August 2015

Soul-Searching in TV Land Over the Challenges of a New Golden Age

John Landgraf’s comments arrived like a thunderbolt. There’s a malaise in TV these days that’s felt among executives, viewers and critics, said Landgraf, the chief executive of FX Networks. And it’s the result of one thing: There is simply too much on television. The glut, he said at a Television Critics Association media event earlier in August, has made it hard to “cut through the clutter and create real buzz” and has presented “a huge challenge in finding compelling original stories and the level of talent needed to sustain those stories.”

On the face of it, the assertion seemed absurd. After all, critics and viewers alike have hailed this as another golden age of television, where shows as diverse and popular as “Game of Thrones” and “Empire” have become an indelible part of the culture, elevating TV from second-class status to a medium attracting top actors and film directors. But Landgraf’s comments were not dismissed as absurd or hyperbolic. Instead, Landgraf ignited a serious conversation, and no small amount of self-reflection, about how much is too much, and whether something is seriously out of whack in TV land.

NTIA to seek consensus on security-vulnerability disclosures

The National Telecommunications and Information Administration (NTIA) hopes to gather security researchers, software vendors and other interested people and reach consensus on the sticky topic of how to disclose cybersecurity vulnerabilities. The first NTIA-hosted meeting will be Sept. 29 at the University of California, Berkeley, School of Law. Registration is open to all who want to participate, and the meeting will also be webcast, NTIA said. Some researchers' public disclosures of previously unknown vulnerabilities has been controversial, with some software vendors complaining the information can help hackers compromise systems before they can be patched. Many researchers believe that public disclosure gives software vendors an incentive to issue patches. But the NTIA sees potential for a consensus to develop, with strong security as the goal, said deputy assistant secretary Angela Simpson. . Participants in the process, not the NTIA, will determine the outcome, she added. "The community holds the pen."

Election 2016: Dumbing down American politics, Lawrence Lessig, and the Presidency

[Commentary] Donald Trump and the Amen chorus of Republican presidential aspirants may have appeared to monopolize the capacity to make fantastical claims about what’s wrong with America and how to fix it. But a rival has appeared on the scene, outlining a very different fantasy plan to run for president on the Democratic side of the aisle. Harvard law professor Lawrence Lessig looks meek -- a dead ringer for Mr. Peepers -- yet is anything but.

Lessig built an impressive career in legal scholarship on the regulation of cyberspace, and the mild-mannered, soft-spoken academic became a cult hero among libertarians fearful of increasing legal restrictions on copyright, trademark and the electromagnetic spectrum. But Lessig’s transformation into a political activist was spurred by his personal revelation that money in politics is the root of all our governing problems. Eliminate the dependence of elected officials on private donors and the formidable obstacles to constructive policymaking will crumble. Simple but searing truth, or a caricature of a complex governing system shaped by institutions, ideas/ideologies, and interests?

United in-flight Wi-Fi reportedly blocks Ars Technica and New York Times

United Airlines' in-flight Wi-Fi service reserves the right to block any website the company deems "inappropriate or unsuitable for in-flight viewing", which includes Ars Technica, The New York Times and some other news sites. Electronic Frontier Foundation staff attorney Nate Cardozo said that he was unable to open any of these sites on United's in-flight Wi-Fi. "Access to this site is currently restricted" is the message Cardozo got when he navigated to Ars, the Times, The Verge, and Daily Kos. United's in-flight Wi-Fi FAQ says the company "does not allow customers to access certain websites that may be inappropriate or unsuitable for inflight viewing," but it doesn't say what guidelines it uses to judge such matters.

United also doesn't support video streaming, a common rule on in-flight Wi-Fi because of bandwidth limitations. There are no legal concerns regarding net neutrality, since the Federal Communications Commission's rules exempt airlines and other premises operators.

Tech Transitions: How Will You Know When You’re Transitioning?

[Commentary] In the previous posts of this series, we’ve referenced Fire Island (NY) a lot, but haven’t gone into detail. Here’s what happened, and why it still matters: In October 2012, Superstorm Sandy struck, and wrought unprecedented damage up and down the East Coast of the United States. The storm devastated many public utilities, leaving people without electricity, water, and phone access. In Fire Island, Verizon responded to the storm’s damage by replacing its landline copper phone and DSL network with a new fixed wireless service called “Voice Link.” This transition was extremely problematic for Fire Island residents.

For years, Public Knowledge has asked the Federal Communications Commission to implement adequate standards for public notification for the tech transitions. This means that even if a portion of the copper network is removed or disabled, the provider is effectively retiring the old network and should go through the necessary regulatory process to do so (including the FCC discontinuance notices we discussed last week). When a network is disabled for a short term, or only partially disabled, this may not significantly impact providers, but it can have a devastating impact on residents and businesses that rely on the network.

Why President Obama Is Testing His Survival Skills on a Reality TV Show

It won't be just White House press corps cameras covering President Barack Obama during his trip to Alaska. NBC announced the commander in chief will trek through the Alaskan wilderness with survival expert Bear Grylls for a special edition of his show "Running Wild". President Obama will meet with Grylls while visiting Alaska to observe the effects of climate change. The president will then get a crash course in survival techniques from Grylls. The visit will be taped and aired on NBC later in 2015.

How ‘democratators’ threaten press freedom

[Commentary] As President Barack Obama arrived in Ethiopia in July, his National Security Advisor Susan Rice was asked if she considered the country to be a democracy. “One hundred percent,” she quipped, referring to the tally in favor of the ruling party in national elections in May. Not everyone was amused.

For the activists and journalists who face harassment, imprisonment, and exile, massive state repression in Ethiopia is no laughing matter. Indeed, while the government of Prime Minister Hailemariam Desalegn released six imprisoned journalists in advance of President Obama’s visit, it was able to effectively deflect criticism of Ethiopia’s human rights record, noting bilateral discussions were focused on trade, security, and entrepreneurship. Rice’s joke was all the more troubling because it strikes at a larger challenge confronting the Obama Administration and its efforts to strengthen civil society and press freedom in Africa. The president’s trip to Kenya and Ethiopia was his fourth to a region where a new generation of autocratic leaders is on the rise. These leaders have earned legitimacy and international support by winning elections. But in office, they govern with contempt for the independent institutions that define a democracy, the media foremost among them. I call these elected autocrats “democratators,” and their influence is hardly confined to Africa.

NPD: 50 Percent Connected TV Penetration in Internet Homes

Reaching a milestone, connected TV devices were in use in half of US Internet homes as of end 2Q 2015, according to the NPD Group Connected Intelligence ¨Connected Home Entertainment Report.¨ There are connected TV devices -- video game consoles, streaming media players, and Blu-ray Disc players -- in a total of 46 million US homes, NPD highlights. The SMART TV industry’s success has been a primary driver of growth. Forty-five percent of TVs sold in the US during 2Q supported apps, according to NPD’s Retail Tracking Service. That’s up from 34 percent in 2014 and 24 percent two years ago. Nearly 70 percent of all TVs with Internet connectivity are actually connected. That’s up from 61 percent last year and 45 percent two years ago.

US Smartphone Users Accessing 9.7 GB in Monthly Wireless Data Usage

Combined data traffic streaming over cellular and Wi-Fi networks exploded between 2H 2013 and 1H 2015, rising over threefold, according to Strategy Analytics’ Telemetry Intelligence Platform. Monthly wireless data usage for US smartphone users averaged 9.7 GB during 1H’15. Only 1.6 GB/month (17 percent of total data) crossed over cellular networks. Digging deeper into the data, Strategy Analytics found that African-Americans accessed more data over wireless networks than any other ethnicity. The US’ second-largest ethnic group, Hispanics didn’t access as much data via cellular networks as African-Americans.

Hackers Up Attacks On Media, Showbiz

Computer hackers’ efforts to penetrate and disrupt media and entertainment networks were up sharply in the quarter that ended June 30, major Internet security company Verisign reported. Media and entertainment companies represented 20 percent of Verisign’s work in the quarter to thwart or minimize attacks such as the 2014 assault on Sony Pictures Entertainment, according to Rapid TV News. Verisign said the largest attack targeted online video services with denial-of-service hacks that flood servers with enormous volumes of phony traffic that can crash even the most powerful servers and grind activity to a halt. The attempt used a massive mix of network-hogging programs that could have severely disrupted traffic if Verisign had not been able to minimize the effectiveness of the attack.