Data

Digital Borders: The Biden Administration’s Final AI Rule
In the final stretch of President Joe Biden’s tenure, the administration unveiled the “Regulatory Framework for the Responsible Diffusion of Advanced Artificial Intelligence Technology.” Announced by the Department of Commerce’s...

New U.S. Trade Policy Will Empower China’s Tech Takeover
As the global economy grows increasingly digital, official U.S. trade policy is apparently reverting to analog. In a confounding decision at the recent World Trade Organization (WTO) talks, the United...

JADC2: How the Army Is Making Data a Weapon of War
For decades, the U.S. military has been experimenting with technologies designed to network the joint force in real-time across multiple domains, using satellites, software-programmable radios, datalinks, and wireless computer interfaces....

Google Fiber Turbocharges Internet Speeds With New Plans
The last year has seen a significant revival of Google Fiber. The service was launched in 2010, offering some of the fastest internet ever up until that time. However, it...

Samsung and Comcast Team Up on 5G Coverage
Samsung Electronics and Comcast announced on Thursday that they have teamed up on 5G Radio Access Network (RAN) solutions for the Xfinity Mobile and Comcast Business Mobile business segments. “Our...

How Cyber and Tech Will Shape Great Power Competition
Both cyber and tech are playing an increasingly prominent role in debates about American national security. To what extent will they influence a new era of great power competition with...

A ‘Hose’ of Data? Twitter Agrees to Give Musk Access to Company Data
After Elon Musk threatened first on his Twitter account, and later in a letter from his lawyers, to back out of his deal to acquire Twitter unless the company supplied...

How AI-Powered Data Will Become Every Army Commander’s Wingman
Information is now considered a full-fledged weapon of war due to recent technological breakthroughs in artificial intelligence (AI), high-speed computing, and secure networking technologies, all of which are now shaping...

Are Hacktivist Data Dumps Helping Ukraine?
The Russian invasion of Ukraine on February 24 set off a global onslaught in cyberspace that is overwhelmingly targeting Russian government infrastructure, private companies, and individual Russian citizens. While the...

Cloud Security Confusion: Which Frameworks Actually Help?
Cloud security is not easy to explain. There are cloud security frameworks that help organize what cloud security should be or what it should not be. But there are also...

How China Will Dominate the Global Competition Over Data
Beijing launched its field of dreams for data—the Eastern Data Western Computing project—on February 17. It is still in the headlines in China, but it hardly made the news here....

General Van Ovost Plans to Weaponize Cargo Aircraft
Here’s What to Remember: We have to change the way we think about what we do. As platforms that deliver food, water, ammunition, forces, and weapons into high-risk forward warfare locations,...