Are application program interfaces (APIs) “original expression” that copyright law protects from unauthorized implementations in computer program code? Or are they too functional to be within the scope of protection that copyright law provides to computer programs? Alternatively, should it be fair use for unauthorized persons to reimplement APIs in independently written code? —Pamela Samuelson
More than 9 in 10 senior IT decision makers across the UK believed when they started their journey to the cloud, it would simplify operations, increase agility, reduce costs and provide greater insight into their data. However, of those that felt the promise of public cloud had not been realised, 95% believe it is because their data is greatly fragmented in and across public clouds and could become nearly impossible to manage long term, according to a global survey of 900 participants commissioned by Cohesity for Vanson Bourne. —Abigail Opiah
Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didn’t exactly name those responsible, but said it believes the offending vendor uses the nicknames “Yehuo” or “Blazefire. —Krebs on Security
Economists at the University of Tennessee at Chattanooga and Oklahoma State University conducted a study that correlates broadband speeds to unemployment. They concluded that unemployment rates are 0.26% lower in counties with faster broadband. They further concluded that broadband has a bigger impact on jobs in rural areas than in metropolitan ones. —Doug Dawson
To address the many issues in enterprise messaging security, the Internet Engineering Task Force (IETF) is building the MLS group messaging protocol. Its goals for MLS differ from those of pairwise protocols: it aims to allow practical groups up to 50,000 clients, cover multiple industry use cases including federation and Web browser support, and offer formal security guarantees. —Kelly Sheridan
A Raspberry Pi (RPi) can even be turned into a server for virtual private networking (VPN). One of the many things you can tinker with on an RPi is data communications; this is one reason why they are often called “Swiss Army knives for hackers”—and not necessarily the malicious kind. —Sam Bocetta
Related