The Federal Communications Commission voted Feb. 26 to codify new net neutrality regulations for wireless and wireline networks that would bar blocking and throttling of content and ban carriers and ISPs from striking deals with content companies to zip their content faster to consumers.
Two new online tools can help U.S. mine operators, miners, government officials and others better monitor infractions and violations, including those commonly associated with mining deaths, the U.S. Mine Safety and Health Administration announced Feb. 25.
The study examined the People's Liberation Army, or PLA, weaknesses in the areas of human capital and organizational areas, defense research and industrial complex, and combat areas at on land, sea, air, space, cyber and electromagnetic regions.
United Nations peacekeeping missions are "well behind the curve" when it comes to using technology to establish situational awareness, carry out mandates and protect themselves.
White House Cybersecurity Coordinator Michael Daniel warned against cyber information sharing just for the sake of sharing. It's important that the sharing actually achieves something, he said.
Grant has been serving as the director for the National Strategy for Trusted Identities in Cyberspace program office since it was stood up in 2011.
In his new role, Patil is expected to help shape policies and practices on U.S. technological innovation, forge partnerships to help the nation get the most on its investments in data, and recruit and retain talent in data science to help serve the public.
President Obama signed an executive order Feb. 13 that aims to enable private sector companies to better share cybersecurity threat information with each other and government.
The National Institute of Standards and Technology plans to fund more identity solutions through a fourth round of grants to pilot real-world implementation of the White House's National Strategy for Trusted Identities in Cyberspace, or NSTIC.
The White House last week released a generally upbeat interim report detailing progress in implementing privacy protections around the ever-increasing collection, use and storage of big data.