Ken David Stewart public
[search 0]
Download the App!
show episodes
 
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
  continue reading
 
Loading …
show series
 
As the US pushes for a TikTok ban and the EU leads the way in data privacy regulation, experts warn that overly restrictive policies might inadvertently stifle innovation and economic growth. But how do we strike the right balance? What role does data play in shaping our society? How do we categorize and classify the information we generate daily? …
  continue reading
 
Is technology really addictive, or is that just another myth? What hidden benefits of AI are we overlooking? And how will the landscape of innovation shift as lawmakers tighten the reins of regulation? In this episode, Shane interviews Robert Atkinson and David Moschella, co-authors of Technology Fears and Scapegoats: 40 Myths About Privacy, Jobs, …
  continue reading
 
NTIA is championing Route Origin Authorizations or ROA’s as part of the Biden Administration’s cybersecurity plan to fend off nation-state hackers and cyberattacks. In tandem with this effort, on June 6, the Federal Communications Commission (FCC) advanced a Notice of Proposed Rulemaking aimed at strengthening internet security through the implemen…
  continue reading
 
Outdated systems, sloppy code, and years of quick fixes have created a growing issue of "technical debt" in businesses. This unseen threat poses security risks, slows innovation, and leaves companies running on inefficient systems. Technical debt costs the US an estimated $2.41 trillion annually, with a whopping $1.52 trillion needed just to addres…
  continue reading
 
As the world becomes increasingly interconnected economically, blockchain-based financial networks offer new solutions for facilitating seamless international trade, remittances, and humanitarian aid. What specific advantages do blockchain-based financial networks offer over traditional systems? As global economic interconnectivity increases, what …
  continue reading
 
The proliferation of cyber threats has evolved into a crisis: Last year, there were 880 million cybercrime complaints resulting in over $12 billion in losses. Analysts suggest that cybercrime is now the third-largest economy globally after the United States and China. The most pressing challenges in today's cybersecurity landscape include staying a…
  continue reading
 
While internet access has spread rapidly across the globe during the past several decades, around three billion people still lack access. Some argue that the solution lies in fiber cable expansions, while others are innovating with satellites to meet users’ demands. Satellite connectivity supports network access for users in formerly unconnected ge…
  continue reading
 
While the internet has improved monumentally since its early days of bandwidth restrictions and dial-up, customers are more demanding of the network and have little patience for latency on any of their devices. What causes these interruptions to our usually consistent high-speed streams? Latency, or lag. On today’s episode of Explain to Shane, Comc…
  continue reading
 
The European Union’s Digital Markets Act (DMA) is an ambitious attempt to constrain the immense power of Big Tech. But in an interconnected world, regulations made in Europe ripple out to the US and beyond. What do stricter rules in Europe mean for the US’s tech sector? How will new regulations impact American data protection? Will the DMA hurt inn…
  continue reading
 
Unwanted calls and messages have become a major nuisance in the digital age. Regulators have scrambled to address rising complaints about these unwanted intrusions, but the persistence of fraudulent communications has undermined consumer faith in our telecommunications infrastructure. Why do these issues persist? And in today’s complex digital land…
  continue reading
 
When Taylor Swift pulled her music from Spotify in 2014, she shone a spotlight on an issue that persists in the music industry today: artist must jump through major hoops to be compensated for their music that is played across multiple platforms. Nine years later, the economics are still challenging for artists to receive payment for their work. Ar…
  continue reading
 
Cryptocurrency is transforming finance before our eyes, using technology to put control over money and transactions back into the hands of users. With the potential to enable faster, cheaper, and more transparent transfers, cryptocurrency infrastructure lays the foundation for new avenues of innovation - from self-executing smart contracts to great…
  continue reading
 
Generative AI poses new challenges for political campaigning and our democracy as we head towards the 2024 presidential election. While this technology could streamline political messaging, there is greater fear that it could enable widespread manipulation and distortion of the democratic process. Heading into a contentious election, how can we ass…
  continue reading
 
Quantum computing has the potential to radically advance our ability to solve complex problems, transforming entire industries from drug discovery to cybersecurity. But, how does quantum computing really work? What problems can it help people and businesses solve? And how does it play into the US’s larger national strategic goals? Our guest today i…
  continue reading
 
Paperwork and manual forms are still the norm for most industries today, but this outdated process is begging for a digital overhaul. Emerging software solutions can fully digitize documents and forms using advanced source code technology, providing pathways to ease information flows. Can this technology revolutionize the way businesses and governm…
  continue reading
 
As we adopt technology at every level of our lives, these technological advancements can also open the door to more cyber risks. The increasing sophistication and frequency of cyberattacks are a threat to government agencies, private companies, and individual users alike. Given the interconnectedness of our digital economy, how can public users and…
  continue reading
 
Recent developments in transatlantic data sharing agreements serve as a baseline for the importance of cooperation between countries in the digital age. From the new Trans-Atlantic Data Privacy Framework (TDPF) to the cybersecurity proposals before the United Nation, there are both areas of agreement and concern. To walk through some of the recent …
  continue reading
 
The explosion of large language models (LLMs) into the public sphere in 2023 here in Washington has raised many questions on how much artificial intelligence (AI) should be under the direct scrutiny of the government. Should we proceed with as much caution as Europe? Will AI as we know it today become misaligned with our interests? AI should lead u…
  continue reading
 
In this live episode of Explain to Shane, Shane wraps up her discussion with AEI Senior Fellow Brent Orrell on generative artificial intelligence tools and automation’s relationship to in-demand skills in the labor market. The two scholars get at the heart of how we should view automation and the imperative that it places on our institutions—and ou…
  continue reading
 
In this live episode of Explain to Shane, Shane joins AEI Senior Fellow Brent Orrell on the stage to discuss how the latest advancements in automation through large language models (LLMs) are accelerating discussions around what skills are the most valuable in the labor market. The crowd has a vested interest in their insights—the 2023 AEI Summer H…
  continue reading
 
In this episode of Explain to Shane, Shane walks through Sandboxx, the digital platform designed by veterans and service members to help connect the military community with secure tools. Sandboxx’s co-founder and CEO, Sam Meek explains how this groundbreaking platform, inspired by Sam's experiences in the US Marine Corps, is enabling a support syst…
  continue reading
 
The recent neo-Brandeisian tack in antitrust policy has kicked up a lot of dust, obscuring much of the evidence that pokes holes in a more aggressive Federal Trade Commission (FTC) under Lina Khan. Is big really bad, though, when it comes to technology antitrust policy? Join us in this episode of Explain to Shane as we explore this pressing questio…
  continue reading
 
It is clear that African nations are gearing up for a major leap forward in economic growth thanks to recent technological innovations in artificial intelligence and enhanced availability of technology tools to individuals. The African Development Bank anticipates an average of 4 percent real GDP growth in 2023 and 2024. How are legal frameworks ke…
  continue reading
 
This year has witnessed some extremely impressive breakthroughs in generative artificial intelligence models, with OpenAI releasing GPT-4, Google with its Bard LLM, and many more competitors. But what might be less well-known is that there’s a whole class of music-making AI software rising, and it’s creating everything from symphonies to viral rap …
  continue reading
 
Throughout the Biden administration and this Congress, spectrum has been a priority for nearly everyone else in the world—except for us. We’re currently 378 megahertz behind other countries on mid-band spectrum, a vital resource for 5G communications quality. Spectrum isn’t anything we can see or touch, yet it’s all around us. However it is perhaps…
  continue reading
 
Two of the long-tail fears surrounding the future of the internet are the danger of creating either an internet controlled by the hands of the few and powerful at a global scale or what’s known as the “splinternet”—the cabining off of nation-states’ networks from the mainstream due to censorship, technological change, or commercial fragmentation. S…
  continue reading
 
Unauthorized network access was the most common cause of third-party cyber attacks in 2022. This includes ransomware and phishing attacks that created internal network compromises that were responsible for 40 percent of third-party cybersecurity breaches. Are we really heading toward a more secure internet? Protection from cybersecurity scams needs…
  continue reading
 
Situated squarely in the digital age, yet still years behind the curve, our government spends upwards of $100 billion on its IT and cyber needs annually according to the Government Accountability Office (GAO). With all that money being spent, how do we know we’re getting not only the best deal on software but also the most secure systems? The Natio…
  continue reading
 
Myriad questions are swirling around telecommunications policy at the outset of this year. Elon Musk’s Starlink and Jeff Bezos’ Kuiper are heating up the discussion surrounding Low Earth Orbit (LEO) satellite internet. The FCC’s ability to auction off spectrum is up for reauthorization on March 9th, securing a vital asset for the regulatory body to…
  continue reading
 
Our devices, smart as they are, break on us, and often the only recourse outside of purchasing a new one is to take our broken tech to a licensed repair shop. But what if the replacement parts for such devices were more readily available or even set up for DIY repair? This is the supposed promise of the legal concept of the “right to repair.” It ai…
  continue reading
 
We live in a world where the security that we enjoy arises out of more than just police forces, standing armies, or the weapons we equip them with. Today’s security lies both in the seen and the unseen—the defenses built around our online networks, data, and connected technology repel attacks every day. How are we to coordinate amongst internationa…
  continue reading
 
What does it mean to gain tech influence on a global scale? How does America compare to China in helping the developing world get connected? What’s more effective: a tangible investment or a winning smile? Who is China eclipsing on the global stage? Technology, international security, and public policy have integrated over the last decade into some…
  continue reading
 
China has invested heavily in the telecommunications and internet infrastructure of the developing world. In the face of that significant head start, how might Europe and the US team up to catch up in the 5G influence race? What has the EU-US Trade and Technology Council (TTC) accomplished so far towards that end and others? Are we heading into mor…
  continue reading
 
What role has America played in technology development in the past and how has that role evolved? What effect has offshoring elements of our high-tech hardware manufacturing had on our cybersecurity capacity? How are these “instruments of national power” changing our calculus on the cyber balance of power? To what extent should the government inter…
  continue reading
 
Why did American internet infrastructure shine throughout the pandemic compared to foreign networks? How might the executive branch best implement the massive sums of money going toward rural broadband expansion across the myriad agencies that touch it? What does leadership in broadband require moving forward? All of these questions and more are di…
  continue reading
 
Will the Biden administration release a national cybersecurity strategy? Can federal agencies’ responsibilities be reorganized and redistributed among one another to increase our national cyber resilience? These and several other questions remain up in the air as cyber threats continue to proliferate. On this episode, Shane is joined by Jason Bless…
  continue reading
 
What are “microbusinesses” and why do they matter to our economic outlook? How can state and local governments learn about and help sustain these local businesses? On this episode, Shane interviews Alex Rosen, a senior director for GoDaddy’s Venture Forward team. Alex explains the rise of online microbusinesses during the pandemic, and how we need …
  continue reading
 
Domain name abuse is a constant challenge, as it’s the entry point for many online activities that are harmful to consumers such as malware, botnets, phishing scams, and spam. Protecting the domain name system (DNS) is a priority for security and stability, and creating an efficient way to track abusers is key to this mission. But what exactly does…
  continue reading
 
Criminals are constantly looking for holes in online identity verification—a key reason why the US government lost $163 billion in unemployment-related fraud during the pandemic. Can technology make identity verification systems more resilient, despite everyone being on separate networks? On this episode, Shane and AEI Nonresident Senior Fellow Jim…
  continue reading
 
How has China gained influence at the International Telecommunication Union (ITU), and what type of agenda will they continue to pursue if the US and our allies do not step up our participation? If China and Russia win the upcoming ITU election, we’re going to find out. Coined recently as “the most important election you have never heard of,” the I…
  continue reading
 
Everyone loves a good “life hack”: Whether it’s through an organizational app, a new productivity strategy, or a novel way to use technology, we’re all looking for ways to be more efficient. What life hacks would a startup and entrepreneurship expert recommend? Shane’s latest guest is Jason Feifer. Jason is the editor in chief of Entrepreneur Magaz…
  continue reading
 
As the demand for remote work, schooling, medical services, and retail continues to rise, augmented reality (AR) and extended reality (XR) are proving worthwhile to both the providers and consumers of these services. How can we integrate these technologies into our daily lives as smoothly as possible? On this episode, Shane is joined by David Scurl…
  continue reading
 
When one thinks about today’s tech leaders in Silicon Valley, PayPal is probably not the first name that comes to mind. But PayPal’s founders and earliest employees have gone on to create, found, and advise companies like Tesla, SpaceX, YouTube, LinkedIn, Facebook, Yelp, and Palantir. What happened in PayPal’s early days to set these individuals an…
  continue reading
 
While the $52 billion of federal funding in the CHIPS for America Act has strong bipartisan support, it’s caught in a larger fight between the two legislative chambers over an attempt to reconcile the bill with other Democrat spending priorities. Senate Majority Leader Mitch McConnell (R-KY) has built a coalition against the larger bill that will s…
  continue reading
 
Following the passage of the Infrastructure Investment and Jobs Act (IIJA), a Department of Commerce branch known as the National Telecommunications and Information Administration (NTIA) has been tasked with allocating $42.5 billion of federal broadband infrastructure funding to state and local governments through the Broadband Equity, Access, and …
  continue reading
 
One year ago, the Biden administration announced its support for a proposal at the World Trade Organization (WTO) that would waive Trade-Related Aspects of Intellectual Property (TRIPS) protections for COVID-19 vaccines and treatments. Last week, WTO member states agreed to a limited waiver that only covers vaccines and patents—not therapeutics or …
  continue reading
 
The radio airwaves that power wireless technologies—known as spectrum—are a finite but critical resource. Tailoring spectrum toward its best use often entails industry and government sharing airwaves with one another, a process that has proven complicated as historical use does not always equate to the best current use of spectrum assets. And, with…
  continue reading
 
Cyberattacks are one of the largest threats facing society today. Learning how cyber disruptions take place is the best way to protect services provided by network operations and data systems, but who has the training resources and expert teams required to detect unseen risks for enterprise, government, and civil society alike? On this episode of “…
  continue reading
 
Cyber threats are multidimensional; they can manifest as large-scale attacks carried out by nation states or private actors, targeted at critical infrastructure or individual devices. In the information age, they can also target vulnerable individuals via malware or on social media platforms in the form of false or misleading information. Across th…
  continue reading
 
How are the American and European approaches to regulating the technology industry similar? How are they different? Can policymakers from the two continents find agreement on today’s most pressing tech policy issues? On this episode of “Explain to Shane,” Shane is joined by Peter Brown, a Washington, DC-based diplomat for the European Parliament. U…
  continue reading
 
Loading …

Quick Reference Guide