Featured Posts
Blog
An easy win possible on affordability for California regulators
Whether “affordability” is a serious policy prescription or just a campaign buzzword remains to be seen, but California’s Public Utilities Commission has a golden opportunity…
Blog
Congress needs to curtail the FCC’s public interest authority
How do we know when a broadcaster is acting in the “public interest”? Under current law, the answer is simple: when the Federal Communications Commission…
Blog
It’s time to kill the equal time rule
While the Federal Communications Commission (FCC) is commendably repealing many outdated regulations, one major form of broadcast content regulation stubbornly remains: the “equal time”…
Search Posts
News Release
The Open Internet and Lessons from the Ma Bell Era
Washington, D.C., August 19, 2010 — Earlier this week, The Daily Show’s Jon Stewart summed up the debate over net neutrality by stating, “On one…
Newsletter
Kagan Confirmed, Ford Motor’s Finances and Critiquing Obama’s Economic Policy
The U.S. Senate confirms Elena Kagan to be the next member of the Supreme Court. President Obama announced a $250 million government loan to Ford…
Op-Eds
Before Net Neutrality Eats the World
The Federal Communications Commission has called off closed-door talks with tech lobbyists, talks meant to iron out a government driven compromise on “net neutrality.”…
Newsletter
A Beer Stimulus, Comcast Merger Questions and Urban Beekeeping
A proposed “Beer Stimulus Bill” would reduce the federal excise tax that small brewers must pay. Yesterday lawmakers conducted a field hearing questioning “Who Benefits?”…
News Release
Let Comcast-NBC/Universal Merge
Tomorrow the House Energy and Commerce Subcommittee on Communications, Technology and the Internet will conduct a field hearing questioning “Who Benefits?” from the proposed…
Citation
Wayne Crews on Cybersecurity and the Presidential “Kill Switch”
Competitive Enterprise Institute Director of Technology Studies Wayne Crews discusses the need for a decentralized and competitive approach of cybersecurity.