U.S. National Telecommunications and Information Administration - News, Features, and Slideshows
A facial recognition trade group's proposals for privacy standards are an "extreme" departure from U.S. expectations on how personal data should be handled, a privacy advocate said Tuesday.
By Grant Gross | 25 June, 2014 06:27
The freedom and openness of the Internet are at stake after the U.S. government announced plans to end its contractual oversight of ICANN, some critics said Thursday.
By Grant Gross | 11 April, 2014 04:56
A U.S. National Telecommunications and Information Administration plan to end its formal relationship with the Internet Corporation for Assigned Names and Numbers could open the door to Internet censorship by China, Russia or Iran, some U.S. lawmakers said.
By Grant Gross | 03 April, 2014 05:21
The U.S. National Telecommunications and Information Administration will end its formal relationship with the Internet Corporation for Assigned Names and Numbers in late 2015, with ICANN developing a new global governance model, the agency said Friday.
By Grant Gross | 14 March, 2014 22:21
Government-funded broadband projects have led to higher speeds and lower prices for U.S. small businesses, despite opposition from some in Congress, according to an auditor's report.
By Grant Gross | 10 March, 2014 20:27
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.
- Telstra to kill 2G services
- Seafaring robot shrugs off monster Typhoon Rammasun
- Zero-day flaws in Tails aren't for sale, vulnerability broker says
- Apple grows Mac sales by 18 per cent on the back of the MacBook Air
- Rules of engagement needed for the Internet: RSA
- How Nokia both helped and hindered Microsoft's earnings
- Vodafone upbeat on turnaround despite more customer losses
- Five takeaways from the Apple earnings call
- More mobile gadgets than people? Seven countries - including Australia - now qualify
- Apple "inadvertently admitted" to iOS backdoor: forensics expert
- Juniper jettisons mobile security business
- TOR patch coming
- Microsoft revenue lifted by Cloud sales to businesses
- ARM develops second wave of 64-bit processors
- Apple reports a huge profit but sales disappoint