Hosted Payload Episode 11: Erin Boone/Interstellar
Won’t You Be My Neighbor?
Know Before You Go: Federal Standards and Pre-Application Research
New satellite services are in development which will permit satellites to communicate directly with unmodified end user phones. These services fall into a category of satellite services known as direct to device services, or...more
The wireless industry has revolutionized the way we connect, from facilitating teleworking, distance learning, and telemedicine to allowing the American public to interact virtually in almost all other aspects of their daily...more
A cancellation clause in a signed mobile phone supply contract was considered unduly onerous and not fairly and reasonably drawn to the purchaser’s attention to be incorporated by reference. ...more
We have noted before how important it is to update the operating system (OS) on your mobile phone as soon as you receive notice from the manufacturer. This week, Apple issued an update to the iOS that is considered urgent....more
The Electronic Frontier Foundation (EFF) (www.eff.org) is a wonderful resource for privacy-related issues and concerns. I check its website frequently to make sure I am aware of the latest issues and concerns around privacy....more
In March 2019, Chinese mobile phone manufacturer Xiaomi organized a mobile phone conference in the Netherlands, and it is expected that Xiaomi mobile phones will be listed on the Dutch market shortly after the summer of 2019....more
If, like me, you travel a lot, listen up—the Los Angeles District Attorney’s Office has issued an advisory as part of its fraud education campaign warning travelers not to use free USB charging stations offered in airports,...more
Due to the proliferation of advanced mobile devices, such as smartphones and tablets, wireless service providers anticipate a significant increase in data traffic over their networks in the next few years. ...more
The FCC will take a number of significant actions in the final months of 2018 to facilitate the development of 5G, the fifth generation of wireless cellular technology. First, at its October meeting tomorrow, it will vote on...more
Last Wednesday, most of us received a jarring alert on our cellphones at approximately 2:18 p.m. (EST) It read, “THIS IS A TEST of the National Wireless System. No action is required.” This was a test of the Wireless...more
Digital Addiction - Can you imagine getting a ticket for texting while crossing the street? You will in Honolulu, HI! It won’t matter whether it is a cellphone, a tablet or a video game under a new bill, Electronic...more
Noting the “astounding” statistics on the use of smartphones and other mobile devices to “shop, bank, play, read, post, watch, date, record, and go” across consumer populations, the FTC has recently re-focused its attention...more
When talking to colleagues and friends, it appears that folks do not understand how their smartphones work and the data that can be accessed through them. This prompted me to again give basic steps that can be used to protect...more
If you have an online account, you are familiar with the username/password method of user authentication. If you have been paying attention to recent news stories, however, you also recognize that this method of...more
‘Tis the season for gift giving. Smartphones and mobile devices are a hot item during the holidays. The first thing many people do when they get a new phone or device is to start downloading apps. Since there will be a lot of...more
In this hoganlovells.com interview, Hogan Lovells partner Trey Hanbury talks about the need for wireless carriers to broaden their offerings to meet the demands of an increasing number of niche markets. At the same time,...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks. The vulnerability, Key Reinstallation...more
Security researchers this week have found a new vulnerability that affects Wi-Fi Protected Access II, also known as WPA2, which is the security protocol used by many wireless networks....more
The Ninth Circuit issued two similar opinions arising out of Samsung’s appeals of orders denying arbitration in two putative class actions filed against it. The claims against Samsung allege that the smartphone maker...more
The Indianapolis Colts mobile app is alleged by a putative class to record fans’ private conversations. In the putative class action, the named plaintiff alleges that the mobile app secretly activates the smart phone’s...more
The Federal Trade Commission filed suit last week in federal court against Qualcomm, Inc., following its investigation launched in September 2014. The FTC alleges that the semiconductor manufacturer illegally maintained a...more
Adding more complexity to the issue of arbitration contract formation, the Ninth Circuit has rejected Samsung's attempt to compel individual arbitration of fraud claims asserted by plaintiffs in two class actions. Ruling in...more
The Federal Communications Commission and the Obama administration recently adopted several important initiatives to facilitate innovation in and rapid deployment of the nascent Internet of Things (IoT). The FCC identified...more
The Joint Commission recently announced a change in its policies whereby it will now allow providers to communicate patient orders via text message. The policy applies to all Joint Commission accreditation programs. While the...more
The Federal Communications Commission (FCC) released a Notice of Proposed Rulemaking (“NPRM” or “Proposed EAS Rules”) in January, proposing improvements to the Emergency Alert System (“EAS”) and Wireless Emergency Alerts...more