This document summarizes a conference on copyright and technology. It includes:
- An overview of the interface between digital technology and copyright, and how legal, technological, economic, and educational factors are interrelated.
- A discussion of technologies like digital rights management (DRM) and content identification techniques like watermarking and fingerprinting that can affect copyright.
- An examination of legal concepts like fair use, exhaustion, and network service provider liability, and their related technical solutions.
- Details on the agenda for the conference, including keynote speakers on policing piracy and panels on content security, identification, and international law perspectives.
Future of Internet Copyrights: Recent Cases and Congressrimonlaw
Â
Congress is currently considering whether copyright law needs to be overhauled for the digital era. Despite the explosion in innovation and creativity on the Internet since passage of the DMCA 15 years ago, tensions have been growing between content owners and technology providers, leading to high profile clashes that will impact the future of the Internet, innovation, and creativity. We will review ongoing Congressional hearings and recent cases that set the stage for these policy discussions and future legislation.
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
Â
This presentation for the Digital Initiative at Harvard Business School looks at how digitization interacts with the patent system and the systemic dysfunction that results. This version is annotated for the benefit of the reader.
Future of Internet Copyrights: Recent Cases and Congressrimonlaw
Â
Congress is currently considering whether copyright law needs to be overhauled for the digital era. Despite the explosion in innovation and creativity on the Internet since passage of the DMCA 15 years ago, tensions have been growing between content owners and technology providers, leading to high profile clashes that will impact the future of the Internet, innovation, and creativity. We will review ongoing Congressional hearings and recent cases that set the stage for these policy discussions and future legislation.
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
Â
This presentation for the Digital Initiative at Harvard Business School looks at how digitization interacts with the patent system and the systemic dysfunction that results. This version is annotated for the benefit of the reader.
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
Â
Intellectual Property in Cyberspace, Linking, In lining and Framing, P2P Networking,
Webtesting, Domain Names, Management of IPRs in cyberspace, Liabilities of Internet Services Providers, Digital Rights Management, Search Engines and their
Abuse, Non-original Database
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
Â
Piracy and file sharing: challenges and perspectives for the Digital Renaissancetechnical point of viewC.A.P.I. European Federation: slides for the forum discussion 23rd  February 2010, 14.00 â 15.30, European Parliament, Room : JAN 6Q1
A Dozen and One Things to Know About CopyrightRogan Hamby
Â
This is the original version of the presentation I did at SCLA in 2012. I still need to add citations and I'm already updating it for my next scheduled presentation of it since there were changes in the DMCA just last week!
Clyde Wayne Crews Jr., VP for Policy and Director of Technology Studies at the Competitive Enterprise Institute, wrote about the splinternets concept for Forbes in 2001, calling splinternets multiple Internets âwhere prespecified ground rules regarding privacy and other governance issues replace regulation and central planning.â
Protecting Your Intellectual Property and your BrandNow Dentons
Â
In this presentation FMC's Margot Patterson discusses protecting intellectual property and brands through discussion related to the Copyright Modernization Act, how Social Media is changing marketing practices and best practices for third-party content (partners & consumers).
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
Â
Intellectual Property in Cyberspace, Linking, In lining and Framing, P2P Networking,
Webtesting, Domain Names, Management of IPRs in cyberspace, Liabilities of Internet Services Providers, Digital Rights Management, Search Engines and their
Abuse, Non-original Database
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
Â
Piracy and file sharing: challenges and perspectives for the Digital Renaissancetechnical point of viewC.A.P.I. European Federation: slides for the forum discussion 23rd  February 2010, 14.00 â 15.30, European Parliament, Room : JAN 6Q1
A Dozen and One Things to Know About CopyrightRogan Hamby
Â
This is the original version of the presentation I did at SCLA in 2012. I still need to add citations and I'm already updating it for my next scheduled presentation of it since there were changes in the DMCA just last week!
Clyde Wayne Crews Jr., VP for Policy and Director of Technology Studies at the Competitive Enterprise Institute, wrote about the splinternets concept for Forbes in 2001, calling splinternets multiple Internets âwhere prespecified ground rules regarding privacy and other governance issues replace regulation and central planning.â
Protecting Your Intellectual Property and your BrandNow Dentons
Â
In this presentation FMC's Margot Patterson discusses protecting intellectual property and brands through discussion related to the Copyright Modernization Act, how Social Media is changing marketing practices and best practices for third-party content (partners & consumers).
Linksvayer, M. (2009, July 28). Panel on Open Source, The Commons as a collective intelligence meta-innovation. Retrieved Retrieved May 7, 2010, from http://slidesha.re/9ZXtHl.
Keynote Presentation given at US Patent and Trademark Office conference on Developing the Digital Marketplace for Copyrighted Works, January 25, 2018, Washington, DC
Guest lecture given at Carnegie-Mellon University April 29. 2014. Describes the history of digital technology in book publishing and six aspects of disruption: the retail market, interoperability, self-publishing, content forms, revenue models, and copyright.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Â
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Â
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
Â
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Â
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Â
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But thereâs more:
In a second workflow supporting the same use case, youâll see:
Your campaign sent to target colleagues for approval
If the âApproveâ button is clicked, a Jira/Zendesk ticket is created for the marketing design team
Butâif the âRejectâ button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
7. American Conference Jargon
American British
Attendee Delegate
Seat Place
Booth Stand
Cocktail party Drinks reception
Butts in seats Bums in seats
Ripoff VAT
7
9. Interface between Copyright and
Technology
T h l
ïDigital technology used to make and distribute copies
at virtually no cost
ïCopyright i d t responses, all i t l t d
ïC i ht industry ll interrelated:
â Legal
â Technological
â Economic
â Education
9
11. Legal Concepts that Affect These
Technologies
T h l i
ïFair Dealing
ïExhaustion
ïSecondary infringement liability
ïNetwork service provider liability
p y
ïAnticircumvention legislation
ïBlanket licensing of content
11
14. DRM is a âtroubledâ* technologyâŠ
Why?
*Jaron Lanier, You Are Not a Gadget, 2010
14
15. Factors Inhibiting DRM Success*
ï Market: ï Architecture:
â Economic incentives â Technological innovation
misaligned hampered
â Commercial content must
compete with free/illegal
ï Norms: ï Laws:
â Users donât see value in â Laws not amenable to
choices of offers technological implementation
â Norms distorted by
architecture (technology)
*Based on L. Lessig, Code and Other Laws of Cyberspace, 1999, pp. 88-90
15
16. Market:
Economic Incentives Misaligned
E i I ti Mi li d
ïContent owners demand DRM but rarely pay for it
ïDevice makers and network operators use it to suit
their
th i own purposes
ïConsumers have only indirect market influence
16
17. Norms:
Consumers Donât Yet See Value in N Models
C D ât Y t S V l i New M d l
Radio
ulations
Record Store
Legacy
Emu
VCR
Bookstore
Dig Native
Free/Limited VOD
New,
gital
Paid Subscription VOD
On Demand Music
0 10 20 30 40 50 60 70 80 90 100
Million U.S. Users (estimated)
17
18. Norms:
Users Influenced towards Infringing B h i
U I fl dt d I f i i Behavior
ïDefinition of DRM commandeered by the press
â Narrower than original definitions
â Yet broadened to apply to any technology that restricts user
behavior in any way1
ïNotion that DRM ï Big Media ï Evil/Obsolete
ïRomanticism & rationalization of hacker/pirate ethic
ïâLords f the Cloudâ t the âfree d
ïâL d of th Cl dâ2 get th âf and openâ PR3 â
1C. Doctorow, M. Masnick, etc.
2J
Jaron Lanier, Y A Not a Gadget
L i You Are N t G d t
3Robert Levine, Free Ride
18
19. Architecture:
Technological I
T h l i l Innovation Hampered
ti H d
ïLack of revenue for DRM vendors
ïVenture capital scared off
â B d press
Bad
â Non-sexy topic
ïResearchers scared off
ïR h d ff
â RIAA actions against Prof. Ed Felten in 1999
â DRM research âpolitically incorrectâ in U S
politically incorrect U.S.
19
20. The Rights Technologies R&D Imbalance
450 70
400
60
350
50
300
250 40 2009 Gross Expenâ
ditures on R&DÂ
200 30 ($Billion)
150
Rights TechnologiesÂ
20 p
R&DÂ OutputÂ
100 (Research Papers)
10 Rights TechnologyÂ
50
R&DÂ Index
0 0
Device Producers Content Producers
Sources: O C IMF
S OECD,
20
21. Laws Not Amenable to
Technological Implementation
T h l i lI l t ti
ï Fair Dealing/Fair Use laws not amenable to automation
ï Privacy and due process are important but become obstacles
ï Anticircumvention laws reduce incentive to develop effective
technologies; liability solely on the hacker
21
22. Yet DRM Is Alive TodayâŠ
Downloads Real Time Delivery
E-books Yes âScreenshot DRMâ
(page images)
Music Mobile device Usually
âoffline listening (stream encryption)
modeâ
d â
Video Yes In most release
windows
(stream encryption)
(t ti )
22
23. Will DRM Die?
Not Wh
N t When It Enables N Models
E bl New M d l
ïService investment protection
â Music: iTunes (originally)
â E-books: Amazon
E books:
â Digital pay TV
ïBusiness models
â Subscription music services: Spotify, Deezer, etc
â Library e-book lending: OverDrive
y g
ïSubsidized content
â Amazon Prime: one e-book at a time âlendingâ
g
â MuveMusic: unlimited music downloads with phone
23
26. Watermarking
ïInserting/embedding data into ânoiseâ portions of
noise
image, audio, or video signal
ïInserting invisible data into e-book files
ïInserting visible personal info into e-book files
ïData capacity: typically a few dozen bytes
ïTechnology appeared in mid-to-late 1990s
â First for digital images
â Audio and video later
â PDFs & EPUBs most recent
26
27. Fingerprinting
ïExamining content to determine its identity
â Compute a set of numbers (âfingerprintsâ)
â Look up in database, see if thereâs a match
ïBased on mathematical concept of hashing
â But allows for different files that look/sound the same
â Can compensate for certain transformations:
excerpting, cropping, audio distortion, etc.
ïHistory:
y
â 2002: Introduced for music during Napster litigation
â 2006: Video fingerprinting introduced
â 2007 âT t fi
2007: âText fingerprintingâ (Att ib t ) adopted b AP
i ti â (Attributor) d t d by
27
28. Content Identification
Business B fit
B i Benefits
ïDetecting and deterring unauthorized use
ïTracking content usage
ïDiscovery & recommendations
ïIncreasing Internet ad revenue
g
ïManaging assets and integrating systems
ïMonetizing transformational content uses
28
31. Network Operator Liability
ïSecondary liability (US defâns)
def ns)
â Contributory: aiding and abetting infringement
â Vicarious: âlooking the other wayâ and benefiting from it
looking way
â Inducement: inducing others to infringe as business model
ïISP responsibility
â Notice and takedown (US)
â Notice and notice (Canada)
( )
â Graduated Response
(France, South Korea, Taiwan, New Zealand, UK)
31
33. âFree Ridingâ
ïMonetizing links to copyrighted content
ïPosting links to illegal content (e.g. in cyberlockers)
ïMonetizing content appearing in search results
ïâCloud syncâ services(?)
y ()
33
34. Technical Solutions
ïFingerprinting & search
ïTagging content with âbeaconâ metatags â AP hNews
ïTagging content with rules for indexing and search
results â ACAP
34
35. Exhaustion
ïIf you obtain a copyrighted work legally
legally,
you can do what you want with it
ïApplicability to digital d l d is
ïA li bilit t di it l downloads i unclear l
ïU.S. Copyright Office punted on it in 2001 report
ïDownloads covered under licenses, not copyright
35
36. Technical Solutions
ï Forward
ïâForward and deleteâ DRM like functionality
delete DRM-like
ïDescribed in 2001 U.S. Copyright Office paper
ïImplemented by U.S. startup ReDigi
ïDescribed in IEEE P1817 standard for
âConsumer Ownable Digital Personal Propertyâ
36
38. Morning
ïKeynote:
Eric Walter, General Secretary, HADOPI
ïPlenary Session: Policing Pi
ïPl S i P li i Piracy
ïPlenary Session:
The Yin and Yang of Piracy Data Collection
(sponsored by MarkMonitor)
38
39. Afternoon
Technology Track Law & Policy Track
ï Content Security ï Rights Registries: Bringing
Challenges in Multi
Multi- Precision and Efficiency to
Platform Distribution Rights Licensing
ï Content Identification: ï International Perspectives
Progressive Response, on Digital Copyright
Media Measurement and
More
39