The NCTA argued that Google could also become a common carrier if it wanted to, regardless of what the FCC does. "Google Fiber also could obtain pole attachment rights under Section 224 by choosing to unbundle the transmission component of its broadband Internet access service and operating as a telecommunications carrier subject to the obligations and restrictions of Title II," the NCTA wrote. "However, Google Fiber has declined to submit to Title II regulation in exchange for pole attachment rights—a tacit acknowledgment that the significant burdens associated with Title II would far outweigh any benefits that Section 224 could confer. And if Google Fiber is unwilling to accede to burdensome Title II regulation on its own, it would make even less sense to impose Title II on the entire broadband industry merely to assure Google Fiber of its pole attachment rights." … [Read more...] about Cable lobby says Google Fiber doesn’t need Title II to get pole access
Getting her pregnant
Get lifetime privacy protection with BulletVPN today for less than $40
becoming the hitman Hands-on: Hitman 3 for PSVR shows you can kill the old ways Hitman comes to VR for the first time in Hitman 3 for PSVR. But this isn't just some little standalone game; it's the entirety of Hitman, Hitman 2, and Hitman 3, all playable in VR. … [Read more...] about Get lifetime privacy protection with BulletVPN today for less than $40
Turn your desktop into an invisible wireless charging pad and get a $35 power bank for free
Setting it up is a snap, though; just peel some tape off the UTS-1 and affix it to the bottom of your desk -- it's incredibly lightweight, so there's no need to screw it into the bottom of the desk (though you can if you prefer). Then use the included template to locate the optimum charging location on top of the desk and apply a discrete sticker to mark ground zero for your phone. … [Read more...] about Turn your desktop into an invisible wireless charging pad and get a $35 power bank for free
Google bombs get dismantled
The reason? Some people misinterpret Google bombs as the work of pranksters at the search company itself rather than unaffiliated Web users. That isn't too good for publicity purposes; after all, some Google bombs were more malicious than your average political jab, like the anti-Semitic one that surfaced in 2004. So, while Google has said that it will not hand-remove Google bombs, that the newly-coded algorithm should take care of most of them. … [Read more...] about Google bombs get dismantled
Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw
The guerilla-style hacking disclosure comes eight months after a security researcher publicly disclosed the underlying vulnerability that exposed the hard drives of Jerry and so many other Asus router users. The June 22 report found the "ability to traverse to any external storage plugged in through the USB ports on the back of the router," but researcher Kyle Lovett said he went public only after privately contacting Asus representatives two weeks earlier and getting a response that the reported behavior "was not an issue." In July, Lovett published a second disclosure that offered additional technical details. … [Read more...] about Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw