SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
Slide 1




             Copyright and Technology
                       2010

                                             June 17, 2010




    © 2010
               GiantSteps
               Media Technology Strategies
                                                    1
Slide 2




                                             Opening Remarks

                                                       Bill Rosenblatt
                                           GiantSteps Media Technology Strategies
                                                   www.giantstepsmts.com
                                                         i tt      t
                                                  billr@giantstepsmts.com
                                                       +1 212 956 1045

    © 2010
             GiantSteps
             Media Technology Strategies
                                                               2
Slide 3




                                           www.giantstepsmts.com




    © 2010
             GiantSteps
             Media Technology Strategies
                                                      3
Slide 4




             Copyright and Technology


                                www.copyrightandtechnology.com




    © 2010
             GiantSteps
             Media Technology Strategies
                                               4
Slide 5




                                    www.gothammediaventures.com




    © 2010
             GiantSteps
             Media Technology Strategies
                                                  5
Slide 6




             What Are We Discussing Today?




    © 2010
              GiantSteps
              Media Technology Strategies
                                            6
Slide 7


              Interface between Copyright and
                         Technology
                         T h l
       Digital technology used to make and distribute copies
        at virtually no cost
      CCopyright i d t h h d various responses, all
               i ht industry has had i                  ll
        interrelated:
             – Legal
               L l
             – Technological
             – Economic
             – Education


    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               7
Slide 8


             Technologies to Affect Copyright

                                              Content access control
                                                – DRM
                                              Content identification
                                                – Filtering
                                                – License management




    © 2010
               GiantSteps
               Media Technology Strategies
                                                          8
Slide 9


             Legal Concepts that Affect These
                      Technologies
                      T h l i
                               Fair Use
                               Secondary infringement liability
                               Network service provider liability
                               Anticircumvention legislation
                                                     g
                               Blanket licensing of content




    © 2010
               GiantSteps
               Media Technology Strategies
                                                9
Slide 10




                                           Technologies




    © 2010
             GiantSteps
             Media Technology Strategies
                                                 10
Slide 11




                  Digital Rights Management




    © 2010
             GiantSteps
             Media Technology Strategies
                                           11
Slide 12




             DRM is a troubled technology…
                               technology…

                                            Why?




    © 2010
              GiantSteps
              Media Technology Strategies
                                              12
Slide 13


              Factors Inhibiting DRM Success*

            Market:                                                   Architecture:
              – Economic incentives                                         – Technological innovation
                misaligned                                                    hampered
              – Commercial content must
                compete with free/illegal
            Norms:                                                    Laws:
              – Users don’t see value in
                       don’                                                 – Laws not amenable to
                choices of offers                                             technological implementation
              – Norms distorted by
                architecture (technology)

                                               *based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90
                                                            Lessig,                        Cyberspace,           88-

    © 2010
                 GiantSteps
                 Media Technology Strategies
                                                                    13
Slide 14


              Economic Incentives Misaligned

            Content owners demand DRM but rarely pay for it
            Device makers and network operators use it to suit
             their
             th i own purposes
            Consumers have only indirect market influence




    © 2010
                GiantSteps
                Media Technology Strategies
                                              14
Slide 15


     Consumers Don’t See Value in Choices
               Don’
                 of Off
                   f Offers
     Expensive to educate users on unfamiliar offerings
             – Apple had huge budget to educate about unbundled albums
             – But Rhapsody Napster etc haven’t educated sufficiently
                   Rhapsody, Napster, etc. haven’
               about subscription services
     Meanwhile, consumers focused on offline models:
      Meanwhile
             – Perception to be fought:
                • Pay (purchase) must mean ownership;
                    y (p        )                    p;
                • Free must mean radio or broadcast TV;
                                                    TV;
                • Therefore “free ownership” must be the only real improvement
                                  ownership”

    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               15
Slide 16


           Users Influenced towards Infringing
                        Behavior
                        B h i
     Definition of DRM commandeered by the press
             – Narrower than original definitions
             – Yet broadened to apply to any technology that restricts user
               behavior in any way*
     Notion that DRM == Big Media == Evil
     Romanticism & rationalization of hacker/pirate ethic



    © 2010
                  GiantSteps
                  Media Technology Strategies
                                                16   *See C. Doctorow, boingboing.net
Slide 17


           Technological Innovation Hampered

              Lack of revenue for DRM vendors
              Venture capital scared off
                        – B d press
                          Bad
                        – Non-sexy topic
                          Non-
              Researchers scared off
               R      h         d ff
                        – RIAA actions against Prof. Ed Felten in 1999
                        – DRM research “politically incorrect” in US
                                                    incorrect”
                          (not so much in Europe and Asia)


    © 2010
              GiantSteps
              Media Technology Strategies
                                             17
Slide 18


                   Laws Not Amenable to
                Technological Implementation
                T h l i lI l          t ti
       Fair Use laws not amenable to automation
       Privacy and due process are important but become obstacles
       Anticircumvention laws reduce incentive to develop effective
        technologies
             – Liability solely on the hacker
                       y      y
             – Effectiveness of TPM/DRM irrelevant to applicability of law
               (per Universal v Reimerdes, 2000)
                                 Reimerdes, 2000)




    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               18
Slide 19




                                           So…
                                           So… Is DRM Dead?




    © 2010
             GiantSteps
             Media Technology Strategies
                                                   19
Slide 20


                                           Is DRM Dead?

                                            Short answer: no
                                                           no.




    © 2010
             GiantSteps
             Media Technology Strategies
                                                    20
Slide 21


                                              Is DRM Dead?

              Slightly longer answer:
               Only for permanent Internet music downloads.
                                                 downloads.




    © 2010
                GiantSteps
                Media Technology Strategies
                                                    21
Slide 22


                                               Will DRM Die?

      Not where it enables new business models rather than
       tries to emulate old ones.
     EExamples:
               l
             – Buy single songs instead of albums: iTunes (originally)
             – Subscription services for music:
               Rhapsody, Napster, MOG*, Rdio*, Spotify Premium*
                                          Rdio*,
             – Subsidized ecosystems with “free” content:
                                            free”
               Nokia Comes With Music, Play Now Plus, Beyond Oblivion
             – Library e-book lending: Overdrive
                       e-

    © 2010
                 GiantSteps
                 Media Technology Strategies
                                                     22   *Yes they do – just don’t call it “DRM”
                                                                              don’           DRM”
Slide 23


                                                  State of DRM Today

     Multi-platform DRM technologies
      Multi-                                                     E-book DRMs
             – Marlin (Intertrust)                                 – Amazon
             – OMA DRM 2.1 (Open Mobile                              (Kindle & Kindle apps)
               Alliance)                                           – Adobe Content Server
             – PlayReady (Microsoft)                                 (most others)
     Video DRMs                                                 Other proprietary DRMs
             –   Adobe Flash Access                                – Apple FairPlay
             –   Widevine                                          – Subscription music services
             –   DivX (Sonic)                                    Gaming
             –   AACS/BD+ (Blu-ray)
                 AACS/BD (Blu-Blu
                                                                   –   SecuROM (S )
                                                                       S ROM (Sony)
                                                                   –   StarForce
                                                                   –   ByteShield
                                                                   –   TryMedia (RealNetworks)
                                                                                  RealNetworks)

    © 2010
                    GiantSteps
                    Media Technology Strategies
                                                           23
Slide 24




                                    Content Identification




    © 2010
             GiantSteps
             Media Technology Strategies
                                               24
Slide 25


             Techniques for Identifying Content

                                              Watermarking
                                              Fingerprinting




    © 2010
               GiantSteps
               Media Technology Strategies
                                                     25
Slide 26


                                              Watermarking

            Inserting/embedding data into “noise” portions of
                                               noise”
             image, audio, or video signal
            Data capacity: typically a few dozen bytes
            Technology appeared in mid-to-late 1990s
                                       mid-to-
              – First for digital images
              – Audio and video later
            Trade association est. 2006: Digital Watermarking
                                    2006: g                  g
             Alliance


    © 2010
                GiantSteps
                Media Technology Strategies
                                                    26
Slide 27


                                    Evaluating Watermarks

            Undetectability
              – How little it detracts from user’s experience
                                            user’
            Robustness
              – How well it survives copying to lower-resolution or analog f
                                                lower-                     format
            Capacity
              – How much data it can hold (typically a few dozen bytes)
            Security
              – How resistant to attempts to alter or erase
            Efficiency
              – How fast insertion and extraction


    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               27
Slide 28


                                              Fingerprinting

            Examining content to determine its identity
              – Compute a set of numbers (“fingerprints”)
                                           (“fingerprints”
              – Look up in database, see if there’s a match
                                            there’
            Based on mathematical concept of hashing
              – But allows for different files that look/sound the same
              – C compensate f certain t
                Can            t for t i transformations:
                                                    f    ti
                excerpting, cropping, audio distortion, etc.




    © 2010
                GiantSteps
                Media Technology Strategies
                                                     28
Slide 29


                          History of Fingerprinting

      1999:        First important patents issued
      2002:        Introduced for music during Napster litigation
      2005:        Major record co’s approve for P2P services
                                  co’
      2006:        Video fingerprinting introduced
      2007
       2007:        “T fingerprinting” (A b ) adopted b AP
                     Text fingerprinting” (Attributor) d
                           f                                d by




    © 2010
             GiantSteps
             Media Technology Strategies
                                           29
Slide 30


    Evaluating Fingerprinting Technologies

     Accuracy                                          Robustness
             – False positives                            – Imperviousness to content
             – False negatives                              transformations:
     Efficiency                                            format changes,
             – Calculation speed                            display rate changes,
             – Ability to register live content             deliberate distortions
               in real time                             Content database
             – Lookup speed                               – Catalog size &
             – Fingerprint size                             comprehensiveness



    © 2010
                   GiantSteps
                   Media Technology Strategies
                                                  30
Slide 31


                                    Content Identification
                                      Business B fit
                                      B i      Benefits
              Detecting and deterring unauthorized use
              Increasing Internet ad revenue
              Tracking content usage
              Managing assets and integrating systems
                    g g                  g    g y
              Monetizing transformational content uses




    © 2010
             GiantSteps
             Media Technology Strategies
                                               31
Slide 32




                                           Legal Developments
             …and their Technical Solutions




    © 2010
             GiantSteps
             Media Technology Strategies
                                                    32
Slide 33


                                           Legal Developments

                                            Network operator liability
                                            “Free riding”
                                                   riding”
                                            Blanket licensing




    © 2010
             GiantSteps
             Media Technology Strategies
                                                         33
Slide 34


                       Network Operator Liability

      Secondary liability
             – Contributory: aiding and abetting infringement
             – Vicarious: “looking the other way” and benefiting from it
                                             way”
             – Inducement: inducing others to infringe as business model
      DMCA Safe Harbor
             – Notice and takedown (512)
      Now: content owners pushing for ISP liability
             – Graduated/Progressive Response a/k/a “three strikes”
                                                           strikes”
             – Enacted in France, South Korea, Taiwan
                                ,            ,

    © 2010
                 GiantSteps
                 Media Technology Strategies
                                               34
Slide 35


                                           Technical Solutions

                                               Fingerprinting
                                               Watermarking
                                               Traffic analysis




    © 2010
             GiantSteps
             Media Technology Strategies
                                                       35
Slide 36


                                           “Free Riding”
                                                 Riding”

       Monetizing links to copyrighted content
       Monetizing content appearing in search results
       Copying of content (e.g. in blogs) without permission




    © 2010
             GiantSteps
             Media Technology Strategies
                                                 36
Slide 37


                                           Technical Solutions

       Fingerprinting & search
       Tagging content with “beacon” metatags – AP hNews
                              beacon”
       Tagging content with rules for indexing and search
        results – ACAP




    © 2010
             GiantSteps
             Media Technology Strategies
                                                    37
Slide 38


                                           Blanket Licensing

      Just charge all ISP subscribers a levy for content use
      Distribute proceeds to licensors… somehow
                              licensors…
      Attempted in US on some college campuses for music
       (Choruss)
        Choruss)
      Considered in the Isle of Man (population 80,000)




    © 2010
             GiantSteps
             Media Technology Strategies
                                                   38
Slide 39


                                             Technical Solutions

            Fingerprinting for play counting and royalty
             distribution
            Oth i none; t h l -free blunt i t
             Otherwise        technology-
                              technology f bl t instrumentt




    © 2010
               GiantSteps
               Media Technology Strategies
                                                      39
Slide 40




                                           Conference Agenda




    © 2010
             GiantSteps
             Media Technology Strategies
                                                   40
Slide 41


                                           Morning

       Keynote:
        Stanley Pierre-Louis, Viacom
                Pierre-
       Plenary S i
        Pl      Session:
        Best Practices for Monetizing Premium Video Content
        (sponsored b Ad b )
        (         d by Adobe)




    © 2010
             GiantSteps
             Media Technology Strategies
                                              41
Slide 42


                                              Afternoon

               Technology Track                            Law Track
            New Ecosystems for Video               Progressive Response
            Content Identification                 News Publishing and Fair
             Technologies                            Use
            What Is the Future of                  Policing Copyright:
             DRM?                                    Whose Job Is It?




    © 2010
                GiantSteps
                Media Technology Strategies
                                                  42
Slide 43


                              Thanks to our Sponsors




    © 2010
             GiantSteps
             Media Technology Strategies
                                           43
Slide 44




                                           And finally…
                                               finally…




    © 2010
             GiantSteps
             Media Technology Strategies
                                                 44
Slide 45


                              Recommended Reading




                   Jaron Lanier
                         Lanier,                Adrian Johns
                                                       Johns,
                   You Are Not a Gadget         Piracy



    © 2010
             GiantSteps
             Media Technology Strategies
                                           45

Más contenido relacionado

Similar a Copyright and Technology Slide Presentation Summary

The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyInnoTech
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyInnoTech
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Chris Upjohn
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012Thierry Lestable
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]kgbacdd
 
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...Sirris
 
MediaMath - Mad Men to Math Men
MediaMath - Mad Men to Math MenMediaMath - Mad Men to Math Men
MediaMath - Mad Men to Math MenMediaMath1
 
Policy Cloud Data Driven - Policies against Radicalisation
Policy Cloud Data Driven - Policies against RadicalisationPolicy Cloud Data Driven - Policies against Radicalisation
Policy Cloud Data Driven - Policies against RadicalisationBig Data Value Association
 
Policy Cloud Data Driven Policies against Radicalisation
Policy Cloud Data Driven Policies against RadicalisationPolicy Cloud Data Driven Policies against Radicalisation
Policy Cloud Data Driven Policies against RadicalisationBig Data Value Association
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSB
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSBCollaboraton Across Digital Industries Competition - Maurizio Pilu, TSB
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSBChinwag
 
Impact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyImpact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyTenet Systems Pvt Ltd
 
Visual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsVisual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsTarik Hammadou
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Dr. Ahmed Al Zaidy
 
Case Srudy: Intellectual Property Rights In Digital Camera
Case Srudy: Intellectual Property Rights In Digital CameraCase Srudy: Intellectual Property Rights In Digital Camera
Case Srudy: Intellectual Property Rights In Digital CameraDjadja Sardjana
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...44CON
 

Similar a Copyright and Technology Slide Presentation Summary (20)

Digital Rights And Digital Television
Digital Rights And Digital TelevisionDigital Rights And Digital Television
Digital Rights And Digital Television
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive Technology
 
The Collaboration of Disruptive Technology
The Collaboration of Disruptive TechnologyThe Collaboration of Disruptive Technology
The Collaboration of Disruptive Technology
 
Automating Notice And Takedown
Automating Notice And TakedownAutomating Notice And Takedown
Automating Notice And Takedown
 
Sticky Pixel Solution
Sticky Pixel SolutionSticky Pixel Solution
Sticky Pixel Solution
 
Bi Tech Overview Aug2010
Bi Tech Overview Aug2010Bi Tech Overview Aug2010
Bi Tech Overview Aug2010
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
 
Building A Business Case For Digital Asset Management
Building A Business Case For Digital Asset ManagementBuilding A Business Case For Digital Asset Management
Building A Business Case For Digital Asset Management
 
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
2012 04-27%20%20 mobile%20security%20ppt%20presentation[1]
 
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...
Sirris Innovate2011 Introduction - Smart Products: why and how, Jeroen Deleu,...
 
MediaMath - Mad Men to Math Men
MediaMath - Mad Men to Math MenMediaMath - Mad Men to Math Men
MediaMath - Mad Men to Math Men
 
Policy Cloud Data Driven - Policies against Radicalisation
Policy Cloud Data Driven - Policies against RadicalisationPolicy Cloud Data Driven - Policies against Radicalisation
Policy Cloud Data Driven - Policies against Radicalisation
 
Policy Cloud Data Driven Policies against Radicalisation
Policy Cloud Data Driven Policies against RadicalisationPolicy Cloud Data Driven Policies against Radicalisation
Policy Cloud Data Driven Policies against Radicalisation
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSB
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSBCollaboraton Across Digital Industries Competition - Maurizio Pilu, TSB
Collaboraton Across Digital Industries Competition - Maurizio Pilu, TSB
 
Impact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit PandeyImpact of Technology by SanjayYadav & Ranjit Pandey
Impact of Technology by SanjayYadav & Ranjit Pandey
 
Visual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensorsVisual intelligence driven smart imaging sensors
Visual intelligence driven smart imaging sensors
 
Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2 Fundamentals of Information Systems Security Chapter 2
Fundamentals of Information Systems Security Chapter 2
 
Case Srudy: Intellectual Property Rights In Digital Camera
Case Srudy: Intellectual Property Rights In Digital CameraCase Srudy: Intellectual Property Rights In Digital Camera
Case Srudy: Intellectual Property Rights In Digital Camera
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 

Más de GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

Más de GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
Copyright and Technology London 2012: Content Identification - Alex Terpstra,...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 

Último

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Copyright and Technology Slide Presentation Summary

  • 1. Slide 1 Copyright and Technology 2010 June 17, 2010 © 2010 GiantSteps Media Technology Strategies 1
  • 2. Slide 2 Opening Remarks Bill Rosenblatt GiantSteps Media Technology Strategies www.giantstepsmts.com i tt t billr@giantstepsmts.com +1 212 956 1045 © 2010 GiantSteps Media Technology Strategies 2
  • 3. Slide 3 www.giantstepsmts.com © 2010 GiantSteps Media Technology Strategies 3
  • 4. Slide 4 Copyright and Technology www.copyrightandtechnology.com © 2010 GiantSteps Media Technology Strategies 4
  • 5. Slide 5 www.gothammediaventures.com © 2010 GiantSteps Media Technology Strategies 5
  • 6. Slide 6 What Are We Discussing Today? © 2010 GiantSteps Media Technology Strategies 6
  • 7. Slide 7 Interface between Copyright and Technology T h l  Digital technology used to make and distribute copies at virtually no cost CCopyright i d t h h d various responses, all i ht industry has had i ll interrelated: – Legal L l – Technological – Economic – Education © 2010 GiantSteps Media Technology Strategies 7
  • 8. Slide 8 Technologies to Affect Copyright  Content access control – DRM  Content identification – Filtering – License management © 2010 GiantSteps Media Technology Strategies 8
  • 9. Slide 9 Legal Concepts that Affect These Technologies T h l i  Fair Use  Secondary infringement liability  Network service provider liability  Anticircumvention legislation g  Blanket licensing of content © 2010 GiantSteps Media Technology Strategies 9
  • 10. Slide 10 Technologies © 2010 GiantSteps Media Technology Strategies 10
  • 11. Slide 11 Digital Rights Management © 2010 GiantSteps Media Technology Strategies 11
  • 12. Slide 12 DRM is a troubled technology… technology… Why? © 2010 GiantSteps Media Technology Strategies 12
  • 13. Slide 13 Factors Inhibiting DRM Success*  Market:  Architecture: – Economic incentives – Technological innovation misaligned hampered – Commercial content must compete with free/illegal  Norms:  Laws: – Users don’t see value in don’ – Laws not amenable to choices of offers technological implementation – Norms distorted by architecture (technology) *based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90 Lessig, Cyberspace, 88- © 2010 GiantSteps Media Technology Strategies 13
  • 14. Slide 14 Economic Incentives Misaligned  Content owners demand DRM but rarely pay for it  Device makers and network operators use it to suit their th i own purposes  Consumers have only indirect market influence © 2010 GiantSteps Media Technology Strategies 14
  • 15. Slide 15 Consumers Don’t See Value in Choices Don’ of Off f Offers  Expensive to educate users on unfamiliar offerings – Apple had huge budget to educate about unbundled albums – But Rhapsody Napster etc haven’t educated sufficiently Rhapsody, Napster, etc. haven’ about subscription services  Meanwhile, consumers focused on offline models: Meanwhile – Perception to be fought: • Pay (purchase) must mean ownership; y (p ) p; • Free must mean radio or broadcast TV; TV; • Therefore “free ownership” must be the only real improvement ownership” © 2010 GiantSteps Media Technology Strategies 15
  • 16. Slide 16 Users Influenced towards Infringing Behavior B h i  Definition of DRM commandeered by the press – Narrower than original definitions – Yet broadened to apply to any technology that restricts user behavior in any way*  Notion that DRM == Big Media == Evil  Romanticism & rationalization of hacker/pirate ethic © 2010 GiantSteps Media Technology Strategies 16 *See C. Doctorow, boingboing.net
  • 17. Slide 17 Technological Innovation Hampered  Lack of revenue for DRM vendors  Venture capital scared off – B d press Bad – Non-sexy topic Non-  Researchers scared off R h d ff – RIAA actions against Prof. Ed Felten in 1999 – DRM research “politically incorrect” in US incorrect” (not so much in Europe and Asia) © 2010 GiantSteps Media Technology Strategies 17
  • 18. Slide 18 Laws Not Amenable to Technological Implementation T h l i lI l t ti  Fair Use laws not amenable to automation  Privacy and due process are important but become obstacles  Anticircumvention laws reduce incentive to develop effective technologies – Liability solely on the hacker y y – Effectiveness of TPM/DRM irrelevant to applicability of law (per Universal v Reimerdes, 2000) Reimerdes, 2000) © 2010 GiantSteps Media Technology Strategies 18
  • 19. Slide 19 So… So… Is DRM Dead? © 2010 GiantSteps Media Technology Strategies 19
  • 20. Slide 20 Is DRM Dead?  Short answer: no no. © 2010 GiantSteps Media Technology Strategies 20
  • 21. Slide 21 Is DRM Dead?  Slightly longer answer: Only for permanent Internet music downloads. downloads. © 2010 GiantSteps Media Technology Strategies 21
  • 22. Slide 22 Will DRM Die?  Not where it enables new business models rather than tries to emulate old ones. EExamples: l – Buy single songs instead of albums: iTunes (originally) – Subscription services for music: Rhapsody, Napster, MOG*, Rdio*, Spotify Premium* Rdio*, – Subsidized ecosystems with “free” content: free” Nokia Comes With Music, Play Now Plus, Beyond Oblivion – Library e-book lending: Overdrive e- © 2010 GiantSteps Media Technology Strategies 22 *Yes they do – just don’t call it “DRM” don’ DRM”
  • 23. Slide 23 State of DRM Today  Multi-platform DRM technologies Multi-  E-book DRMs – Marlin (Intertrust) – Amazon – OMA DRM 2.1 (Open Mobile (Kindle & Kindle apps) Alliance) – Adobe Content Server – PlayReady (Microsoft) (most others)  Video DRMs  Other proprietary DRMs – Adobe Flash Access – Apple FairPlay – Widevine – Subscription music services – DivX (Sonic)  Gaming – AACS/BD+ (Blu-ray) AACS/BD (Blu-Blu – SecuROM (S ) S ROM (Sony) – StarForce – ByteShield – TryMedia (RealNetworks) RealNetworks) © 2010 GiantSteps Media Technology Strategies 23
  • 24. Slide 24 Content Identification © 2010 GiantSteps Media Technology Strategies 24
  • 25. Slide 25 Techniques for Identifying Content  Watermarking  Fingerprinting © 2010 GiantSteps Media Technology Strategies 25
  • 26. Slide 26 Watermarking  Inserting/embedding data into “noise” portions of noise” image, audio, or video signal  Data capacity: typically a few dozen bytes  Technology appeared in mid-to-late 1990s mid-to- – First for digital images – Audio and video later  Trade association est. 2006: Digital Watermarking 2006: g g Alliance © 2010 GiantSteps Media Technology Strategies 26
  • 27. Slide 27 Evaluating Watermarks  Undetectability – How little it detracts from user’s experience user’  Robustness – How well it survives copying to lower-resolution or analog f lower- format  Capacity – How much data it can hold (typically a few dozen bytes)  Security – How resistant to attempts to alter or erase  Efficiency – How fast insertion and extraction © 2010 GiantSteps Media Technology Strategies 27
  • 28. Slide 28 Fingerprinting  Examining content to determine its identity – Compute a set of numbers (“fingerprints”) (“fingerprints” – Look up in database, see if there’s a match there’  Based on mathematical concept of hashing – But allows for different files that look/sound the same – C compensate f certain t Can t for t i transformations: f ti excerpting, cropping, audio distortion, etc. © 2010 GiantSteps Media Technology Strategies 28
  • 29. Slide 29 History of Fingerprinting  1999: First important patents issued  2002: Introduced for music during Napster litigation  2005: Major record co’s approve for P2P services co’  2006: Video fingerprinting introduced  2007 2007: “T fingerprinting” (A b ) adopted b AP Text fingerprinting” (Attributor) d f d by © 2010 GiantSteps Media Technology Strategies 29
  • 30. Slide 30 Evaluating Fingerprinting Technologies  Accuracy  Robustness – False positives – Imperviousness to content – False negatives transformations:  Efficiency format changes, – Calculation speed display rate changes, – Ability to register live content deliberate distortions in real time  Content database – Lookup speed – Catalog size & – Fingerprint size comprehensiveness © 2010 GiantSteps Media Technology Strategies 30
  • 31. Slide 31 Content Identification Business B fit B i Benefits  Detecting and deterring unauthorized use  Increasing Internet ad revenue  Tracking content usage  Managing assets and integrating systems g g g g y  Monetizing transformational content uses © 2010 GiantSteps Media Technology Strategies 31
  • 32. Slide 32 Legal Developments …and their Technical Solutions © 2010 GiantSteps Media Technology Strategies 32
  • 33. Slide 33 Legal Developments  Network operator liability  “Free riding” riding”  Blanket licensing © 2010 GiantSteps Media Technology Strategies 33
  • 34. Slide 34 Network Operator Liability  Secondary liability – Contributory: aiding and abetting infringement – Vicarious: “looking the other way” and benefiting from it way” – Inducement: inducing others to infringe as business model  DMCA Safe Harbor – Notice and takedown (512)  Now: content owners pushing for ISP liability – Graduated/Progressive Response a/k/a “three strikes” strikes” – Enacted in France, South Korea, Taiwan , , © 2010 GiantSteps Media Technology Strategies 34
  • 35. Slide 35 Technical Solutions  Fingerprinting  Watermarking  Traffic analysis © 2010 GiantSteps Media Technology Strategies 35
  • 36. Slide 36 “Free Riding” Riding”  Monetizing links to copyrighted content  Monetizing content appearing in search results  Copying of content (e.g. in blogs) without permission © 2010 GiantSteps Media Technology Strategies 36
  • 37. Slide 37 Technical Solutions  Fingerprinting & search  Tagging content with “beacon” metatags – AP hNews beacon”  Tagging content with rules for indexing and search results – ACAP © 2010 GiantSteps Media Technology Strategies 37
  • 38. Slide 38 Blanket Licensing  Just charge all ISP subscribers a levy for content use  Distribute proceeds to licensors… somehow licensors…  Attempted in US on some college campuses for music (Choruss) Choruss)  Considered in the Isle of Man (population 80,000) © 2010 GiantSteps Media Technology Strategies 38
  • 39. Slide 39 Technical Solutions  Fingerprinting for play counting and royalty distribution  Oth i none; t h l -free blunt i t Otherwise technology- technology f bl t instrumentt © 2010 GiantSteps Media Technology Strategies 39
  • 40. Slide 40 Conference Agenda © 2010 GiantSteps Media Technology Strategies 40
  • 41. Slide 41 Morning  Keynote: Stanley Pierre-Louis, Viacom Pierre-  Plenary S i Pl Session: Best Practices for Monetizing Premium Video Content (sponsored b Ad b ) ( d by Adobe) © 2010 GiantSteps Media Technology Strategies 41
  • 42. Slide 42 Afternoon Technology Track Law Track  New Ecosystems for Video  Progressive Response  Content Identification  News Publishing and Fair Technologies Use  What Is the Future of  Policing Copyright: DRM? Whose Job Is It? © 2010 GiantSteps Media Technology Strategies 42
  • 43. Slide 43 Thanks to our Sponsors © 2010 GiantSteps Media Technology Strategies 43
  • 44. Slide 44 And finally… finally… © 2010 GiantSteps Media Technology Strategies 44
  • 45. Slide 45 Recommended Reading Jaron Lanier Lanier, Adrian Johns Johns, You Are Not a Gadget Piracy © 2010 GiantSteps Media Technology Strategies 45