The Business & Technology Network
Helping Business Interpret and Use Technology
S M T W T F S
 
 
 
 
1
 
2
 
3
 
4
 
5
 
6
 
7
 
8
 
9
 
 
 
 
13
 
 
 
16
 
 
 
 
 
 
22
 
 
24
 
 
 
 
 
29
 
 
 

Feed Items

If you agree with me that what RFK Jr. has done at HHS — particularly when it comes to altering vaccine schedules, approvals, research, and access — is bad well, you ain’t seen nothing yet. Kennedy rode Trump’s coattails, building his own Make America Health Again (MAHA) movement on the back of the wider MAGA orgy of fascism Trump has constructed. The MAGA people are generally those who have...
Ctrl-Alt-Speech is a weekly podcast about the latest news in online speech, from Mike Masnick and Everything in Moderation‘s Ben Whitelaw. Subscribe now on Apple Podcasts, Overcast, Spotify, Pocket Casts, YouTube, or your podcast app of choice — or go straight to the RSS feed. In this week’s round-up of the latest news in online speech, content moderation and internet regulation, Mike and Ben...
OpenAI, the maker of ChaptGPT, is rightfully facing widespread criticism for its decisions to fill the gap the U.S. Department of Defense (DoD) created when rival Anthropic refused to drop its restrictions against using its AI for surveillance and autonomous weapons systems. After protests from both users and employees who did not sign up to support government mass surveillance—early reports show...
Laws prohibiting minors from accessing AI-powered chatbots like ChatGPT would violate the First Amendment. But that’s not stopping lawmakers from trying. Senator Josh Hawley has introduced the Guidelines for User Age-verification and Responsible Dialogue Act of 2025 (GUARD Act), which would require AI companies to “prohibit” minors under “18 years of age” from “accessing or using” AI chatbots...
Senator Ron Wyden says that when a secret interpretation of Section 702 is eventually declassified, the American public “will be stunned” to learn what the NSA has been doing. If you’ve followed Wyden’s career, you know this is not a man prone to hyperbole — and you know his track record on these warnings is perfect. Just last month, we wrote about the Wyden Siren — the pattern where Senator Ron...
To completely understand computer security, it’s vital to step outside the fence and to think outside the box. Computer security is not just about firewalls, Intrusion Prevention Systems, or anti-viruses. It’s also about tricking people into doing whatever a hacker wishes. A secure system, network, or infrastructure is also about informed people. The All-in-One Super-Sized Ethical Hacking Bundle...
Every phone is a narc whether you realize it or not. The private sector certainly knows what information a cell phone can divulge and has leveraged the always-on nature of these devices to maximize profitability. The public sector — mainly law enforcement agencies, both local and federal — have caught onto this as well. With court decisions making it less than absolutely clear things like...
We’ve already all seen what the Ellison family’s version of “editorial independence” looks like over at CBS, where contrarian troll Bari Weiss has turned the already very Republican friendly news giant into a safe space for right wing zealots and autocrats. All overseen by a Brendan Carr chosen censor tasked with ensuring the channel always makes Donald Trump happy. As always with authoritarian...
Alright, I think it might be time for a wellness check on the people running Buc-ee’s. I realize that these chain of gas and convenience stores has a strange cult following in the south. I won’t pretend to understand why that is, but whatever. Unfortunately, the company also appears to be run by a bunch of trademark bullying jackwagons. I’ve referred to Buc-ee’s as the Monster Energy of gas...
Who should be directly liable for online infringement – the entity that serves it up or a user who embeds a link to it? For almost two decades, most U.S. courts have held that the former is responsible, applying a rule called the server test. Under the server test, whomever controls the server that hosts a copyrighted work—and therefore determines who has access to what and how—can be directly...