Published inLotus FruitThe Middle-Age Law Behind Net NeutralityOver the past few years, the battle for net neutrality has had a few more ebbs than flows. Here’s a history of the legal theories that…Feb 24, 2020Feb 24, 2020
Published inThe StartupA short history of the laws behind digital privacy in the United StatesFrom HIPAA to SOX, here’s the legal history that undergirds discussions of digital privacy in the US.Feb 24, 2020Feb 24, 2020
Published inLotus FruitQ&A With a Futurist: The Future of How and Where We WorkOriginally published on Spiceworks.Feb 23, 2020Feb 23, 2020
Published inMac O’ClockThe shaky science behind blue light dimmers on our phones and computersWhile companies use carefully parsed language to suggest that features and tools for dimming the blue light on smartphones and computers…Feb 22, 2020Feb 22, 2020
Published inThe StartupHow Data Privacy is Treated Differently in the US and the EUWith the data-sharing framework Privacy Shield now almost three years old and the EU’s GDPR rules in full effect, here’s a look at how the…Feb 21, 2020Feb 21, 2020
The Day Script Kids Broke the Internet: Lessons from the first DDoS Attack for IoT SecurityAs IoT devices continue to proliferate and security concerns rise, here’s what some of the first DDoS attacks can teach us about today’s…Feb 21, 2020Feb 21, 2020
Published inLotus FruitA Not-So-Short History of Electronic VotingAs we close in on the 2020 elections, here’s an in-depth look at the history of electronic voting. Originally published on Spiceworks in…Feb 20, 2020Feb 20, 2020
The first computer virus the FBI cared aboutIn honor of National Cybersecurity Month, we decided to set our sights on the first computer virus to catch the eye of the FBI. First…Feb 20, 2020Feb 20, 2020