Tom Wheeler
Coronavirus, campaigns, and connectivity
If we have to suspend or otherwise modify political campaigning because of coronavirus, social media will become even more important and the fissures it creates even more painful. We should expect the platform companies such as Facebook and Google to step up to this national emergency—but can we?
Moving from ‘secret sauce’ to open standards for 5G
Back in 2011 Marc Andreesen famously observed, “Software is eating the world.” Fifth-generation wireless technology is part of that evolution. Amidst all the hype about 5G, what makes it different is the simple reality that it uses software to virtualize activities that were once performed by function-specific pieces of hardware. Huawei would be disadvantaged if telecommunications networks threw off their old ways and began to think like Google and other digital-age companies.
Technology, tribalism, and truth
The internet was supposed to be the great gift to democracy because everyone would be free to express themselves without the interference of editors or other filters. Instead, the business model of the internet—collecting and manipulating personal information to sell targeting services—has created the tool for attacking the democratic imperative to seek Unum. Our foreign adversaries have proven especially talented in exploiting this capability.
Placing a visible hand on the digital revolution
As we enter the third decade of the 21st century—the digital century—it is time for the public interest to reassert itself. Thus far, the digital entrepreneurs have been making the rules about the digital economy. Early in this decade, We the People must reassert a visible hand on the tiller of digital activity. Will public policy intervene to protect personal privacy? Can our leaders act to preserve the idea of a competition-based economy?
Going backwards in the “race for 5G”
The collision of corporate opportunism and Republican anti-government orthodoxy has pushed the United States backwards on the allocation of important spectrum for fifth-generation wireless networks (5G).
Can social media “targetcasting” and democracy coexist?
Since the time of the early advertising-supported newspapers, economic incentive has worked to bring people together around a common set of shared information. Maximizing ad revenue meant offending as few readers as possible by at least attempting a balanced presentation of the facts. The search for balance began to retreat with the arrival of cable television, but the economic model of maximizing revenue by maximizing reach still governed. The targeting capability of social media algorithms, however, has extinguished the traditional economic model.
Putting corporate America’s new ‘stakeholder’ principles to work in regulatory policy
Too often, the corporate response to regulation has not been “what’s best for all stakeholders,” but “what’s best for the CFO (Chief Financial Officer).” The lobbying refrain sounds like this: “because regulation could hurt profits, it will hurt our ability to invest and innovate and therefore hurt the public interest.” You hear this from Big Pharma’s television ads. Broadband networks used the argument to kill net neutrality.
The Presidential Candidates Need a Plan for Big Tech That Isn’t “Break Up Big Tech”
What is the agenda that provides hope and opportunity for Americans in a new digital-based economy? So far, much of the campaign focus on the new economy has been reduced to a misleadingly simple “break ‘em up!” solution for Big Tech.
California Will Have an Open Internet
At present, 34 states (and the District of Columbia) have introduced some kind of open internet legislation.
Why 5G requires new approaches to cybersecurity
5G will be a physical overhaul of our essential networks that will have decades-long impact. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates much like the current upgrades to your smartphone. Because of the cyber vulnerabilities of software, the tougher part of the real 5G “race” is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.