Boucher, Fiorina and Whitman lose elections
Tech backgrounds take a hit in midterms
IDG News Service - Tuesday was a tough day for a handful of U.S. candidates with technology backgrounds, with two former tech CEOs and the current chairman of a House of Representatives subcommittee focused on Internet policy beaten during the election.
Hurrah! Carly Fiorina and Meg Whitman lose!
Representative Rick Boucher, a Virginia Democrat and chairman of House Energy and Commerce Committee's subcommittee on communications, technology, and the Internet, was among the wave of Democrats losing during Tuesday's elections. Boucher, who served for 28 years in the House, was defeated by Republican Morgan Griffith, the majority leader in the Virginia House of Delegates, in a campaign largely focused on coal mining regulations and the economy.
California bucked the national trend toward electing Republicans, however, with incumbent Democratic Senator Barbara Boxer defeating Republican Carly Fiorina, a former CEO of Hewlett-Packard. And former eBay CEO Meg Whitman, also a Republican, lost the governor's race to Democrat Jerry Brown, California's current attorney general. Brown also served as California's governor from 1975 to 1983.
Tech issues were not a major part of the debate in the California senate and governor's races, although Fiorina and Whitman both stressed their executive experience during the campaign.
Democratic lawmakers representing Silicon Valley in California were reelected. Easily winning their races were Democratic Representatives Anna Eshoo, Zoe Lofgren, and Mike Honda.
Democrats didn't fare so well in other parts of the country. As of Wednesday morning, Republicans had gained about 60 seats in the House, taking majority control from Democrats. One victim was Boucher, one of the most tech-focused members of Congress.
In recent years, Boucher has pushed unsuccessfully for net neutrality legislation prohibiting broadband providers from selectively blocking Web traffic.
Democratic defeats in the House mean net neutrality legislation is even more unlikely to pass, several tech policy experts said, even though Democrats were not able to pass a bill with majorities in both chambers of Congress, at the U.S. Federal Communications Commission and a president in the White House during the past two years.
Boucher was focused on several other tech issues, as well. In May, he and Republican Representative Cliff Stearns released a privacy draft that would require companies that collect personal information from customers to disclose how they collect and share that information.
Boucher has long pushed for reform of the FCC's Universal Service Fund, which largely subsidizes traditional telephone and mobile service in rural areas. In recent years, he called for USF to be redirected to broadband service, and the FCC's national broadband plan, released in March, advocated a similar approach.
Boucher also worked to limit digital copyright restrictions. During three recent sessions of Congress, he introduced bills that would have allowed customers to circumvent digital copy restrictions in limited cases, allowing exemptions to the anticircumvention restrictions in the Digital Millennium Copyright Act (DMCA), passed by Congress in 1998.
- NYC wants its old mechanical-lever voting machines back
- Twitter a big winner in 2012 presidential election
- E-voting machine swaps Obama vote for Romney; taken offline
- Ruling expected shortly in Ohio e-voting lawsuit
- Update: Lawsuit filed in Ohio over software updates to vote tabulation machines
- States rebut RNC complaints about e-voting systems
- Despite e-voting improvements, audits still needed for ballot integrity
- Obama, Romney cite Apple, tech issues in debate
- Twitter becomes new debate spin room
- IT offshoring: Romney vs. Obama
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Osterman White Paper: The Need for Enterprise-Grade File Transfer
- Key trends in file transfer All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.