Goodbye Project “Loon”

Remember the Loon Project to Kenya? It was one of Google’s parent company, Alphabet, long-term experimental projects. The company is saying goodbye to this project that was supposed to beam internet to rural areas of the world.

“While we’ve found a number of willing partners along the way, we haven’t found a way to get the costs low enough to build a long-term, sustainable business,” said Loon CEO Alastair Westgarth said in a blog post Thursday. “Developing radical new technology is inherently risky, but that doesn’t make breaking this news any easier. Today, I’m sad to share that Loon will be winding down.”

The decision to wind down Loon is surprising because until recently it looked like the effort was paying off. In 2019, Loon raised $125 million in a funding round led by SoftBank Group Corp. And last summer, Loon announced it was partnering with the government of Kenya to launch balloons that would provide commercial connectivity services. Alphabet, the parent company of Google, launched Loon in June 2013, and Loon “graduated” from a moonshot to an independent company within Alphabet in 2018. Loon launched its first commercial internet service in Kenya in July, comprised of a fleet of about 35 balloons that covered an area of around 50,000 square kilometers. Loon has also provided internet services to areas affected by natural disasters, deploying balloons to Puerto Rico following Hurricane Maria in 2017 and to Peru following an earthquake in 2019.

It may be that Alphabet’s ambitions were thwarted by the competition from satellite constellation connectivity projects led by companies such as Amazon.com Inc. and SpaceX Corp. But if not, those companies could well be looking into the feasibility of those projects sometime in the future.

Still, Westgarth insisted that the effort had had some successes.

“The Loon team is proud to have catalyzed an ecosystem of organizations working on providing connectivity from the stratosphere,” he wrote. “The world needs a layered approach to connectivity — terrestrial, stratospheric, and space-based — because each layer is suited to different parts of the problem. In this area, Loon has made a number of important technical contributions.”

In a second blog post, Astro Teller, CEO of X and chairman of Loon’s board, said his firm was pledging a $10 million fund to support nonprofits and other businesses focused on connectivity, education, entrepreneurship and internet in Kenya. Alphabet will also take some of Loon’s technology and share this and other lessons it has learned with others.

Constellation Research Inc. analyst Holger Mueller said he was sad to see that Alphabet was pulling the plug on Loon.

“We in first world often forget that most of the rest of the world does not have fast internet coverage, and even if it does, many cannot afford it,” Mueller said. “Given the time and cost it takes to build ground-based infrastructure, airborne solutions seemed like a promising solution, so it’s sad to see that Google’s balloons have failed. It means there are no shortcuts to bring around one-third of the world’s population reliable internet access.”

Photo: loon

Hot this week

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

Topics

The Hidden Dangers of Over Reliance on Security Tools

Adding more security tools can increase complexity and blind spots instead of improving protection, so focus on integration and training over new purchases.

How Poor MFA Setup Increases Your Attack Surface

Multi-factor authentication is essential for security, but flawed implementation can expose your organization to greater risks than having no MFA at all. Learn how to properly configure MFA to avoid common pitfalls and strengthen your defenses.

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.
spot_img

Related Articles

Popular Categories