October 2013

The Case for Computer-Based Health Care

The prophecy of venture capitalist and Silicon Valley investor Vinod Khosla: computers will replace 80 percent of what doctors do in a couple of decades.

The shift could counter another health-sector trend: stagnant productivity, which the Affordable Care Act aims to address with financial incentives for effective, efficient care. Between 1990 and 2010, productivity in the health care sector declined by 0.6 percent annually as employment increased by 2.9 percent, according to Robert Kocher, now a venture capitalist at Venrock, in an October 2011 editorial in the New England Journal of Medicine. Increasing productivity might bridge this disconnect, and computers could be part of the solution. Khosla, who supports the move to computer-based health care, notes the human frailties that weaken doctors' diagnoses and treatment: The brain is biased, forgetful, and limited. As a result, diagnoses are often inconsistent.

F# wants to turn banner ads into web radio stations

New York-based ad tech startup F# wants you to stop hating banner ads -- and it has a pretty clever idea to make those despised ad units more interesting: The company, whose name is pronounced like the musical note F-sharp, wants brands to turn their banners into web radio stations and on-demand music players.

Imagine pre-listening an album when you browse a music or lifestyle site, or tuning into a game day mix while reading up on the next Super Bowl. F#’s AdPlayer, which launches on Oct. 16, 2013, looks like a regular ad unit, but it features a play button, allowing users to launch a music stream while they’re reading a story on a website or browse through their Facebook timeline.

The politics of tech transparency: industry reports offer openness -- and confusion

The tech industry, facing a backlash over an ongoing surveillance scandal, is making up for lost time.

Recently, companies like Facebook have clamored into court waving civil liberties banners in the hopes of persuading the media -- and their users -- that they’re serious about transparency and standing up to surveillance. While this is good news for privacy advocates, the companies’ push to include more data in so-called “transparency reports” has also become a public relations exercise, and led more companies to put out a mish-mash of data that makes it harder to tell signal from noise. Sources at several tech firms, meanwhile, have acknowledged that the transparency push has become politicized.

The revelations about PRISM triggered a global debate about privacy, but also put the tech firms in the crosshairs of critics who claimed they had sold out their users to the US government. In response, some firms that had once shunned discussions of surveillance began to come out with request data of their own; in September 2013, Facebook and Yahoo published Transparency Reports for the first time.

Keep Your Mitts Off the Internet

[Commentary] Pick your poison: Do you more object to Big Government or Big Business? After all, neither of those two institutions gives us much reason these days to be particularly comfortable.

And the collision, and need for choice, is staring us in the face when it comes to the Internet where the Federal Communications Commission, the keeper of our electronic media, is squaring off against the mega-companies -- Time-Warner, Comcast, Verizon -- that bring both television and Internet to most American homes. Time-Warner says -- in a lawsuit working its way through the federal courts and likely headed to the US Supreme Court -- that the FCC, which oversees telecommunications policy, does not have jurisdiction over the International Network of Connected Computers that has become our World Wide Web of information. The Internet is private, not public, they insist, and keep your governmental hands off private property. From a First Amendment perspective, this makes a lot of sense, unfortunately. The First Amendment guarantees that the government can't tell private people how they can speak (short of restraining threats to national security, incitements to violence and obscenity). So, the government does not have the right to rule the Internet, unless we somehow decide that all those various connectors and Internet lines can be viewed as public property or in a manner similar to the electric utilities which operate without competition but are tightly regulated. It is an alluring proposition.

I, for one, do not want the FCC meddling with the wildly anarchic and often very democratic discourse that takes place online. On the other hand, I don't trust the Time-Warners; they will act the way corporate behemoths always act. If it is in their political and economic interest, they will find a way to muffle voices that threaten them. If I am picking my poison, I'll go with the government's FCC. Keep it simple. The Internet providers simply cannot regulate content. Everyone will remain in the same lane -- from the White House to General Electric to the little guy whose web site says he hates Time-Warner.

[Robert Miraldi is Professor of journalism, SUNY New Paltz]

America's High Schools Aren't Encouraging Enough Students To Become Cyberspies

One of America's biggest defense contractors says high schools are failing to steer students toward jobs in cybersecurity. A new survey by Raytheon and Zogby Analytics found that, out of a thousand 18- to 26-year-olds, 82% were never told in high school they could pursue cybersecurity jobs.

The study added that, "as career opportunities in science, technology, engineering and math (STEM) fields intersect with those in the cyber realm, the demand for students and young professionals in these burgeoning fields shows no signs of waning. In fact, according to the Bureau of Labor Statistics, network systems and information security professionals can expect job opportunities to grow by 53 percent through 2018." In other words: Cybersecurity and cyberdefense are big job growth areas and high schools aren't keeping up.

Regulatory capture and Obamaphones

[Commentary] Amidst the 24/7 coverage of the government shutdown, 44 Republican representatives attracted a few headlines with a brief letter. The letter, sent to the Federal Communications Commission, takes issue with the Lifeline or “Obamaphone” program. Respectfully, I must disagree -- or must at least quibble -- with the congressmen.

That the program is rife with fraud is well reported. That oversight of the program has been lax is also without much dispute. But I do not believe the Lifeline program is indicative of all that is wrong with DC; rather, it is merely demonstrative of the predictable and seemingly inevitable result of industrial regulation, namely, that it is in the regulator’s self-interest to protect the health of the industry even if such protection does not increase the general welfare. This is a phenomenon often called “regulatory capture.” Through the lens of regulatory capture, it becomes clear that the problem with the Lifeline program is less a problem of an “entitlement culture” than it is a problem of the administrative state. Even under an austere administration, the regulator’s predilection to extend favors to special interests would still exist -- regulated programs grow because encouraging such growth is at the heart of regulation itself.

[Babette Boliek is an associate professor of law at Pepperdine University]

Judge Won't Lift FilmOn X Injunction

US District Judge Rosemary Collyer won't modify her near-nationwide injunction against Alki David's FilmOn X.

The NSA's New Code Breakers

There was a time when the code breakers of the National Security Agency actually took the lead in solving enemy encryption systems. In today's NSA, it's hackers, break-in artists, corporate liaisons, and shadow salesman using front companies who are at the forefront of this effort. Even so-called "hacktivists" play an unwitting role in helping the NSA gain access to computer networks -- both hostile and friendly.

Just about the only place that's somewhat immune to the NSA's new style of code-breaking attacks? North Korea, because it's so disconnected from the rest of the world's networks. Former US intelligence officials confirm that the more than 1,500 cryptanalysts, mathematicians, scientists, engineers, and computer technicians who comprise NSA's elite cryptanalytic unit, the Office of Cryptanalysis and Exploitation Services (S31), have had a remarkably large number of code-breaking successes against foreign targets since the 9/11 attacks. The NSA today has more supercomputers than ever, and the agency still employs a number of puzzle-solvers, linguists, and math geeks. Interviews with current and former intelligence officials conducted recently have revealed that since 9/11, the NSA's computer scientists, electronic engineers, software programmers, and collection specialists have been remarkably inventive in finding new and innovative ways to circumvent the protections supposedly offered by encryption systems by compromising them through clandestine means, such as inserting “back doors” into commercially available technologies.

A piracy defense walks the plank at the Post

[Commentary] There are many problems with Timothy B. Lee’s Washington Post blog post on Hollywood’s supposed culpability for the theft of its own movies, beginning with the morally unserious jujitsu deployed in arguing that Hollywood is culpable for the theft of its own movies.

The Mercatus- and Cato-connected editor of the Washington Post tech blog that aims “to be indispensable to telecom lobbyists and IT professionals alike, while also being compelling and provocative to the average iPhone-toting commuter” also had a major correction that undermines the entire premise of the piece and reveals its one-sided reporting. Here’s the thing: If you make a movie, you should be able to sell it however you see fit, not however free-Internet types see fit. Perhaps how you decide to sell it will not be the best way you could sell it. That doesn’t in any way excuse tech companies from aiding theft via piracy, much less the people doing the actual pirating. People steal pirated movies largely because they’d rather not pay for something they don’t have to pay for, and because the consequences of breaking the law are almost nonexistent. It’s not very complicated.

October 16, 2013 (FISA Court: We Approve 99 Percent Of Wiretap Applications)

BENTON'S COMMUNICATIONS-RELATED HEADLINES for WEDNESDAY, OCTOBER 16, 2013

For updates all day long, follow us on Twitter @benton_fdn


GOVERNMENT & COMMUNICATIONS
   FISA Court: We Approve 99 Percent Of Wiretap Applications
   Tech titans’ muted response on NSA data mining
   Latest NSA revelation is black eye for Yahoo
   The NSA’s giant Utah data center will probably hold a bunch of spam
   Busting China’s Bloggers - op-ed
   Europeans Are Faulted Over Using Funds to Support Like-Minded Voices

PRIVACY
   How Edward Snowden is nudging our privacy desires
   Aaron Swartz’s last gift to journalism and online privacy finds a new home
   Think You Can Live Offline Without Being Tracked? Here's What It Takes [links to web]

INTERNET/BROADBAND
   The Internet Is a Universal Human Right. Just Ask the Homeless
   High-capacity Broadband and E-rate: Libraries as Community Leverage - op-ed
   Google Fiber now explicitly permits home servers [links to web]
   Government shutdown raises cybersecurity concerns [links to web]

WIRELESS/SPECTRUM
   German researchers smash wireless speed record [links to web]
   What a 100 G Wireless Personal Area Network Could Mean for Telecom [links to web]
   Watch out AT&T: Verizon’s new LTE network monster stirs in NYC [links to web]
   Why FirstNet Needs State CIOs [links to web]

MEDIA AND CHILDREN
   Microsoft encourages Internet use for kids

CONTENT
   Here’s why it’s legal for Google and Facebook to use your face in ads - analysis
   Does Hollywood have itself to blame for its piracy problems? [links to web]
   Our tweets are getting shorter [links to web]
   The Money Is in the Email [links to web]

TELEVISION
   Many in San Joaquin Valley look for free alternative to costly cable, satellite TV [links to web]

HEALTH
   Major challenges looming for health IT leaders [links to web]
   Need to Talk to a Doctor, Pronto? Now There’s an App for That, Too. [links to web]

STORIES FROM ABROAD
   EU Telecoms Chief Kroes: Reform Package Can Be Finished by May
   AT&T Could Struggle to Roam in Europe - analysis
   Busting China’s Bloggers - op-ed
   Europeans Are Faulted Over Using Funds to Support Like-Minded Voices
   Labor’s NBN plans too ambitious: Conroy

MORE ONLINE
   A Day to Remember the First Computer Programmer Was a Woman [links to web]

back to top

GOVERNMENT & COMMUNICATIONS

FISA COURT: WE APPROVE 99 PERCENT OF WIRETAP APPLICATIONS
[SOURCE: National Public Radio, AUTHOR: Larry Abramson]
A letter released by a special surveillance court clears up some misconceptions about legal oversight for government wiretap activities. Responding to a letter from Senate Judiciary Committee Chairman Pat Leahy (D-VT) and ranking member Charles Grassley (R-IA), the Foreign Intelligence Surveillance Court says, yes, it's true, we do approve 99% of all wiretap applications. But for the first time, the FISC also says that it demanded changes to 24.4 percent of those applications before granting final approval (that's for a recent three-month period). This is the court's way of saying, we are not a potted plant -- or a rubber stamp, as some have alleged. We are reading these applications closely, and pushing back where appropriate. But the letter also shows that the court could also be accused of operating hand in glove with government lawyers making these requests.
benton.org/node/161968 | National Public Radio
Share: Twitter | Facebook
back to top


RESPONSE TO NSA DATA MINING
[SOURCE: Politico, AUTHOR: Tony Romm]
Another leak from Edward Snowden. Another flood of denials from the tech titans required to assist the National Security Agency. And another round of statements, from Silicon Valley and beyond, that sidestep the real issue at hand. Google, Microsoft, Facebook and Yahoo are veritable warehouses for some of the data the National Security Agency desires as it investigates foreign terror suspects, but they’ve not come out swinging publicly on Capitol Hill for specific limits on what the agency can collect — even as those companies have deployed their big-bucks lobbying and legal shops in a bid for more transparency. The contrast again was evident a day after Snowden’s documents helped The Washington Post determine the NSA is snapping up Web users’ contact lists. Google, Facebook, Microsoft and Yahoo said they had no knowledge of the program, but each still stopped short again of asking for any substantial changes to federal law. The companies also didn’t name any new restrictions they’d back on the NSA’s collection practices — a muted response that speaks volumes at a time when Congress is at the drawing board on surveillance reform.
benton.org/node/161976 | Politico
Share: Twitter | Facebook
back to top


LATEST NSA REVELATION IS BLACK EYE FOR YAHOOO
[SOURCE: USAToday, AUTHOR: Alistair Barr]
The latest revelation that the National Security Agency collected millions of contact lists from the leading online messaging services is a particular black eye for Yahoo, security and privacy experts said. During a single day last year, the NSA's Special Source Operations branch collected 444,743 e-mail address books from Yahoo, 105,068 from Microsoft's Hotmail, 82,857 from Facebook, 33,697 from Google's Gmail service and 22,881 from unspecified other providers, the Washington Post reported. Those figures, described as a typical daily intake, correspond to a rate of more than 250 million a year, the newspaper added, citing an internal NSA presentation leaked by former NSA contractor Edward Snowden. The NSA may collect so many more address books from Yahoo than other big services because Yahoo, unlike those other providers, has left connections to its users unencrypted by default, the Washington Post said.
benton.org/node/161967 | USAToday
Share: Twitter | Facebook
back to top


THE NSA’S GIANT UTAH DATA CENTER WILL PROBABLY HOLD A BUNCH OF SPAM
[SOURCE: Washington Post, AUTHOR: Brian Fung]
The National Security Agency's data-collection activities are so resource-intensive, the agency can't complete its new server farms fast enough. But when it does, a significant share of what gets held on those servers could wind up being worthless spam. We now know the NSA collects hundreds of thousands of address books and contact lists from e-mail services and instant messaging clients per day. Thanks to this information, the NSA is capable of building a map of a target's online relationships. Sometimes, however, that process goes awry -- such as when one Iranian e-mail address of interest got taken over by spammers. Such incidents have caused huge amounts of unimportant information to flow through the NSA's systems, according to a chart in a top secret NSA presentation. Every day from Sept. 11, 2011 to Sept. 24, 2011, the NSA collected somewhere between 2 GB and 117 GB of data concerning this Iranian address. The exact numbers aren't clear because details of the chart have been redacted.
benton.org/node/161965 | Washington Post
Share: Twitter | Facebook
back to top

PRIVACY

HOW EDWARD SNOWDEN IS NUDGING OUR PRIVACY DESIRES
[SOURCE: USAToday, AUTHOR: Byron Acohido]
Market research company Lab42 released results of a study in which 54% of respondents said they desire more privacy at the risk of government security. "With the recent NSA leaks making headlines, consumer awareness toward their digital privacy is at an all-time high," said Jonathan Pirc, Founder of Lab42. The reason the National Security Agency has sought out information about our interests, acquaintances and preferences -- which we so freely divulge in search engines, social web sites and mobile web apps -- is elementary: the data exists. And the reason it exists is to support the online advertising industry which, led by Google and Facebook, is expected to generate record revenues topping $40 billion this year, according the Interactive Advertising Bureau, But Lab42's survey also shows that the intensive online tracking of US consumers online behaviors, carried out ostensibly to deliver more relevant ads, quite often delivers ads no one really cares about. While Google and Facebook may prefer that the online advertising ecosystem remain as is, with the rich getting richer, there are dozens of smaller players in the advertising industry that have adopted a more Europe-like approach to giving consumers control of their privacy information and earning consumer trust.
benton.org/node/161962 | USAToday
Share: Twitter | Facebook
back to top


AARON SWARTZ’S LAST GIFT TO JOURNALISM AND ONLINE PRIVACY FINDS A NEW HOME
[SOURCE: Washington Post, AUTHOR: Andrea Peterson]
Before Aaron Swartz's suicide in January, he had nearly completed work with Wired's Kevin Poulsen on a secure system to accept messages and documents from anonymous sources over the Internet. The result of that effort was DeadDrop, an open-source python platform. The system assigns each source a unique code name so that a relationship can be established without news organizations ever knowing the source's identity. The Freedom of the Press Foundation announced it will be taking over the project, renaming it SecureDrop and providing on-site installation for news organizations along with ongoing technical support. Trevor Timm, the executive director of the Freedom of the Press Foundation, said that the anonymity made possible by the project is all the more important in light of recent NSA revelations and prosecutions against whistleblowers, which he believes "have shown the grave challenges to this relationship and the lengths governments will go to undermine it."
benton.org/node/161964 | Washington Post
Share: Twitter | Facebook
back to top

INTERNET/BROADBAND

THE INTERNET IS A UNIVERSAL HUMAN RIGHT. JUST ASK THE HOMELESS
[SOURCE: Wired, AUTHOR: Daniela Hernandez]
Roughly 50 percent of people making less than $25,000 a year doesn’t have access to the Internet, according to a May 2013 US Census Bureau report on computer and Internet trends. The Tech Lab aims to change that -- at least in San Francisco -- and others are doing the same in other parts of the country. Darrell Pugh is an instructor at the Tenderloin Technology Lab. The five-year-old operation offers free Internet access six days a week as well as basic computer skills classes and workshops on blogging, photo editing, social media, and even entrepreneurship. The lab is part of a growing movement where nonprofit organizations are using computers, mobile devices, the Internet, and even digital currencies to help improve the plight of the country’s poor and homeless, nudging them towards new jobs, new homes, regular healthcare, and other things most people take for granted. Instructors at the People’s Emergency Center in Philadelphia are helping the underprivileged in similar ways, and in Pensacola, Florida, Jason King -- the founder of an organization called Sean’s Outpost -- is giving the local homeless a leg up by showing them the ins and outs of Bitcoin, the world’s most popular digital currency. Not everyone sees the value of places like the Tech Lab and People’s Emergency Center in Philadelphia. Tan Vu — the director of digital inclusion and technology at the People’s Emergency Center — says it’s often hard to convince donors that the center’s mission is worthwhile. “We are actually struggling to have more money to continue our efforts than before,” he says. “There’s not enough recognition of how much certain parts of society need these kinds of services.”
benton.org/node/161955 | Wired
Share: Twitter | Facebook
back to top


HIGH-CAPACITY BROADBAND AND E-RATE: LIBRARIES AS COMMUNITY LEVERAGE
[SOURCE: Benton Foundation, AUTHOR: Alan Inouye]
[Commentary] Broadband, especially of the high-capacity variety was once mostly the province of network engineers and large organizations. Now it is everyone’s concern. For libraries, this need and expectation for speedy Internet response is even more pronounced. A single broadband connection to one library provides access for thousands of people over the course of a year. And with these Internet connections come the full range of resources and expertise that libraries and librarians offer. Bolstering broadband investment in libraries is truly a fabulous way to leverage scarce community and national resources and support local economies. The open proceeding on the E-rate program at the Federal Communications Commission (FCC) and the President’s proposal for a ConnectED initiative are truly exciting developments for the library community. What better way to leverage libraries than building on a successful E-rate program, and make a quantum jump from basic connectivity to high-speed broadband for libraries across the land?
[Alan S. Inouye, Ph.D. is Director of the American Library Association's Office for Information Technology Policy (OITP) in Washington, DC.]
http://benton.org/node/161947
back to top

MEDIA AND CHILDREN

MICROSOFT ENCOURAGES INTERNET USE FOR KIDS
[SOURCE: The Hill, AUTHOR: Kate Tummarello]
Most parents approve of their children using the Internet without their supervision, Microsoft said in a blog post, promoting the benefits of Internet use for young children. According to a new Microsoft survey, “eight years old is the average age at which parents allow independent Internet and device use,” the company wrote. The survey asked parents to identify the age at which they would give their children “unsupervised access to technologies such as mobile devices, social sites and online services.” At 94 percent, “almost all parents … allow their kids to use at least one online service or device,” the company’s Director of Online Safety Kim Sanchez wrote in the post.
benton.org/node/161966 | Hill, The
Share: Twitter | Facebook
back to top

CONTENT

HERE’S WHY IT’S LEGAL FOR GOOGLE AND FACEBOOK TO USE YOUR FACE IN ADS
[SOURCE: GigaOm, AUTHOR: Jeff John Roberts]
Facebook puts your profile picture in advertisements. Google is about to do the same and other sites like Twitter will likely follow one day. How exactly is this legal? What if you don’t want to be in an ad: can the companies use your picture anyway? The short answer is yes. But as to whether any other company can do so, no. This is because under American state privacy laws, there is a “right of publicity” that allows you to control public displays of your image. However, you cannot sue Facebook or Google for using your image because you agreed to this in the terms of service when signing up for an account. The companies also reserve the right to make any changes to their policies from time to time.
benton.org/node/161960 | GigaOm
Share: Twitter | Facebook
back to top

STORIES FROM ABROAD

EU SCHEDULE
[SOURCE: Wall Street Journal, AUTHOR: Frances Robinson]
The European Union can complete its overhaul of telecom regulations by next spring, the bloc's telecom chief Neelie Kroes said, addressing industry doubts that the reforms can pass by May. Kroes, who presented her long-awaited legislative proposals to overhaul Europe's telecommunications industry last month, now faces a tight deadline to get them approved by member states and European countries' leaders. She said there is no alternative to passing the package as a whole, saying Europe will lose three years in its efforts to keep up with other regions if the measures fail to go through. Europe lags behind North America and much of Asia in fourth-generation mobile-phone coverage, which is holding back developments in the digital economy. "Of course we are in a hurry," Kroes said. "We can't afford a delay of three years in the whole sector." The proposals will die unless they are passed before elections for the European Parliament next May, the effective deadline. A new European Commission is due to take office in November 2014.
benton.org/node/161975 | Wall Street Journal
Share: Twitter | Facebook
back to top


AT&T IN EUROPE
[SOURCE: Wall Street Journal, AUTHOR: Miriam Gottfried]
AT&T has set its sights across the pond. But could Europe prove to be a sinkhole? The US telecom giant hasn't officially announced its intention to buy the rest of Vodafone's assets after the London-based company completes a deal to sell its 45% stake in Verizon Wireless to Verizon Communications. But anyone listening to recent public comments by AT&T Chief Executive Randall Stephenson could hardly reach any other conclusion. Stephenson has signaled he would likely pursue heavy investment in wireless networks. That could position AT&T to lead Europe's shift to next-generation LTE technology, where the Continent lags behind the US. Buying Vodafone, which gets more than two-thirds of earnings before interest, taxes, depreciation and amortization from Europe, would also make AT&T less reliant on its increasingly competitive home market. But Europe could prove to be a quagmire. Buying Vodafone now would effectively be a bet that this is as bad as things can get there. Stephenson is also wagering that regulators' desire for investment will get them to lend a hand, perhaps one reason he has been so vocal about his deal-making intentions.
benton.org/node/161974 | Wall Street Journal
Share: Twitter | Facebook
back to top


BUSTING CHINA’S BLOGGERS
[SOURCE: New York Times, AUTHOR: Murong Xuecun]
In August, Chinese authorities launched the most severe round yet in their “campaign against cybercrime.” Ostensibly to curtail online “rumors,” they are rounding up and jailing outspoken netizens across the country. Judging from official media accounts and police reports, the number of arrests is in the hundreds, and many of us believe it may be in the thousands. Meanwhile, the state media have published a steady flow of articles warning microbloggers to tone down their commentaries. It’s easy to see why the government feels threatened. The most popular microblogging service, Sina’s Weibo, has more than 500 million registered members and 54 million daily users, and has become the most important space for citizens to participate in public life — and expose government lies. Microbloggers dare to question the legitimacy of the one-party state. They expose corruption. They shame criminals. And bloggers don’t just express opinions; we act as information hubs. When we discuss issues online, people take notice. The vast state censorship apparatus works hard to keep us down. But posts race through Weibo so quickly that it’s difficult to control them with technology. Hence, the government is resorting to detainment.
benton.org/node/161973 | New York Times
Share: Twitter | Facebook
back to top


FUNDING LIKE-MINDED VOICES
[SOURCE: New York Times, AUTHOR: Andrew Higgins]
During heated wrangling late last year over the size of a new long-term budget for the European Union, Notre Europe, a Paris-based policy group, wanted to make its voice heard. So it put one of its researchers on a small radio station in the French city of Nantes to answer questions and promote its vision of a “more effective” — and bigger — budget controlled by Brussels. The exercise in what appeared to be an energetic public debate had a catch, or two, however. The radio station, it turns out, received more than $100,000 from Brussels last year, according to official European Union records. Notre Europe itself had received more than $650,000 from Brussels last year, nearly half of its total budget. “The whole thing is surreal make-believe: people who get E.U. funding talk about how wonderful the E.U. is, and then lobby for it to get more money,” said Mark Littlewood, director general of the Institute of Economic Affairs, a privately financed research group based in London that is offering $135,000 for the best plan for a British exit from the Union.
benton.org/node/161972 | New York Times
Share: Twitter | Facebook
back to top


LABOR’S NBN PLANS TOO AMBITIOUS: CONROY
[SOURCE: Financial Review, AUTHOR: David Ramli]
The Australian Labor minister most responsible for initiating the national broadband network has admitted the schedule to build the fiber network was too ambitious and his government overestimated the abilities of the construction industry. Stephen Conroy said it was “undeniable” that the company building the network, NBN, missed its targets. “We clearly underestimated and I think it’s fair to say the construction model could be legitimately criticized,” he told an Australian Computer Society event in Sydney. “We wouldn’t have been so aggressive if we’d known how tough it was for the company. So that was an area where we were overly -ambitious.” He said “the failure of the construction industry to mobilize resources” was the main cause of problems.
benton.org/node/161948 | Financial Review
Share: Twitter | Facebook
back to top