Members of the EU Parliament voted to advance the new Copyright Directive, even though it contained two extreme and unworkable clauses: Article 13 (“Censorship Machines”) that would filter everything everyone posts to online platforms to see if matches a crowdsourced database of “copyrighted works” that anyone could add anything to; and Article 11 (“The Link Tax”), a ban on quote more than one word from an article when linking to them unless you are using a platform that has paid for a linking license. The link tax provision allows, but does not require, member states to create exceptions and limitations to protect online speech. —Cory Doctorow @EFF
So it is my belief that 5G will initially be used by industries in constrained, “safe” environments. In these environments, operators and the industries involved will learn what is possible and what the limitations are. Then, if necessary, new requirements can be generated that allow the mobile technology to meet all the needs of the mission critical businesses. If these new requirements are extensive, then it will herald the start of 6G. —David Stokes @LightTalk
The shortage of qualified security analysts is an issue that the IT security industry has been dealing with for years. There is little question that technology tools – from better analytics engines, to increased automation, to artificial intelligence – are seen as methods for dealing with the shortage. But will the fact that artificial intelligence, like its human analog must be carefully trained, limit its ability to help the industry out of its expertise deficit? —Curtis Franklin Jr. @Dark Reading
We finally have a vendor coming out to say that maybe WiFi and not 5G is the answer to IoT connectivity requirements. An SDxCentral report says Broadcom isn’t depending on 5G to open up connectivity, but instead points out that when 4G came along, operators had aspirations of replacing WiFi in buildings, only to come back to WiFi in the end. So, is this an opportunistic play on Broadcom’s part, or maybe even the start of new realism? The concept of the “Internet of things” has an inherent imperfection in the definition of both “Internet” and “things”. —Tom Nolle @CIMI
Finding logic errors is simply a people management issue, in an era where good cybersecurity talent is hard to find. At a basic level, developing secure code is the responsibility of the team that wrote the code. But at a higher level, it’s up to executives to institute processes and gather resources to give development teams the time and resources to uncover these issues. —Jerry Gamblin @Dark Reading
Android’s security model is enforced by the Linux kernel, which makes it a tempting target for attackers. We have put a lot of effort into hardening the kernel in previous Android releases and in Android 9, we continued this work by focusing on compiler-based security mitigations against code reuse attacks. —Sami Tolvanen @Google
Related