddy lists, PowerPoint slide presentations, engineering drawings, partnership agreements, price lists, bid proposals, supply contracts, executive e-mail exchanges and the like.
USA Today has put together an interesting overview on where the dollars are today in cybercrime. Gunter Ollmann is the chief security strategist at IBM ISS, IBM’s tech security division.
|International Business Machines Corp. said it has been hired to work with rural electricity cooperatives to provide high-speed Internet service over power lines. The project is a sign that using the electricity grid for communication — a technology utilities have long been interested in — has finally matured.
William M. Bulkeley, IBM Hired to Develop Power-Line Broadband
The system works by using standard power lines to carry a radio-frequency signal in the magnetic field that surrounds the wires. The signal is continuously amplified by low-priced repeater boxes clamped to the lines. When an electricity customer signs up for broadband services, the supplier mails out a special modem that is plugged into the wall outlet where the computer is plugged in.
UPDATE 8-03-09: IBM IBM and an ISP called International Broadband Electric Communications announced they have begun to establish broadband over power line (BPL) networks for nearly 200,000 rural customers served by 7 electrical cooperatives in Alabama, Indiana, Michigan and Virginia.