Democracy & Technology Blog - Technology & Democracy Project

800px-Stephen_S._Roach
Economist Stephen Roach

Quoting my Old Nemesis Stephen Roach

My world is turning upside down. As a supply side conservative, I find myself quoting my old nemesis Stephen Roach on economics and Communist dictator Xi Jinping on technology. Formerly Chief Economist at Morgan Stanley, and occasional fount of useful analysis despite his Keynesian training, Roach has now joined the faculty at the Yale School of Management. From this prestigious perch, he issues a valuable warning against the China decoupling mania that has been adopted across the country. You can read his thoughts here. Roach makes an excellent economic case. A further problem for me is that China not only made my Life After Google a best seller, but also is adopting its key recommendations at the very highest level. Central to my agenda is a new blockchain architecture for internet security and a new gold–inspired digital currency with blockchain stability. Read More ›
Photo by Misha Feshchak
white and black modem router with four lights

The Future of Wireless, Harvested by WiFi6

Manifested today, without help from Bernie [Sanders], are the insidious crypto–socialist effects of the worldwide campaign for 5G — “fifth–generation” wireless. Depicted as a revolutionary innovation that will expand the speed and capacity of networks up to a hundredfold, 5G is mostly a rearguard movement of the telecom establishment in both the public and private sectors to protect the old regime of exclusive spectrum bands ultimately taxed and run by the government. Read More ›
closeup of a wireless router and a man using smartphone on living room at home ofiice , Concepts wifi connect .
closeup of a wireless router and a man using smartphone on living room at home ofiice , Concepts wifi connect .

A Home Run For Better WiFi

There is a phenomenally better WiFi experience on the immediate horizon for those of us who may be working from home, consulting with our doctors from home or studying from home as a result of COVID-19. Read More ›
COSM-2019-434A3876-gilder-kratsios

Severing the Link: Cutting Ties with China

I want to tell you more about the COSM — our technology summit last month outside Seattle. Among many high points, several Mount Rainier moments stand out a week later. And I’ll get to the TikTok threat soon enough. Read More ›
COSM-2019-434A2403-george-gilder

Reporting Back from the COSM Conference

Humans don’t decide what to build by making choices from some cosmic catalog of options given in advance. Instead, by inventing new technologies we rewrite the plan of the world. Peter Thiel, Zero to One. And we were off, for a three-day tour of the COSM, rewriting the plan of the world in time-money theory, 5G communications vision, artificial intelligence (AI), and crypto-internet architecture. It was my COSM conference at the Westin hotel in Bellevue, across the water and an ideological gulf from downtown Seattle. The conference began with the incandescence of Peter Thiel, declaring his belief in a fully human future that we choose and endow rather than in a machine singularity that chooses us and shunts us aside. Followed with Read More ›

markus-spiske-482453-unsplash
Broadband wire on blue
Photo by Markus Spiske on Unsplash

Broadband Consumers Deserve Certainty, Not Partisan Politics

The Senate is expected to vote Wednesday on a proposal by Ed Markey (D-MA) to resurrect the Federal Communications Commission’s 2015 attempt to prevent blocking, throttling and paid prioritization by declaring that it has the right to regulate broadband using public utility-style regulation from 1934 that applied to telephones.  Minority Leader Chuck Schumer (D-NY) let the cat out of the bag in remarks on the Senate floor on May 9 when he acknowledged that re-imposing public utility status would allow the FCC to regulate the price of broadband services. We believe that the internet (sic) should be kept free and open like our highways—accessible and affordable to every American, regardless of the ability to pay. The 1996 Telecommunications Act that Read More ›

Photo by Sara Kurfeß
gold iPhone 6s

Twitter: Just Trust Our Algorithm

So I was out at the movies the other night, one of millions who have been enjoying the new Black Panther movie. We got there early, in time to be indoctrinated by the pre-show entertainment. One of the ads surprised me – it was for Twitter. Ads promoting social media platforms are not really that common. But even more surprising was the basic message of the ad – trust our algorithm. The ad, titled Signing Up for Twitter, starts off in the upstairs bedroom of a man who is clearly in distress. He is pacing his bedroom floor, talking worriedly to himself. “I don’t know what to do! I don’t understand this!” We see police vehicles and a gathering crowd of curious neighbors Read More ›

George Gilder and Hance Haney with Bill Walton on Block Chain Technology

George Gilder, perhaps the leading futurist of our day, predicted the rise of the Internet, the decline of television and the explosion of the smartphone. Now he’s predicting another giant step forward – an innovation potentially as consequential as the Internet itself. It is called blockchain technology, and it has begun to challenge the way we buy and sell things.

$8.2 Billion in Annual Losses to Advertisers and Media from Infringement and Fraud

The U.S. digital marketing, advertising and media industry lose $8.2 billion annually, according to a study prepared by EY for the Interactive Advertising Bureau, as a result of ad fraud; stolen video programming, music and editorial content; and malware. The report observes that each of these categories, i.e., “invalid traffic,” “infringed content” and “malvertising,” can be interrelated. An excellent example is a consumer who visits an infringed content site containing malware and infects the consumer’s browser with a robot that is later used to drive invalid traffic. If the industry can eliminate the profits earned by serving ads next to infringed content, it can reduce the amount of money available to drive illegal activities in the supply chain. Thus, for Read More ›