The controversy surrounding Copyright has intensified the last year, and there is little indication that it will subside. The digital genie is out of the bottle, and the new economic paradigm surrounding abundance is replacing that of scarcity. Artists and creators fear the future, and ask themselves "How can I make money if anyone can get my stuff for free?"...
Genero is a new distribution and monetization mechanism under development by FriBit, and it is highly relevant for anyone who would like to explore how to make money on creative works in the future.
The presentation is not intended to be used standalone, but accompanies the presentation. NUUG filmed the presentation and it will be made available soon.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
The controversy surrounding Copyright has intensified the last year, and there is little indication that it will subside. The digital genie is out of the bottle, and the new economic paradigm surrounding abundance is replacing that of scarcity. Artists and creators fear the future, and ask themselves "How can I make money if anyone can get my stuff for free?"...
Genero is a new distribution and monetization mechanism under development by FriBit, and it is highly relevant for anyone who would like to explore how to make money on creative works in the future.
The presentation is not intended to be used standalone, but accompanies the presentation. NUUG filmed the presentation and it will be made available soon.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
Legal Liability under the
Digital Millennium Copyright Act and the Communications Decency Act by Daliah Saper, Saper Law Offices, LLC. www.saperlaw.com
Future of Internet Copyrights: Recent Cases and Congressrimonlaw
Congress is currently considering whether copyright law needs to be overhauled for the digital era. Despite the explosion in innovation and creativity on the Internet since passage of the DMCA 15 years ago, tensions have been growing between content owners and technology providers, leading to high profile clashes that will impact the future of the Internet, innovation, and creativity. We will review ongoing Congressional hearings and recent cases that set the stage for these policy discussions and future legislation.
A Dozen and One Things to Know About CopyrightRogan Hamby
This is the original version of the presentation I did at SCLA in 2012. I still need to add citations and I'm already updating it for my next scheduled presentation of it since there were changes in the DMCA just last week!
Copyright infringement is a “strict liability tort,” which means the defendant doesn’t have to have intended to infringe to prove liability. A plaintiff must only demonstrate that the defendant had access to the allegedly infringed song, and that the two songs in question have substantial similarity.
Substantial similarity: whether or not the average listener can tell that one song has been copied from the other. This is the “ordinary observer test” - the hallmark of copyright infringement. The more elements two works have in common, the more likely they are to be ruled substantially similar. Essentially, the jury must decide whether the copying of protected elements was “too much.”
Proving substantial similarity in music cases is complicated by the fact that all songs carry two kinds of copyright, for composition and sound recording, that have to be evaluated independently.
Innocent or Willful Infringement? Factors into statutory damages, and whether expenses can be deducted from profits in determining profits awards.
www.christopher-pappas.com
INTRODUCTION
In 1883, the importance of intellectual property was recognized for first time in the Paris Convention for the Protection of Industrial Property followed by the Berne Convention for the Protection of Literary and Artistic Works in 1886. Nowadays, the Universal Declaration of Human Rights, and to be more specific Article 27, protects the intellectual property rights that a creator or an owner of a patent or copyright has on his/her own work or investment (“What is intellectual property?” n.d.).
It is true to say that countries realized that intellectual property is a powerful tool for economic development and social and cultural welfare. Furthermore, countries wanted to promote creativity and invention especially when the interests of the innovator are the same as those of the public interest. As a result, countries created laws to protect intellectual property.
Moreover, each of us should promote intellectual property rights because of the benefits we join. For example, with the patent system an inventor of a new and highly effective drug for cancer will continue his/her research in order to produce a better and more efficient product. The results of this invention will benefit the members of the society with several ways. Patients will have more possibilities of being cured and the inventor will be rewarded for his creativity.
Intellectual property refers to the intangible property, such as patents, copyrights, trademarks, and trade dress, which belong to a person or a company. To be more specific, it refers to the creations of the mind like: symbols, inventions, artistic works, literary, and images (“Introduction to intellectual property: theory and practice” (1997).
General speaking, intellectual property is divided into two categories:
1. Patent or industrial property, which includes trademarks, inventions, industrial designs, and geographic indications of source; and
2. Copyright, which includes literary and artistic works, such as poems, paintings, plays, films, musical works, novels, drawings, photographs, architectural designs, and sculptures (“What is intellectual property” n.d.).
Moreover, a patent for an invention is an exclusive right granted to the inventor, issued by the United States Patent and Trademark Office. A patent provides protection for the invention to the owner of the patent for a limited period, generally 20 years from the date the application for the patent was filed in the United States and the maintenance fees were paid. Moreover, U.S. patent grants are effective only within the United States, U.S. territories, and U.S. possessions. Patent protection means that the invention cannot be commercially made, used, distributed, or sold without the patent owner’s consent. Furthermore, a patent owner can sell the right of the invention to someone else, who will become the new owner of the patent. When a patent expires the protection ends, and as a result, the invention becomes available to commercial exploitation by others (“What is a patent?” 2005).
Also, there are several types of patents but the most common are three:
1. Utility or function patents, such as a process, machine, article of manufacture, or composition of matter,
2. Design patents, such as a new, original, and ornamental design for an article of manufacture; and
3. Plant patents, such as a distinct and new variety of plant (“What is patent? n.d).
Furthermore, the purpose of copyrights is to protect the expression of ideas. In other words, it protects the rights of the authors and creators in any field, such as literary, dramatic, musical, artistic, and certain other intellectual works, both published and unpublished. As Jennings M. (2006), states: “A copyright gives the holder of the copyright the exclusive right to sell, control, or license the copyrighted work.” (p. 624)
According to the Section 106 of the 1976 Copyright Act, the holder
Soundstreams New Models of Distribution Conference - Socan Getting The Music Outsoundstreams
SOCAN administers the communication and performing rights of virtually the world's entire repertoire of copyright-protected music, when it is used in Canada. The following presentation was used by Paul Spurgeon, VP Legal Services and General Counsel, SOCAN.
Insurance Distribution Conference, 17th Jan 2008Mahavir Chopra
The Presentation was rolled in at the Insurance Distribution Conference at ITC Grand Maratha Sheraton. The presentation provides a detailed note and road map to the beginning of a multi-layered online Insurance distribution channel in India.
Market penetration involves trying to gain additional share of a firm’s existing markets using existing products. Often firms will rely on advertising to attract new customers with existing markets.
Legal Liability under the
Digital Millennium Copyright Act and the Communications Decency Act by Daliah Saper, Saper Law Offices, LLC. www.saperlaw.com
Future of Internet Copyrights: Recent Cases and Congressrimonlaw
Congress is currently considering whether copyright law needs to be overhauled for the digital era. Despite the explosion in innovation and creativity on the Internet since passage of the DMCA 15 years ago, tensions have been growing between content owners and technology providers, leading to high profile clashes that will impact the future of the Internet, innovation, and creativity. We will review ongoing Congressional hearings and recent cases that set the stage for these policy discussions and future legislation.
A Dozen and One Things to Know About CopyrightRogan Hamby
This is the original version of the presentation I did at SCLA in 2012. I still need to add citations and I'm already updating it for my next scheduled presentation of it since there were changes in the DMCA just last week!
Copyright infringement is a “strict liability tort,” which means the defendant doesn’t have to have intended to infringe to prove liability. A plaintiff must only demonstrate that the defendant had access to the allegedly infringed song, and that the two songs in question have substantial similarity.
Substantial similarity: whether or not the average listener can tell that one song has been copied from the other. This is the “ordinary observer test” - the hallmark of copyright infringement. The more elements two works have in common, the more likely they are to be ruled substantially similar. Essentially, the jury must decide whether the copying of protected elements was “too much.”
Proving substantial similarity in music cases is complicated by the fact that all songs carry two kinds of copyright, for composition and sound recording, that have to be evaluated independently.
Innocent or Willful Infringement? Factors into statutory damages, and whether expenses can be deducted from profits in determining profits awards.
www.christopher-pappas.com
INTRODUCTION
In 1883, the importance of intellectual property was recognized for first time in the Paris Convention for the Protection of Industrial Property followed by the Berne Convention for the Protection of Literary and Artistic Works in 1886. Nowadays, the Universal Declaration of Human Rights, and to be more specific Article 27, protects the intellectual property rights that a creator or an owner of a patent or copyright has on his/her own work or investment (“What is intellectual property?” n.d.).
It is true to say that countries realized that intellectual property is a powerful tool for economic development and social and cultural welfare. Furthermore, countries wanted to promote creativity and invention especially when the interests of the innovator are the same as those of the public interest. As a result, countries created laws to protect intellectual property.
Moreover, each of us should promote intellectual property rights because of the benefits we join. For example, with the patent system an inventor of a new and highly effective drug for cancer will continue his/her research in order to produce a better and more efficient product. The results of this invention will benefit the members of the society with several ways. Patients will have more possibilities of being cured and the inventor will be rewarded for his creativity.
Intellectual property refers to the intangible property, such as patents, copyrights, trademarks, and trade dress, which belong to a person or a company. To be more specific, it refers to the creations of the mind like: symbols, inventions, artistic works, literary, and images (“Introduction to intellectual property: theory and practice” (1997).
General speaking, intellectual property is divided into two categories:
1. Patent or industrial property, which includes trademarks, inventions, industrial designs, and geographic indications of source; and
2. Copyright, which includes literary and artistic works, such as poems, paintings, plays, films, musical works, novels, drawings, photographs, architectural designs, and sculptures (“What is intellectual property” n.d.).
Moreover, a patent for an invention is an exclusive right granted to the inventor, issued by the United States Patent and Trademark Office. A patent provides protection for the invention to the owner of the patent for a limited period, generally 20 years from the date the application for the patent was filed in the United States and the maintenance fees were paid. Moreover, U.S. patent grants are effective only within the United States, U.S. territories, and U.S. possessions. Patent protection means that the invention cannot be commercially made, used, distributed, or sold without the patent owner’s consent. Furthermore, a patent owner can sell the right of the invention to someone else, who will become the new owner of the patent. When a patent expires the protection ends, and as a result, the invention becomes available to commercial exploitation by others (“What is a patent?” 2005).
Also, there are several types of patents but the most common are three:
1. Utility or function patents, such as a process, machine, article of manufacture, or composition of matter,
2. Design patents, such as a new, original, and ornamental design for an article of manufacture; and
3. Plant patents, such as a distinct and new variety of plant (“What is patent? n.d).
Furthermore, the purpose of copyrights is to protect the expression of ideas. In other words, it protects the rights of the authors and creators in any field, such as literary, dramatic, musical, artistic, and certain other intellectual works, both published and unpublished. As Jennings M. (2006), states: “A copyright gives the holder of the copyright the exclusive right to sell, control, or license the copyrighted work.” (p. 624)
According to the Section 106 of the 1976 Copyright Act, the holder
Soundstreams New Models of Distribution Conference - Socan Getting The Music Outsoundstreams
SOCAN administers the communication and performing rights of virtually the world's entire repertoire of copyright-protected music, when it is used in Canada. The following presentation was used by Paul Spurgeon, VP Legal Services and General Counsel, SOCAN.
Insurance Distribution Conference, 17th Jan 2008Mahavir Chopra
The Presentation was rolled in at the Insurance Distribution Conference at ITC Grand Maratha Sheraton. The presentation provides a detailed note and road map to the beginning of a multi-layered online Insurance distribution channel in India.
Market penetration involves trying to gain additional share of a firm’s existing markets using existing products. Often firms will rely on advertising to attract new customers with existing markets.
The controversy surrounding Copyright has intensified the last year, and there is little indication that it will subside. The digital genie is out of the bottle, and the new economic paradigm surrounding abundance is replacing that of scarcity. Artists and creators fear the future, and ask themselves "How can I make money if anyone can get my stuff for free?"...
Genero is a new distribution and monetization mechanism under development by FriBit, and it is highly relevant for anyone who would like to explore how to make money on creative works in the future.
The presentation is not intended to be used standalone, but accompanies the presentation. NUUG filmed the presentation and it will be made available soon
Presentation in Norwegian for OsloMet on Internet of Things and Privacy.
The presentation material holds much in common with previous slides, as it is the principles that matter. Updated with current events, in particular with AI, electric cars and China social scoring.
Presentation in Norwegian on Internet of Things and Privacy.
Presentation is mostly images and bullet points, not intended as a standalone presentation.
Internet of Things and Privacy.
The presentation is in Norwegian, but I can translate it into English upon request. Note that the presentation is mostly images and assumes that the presenter know what they represent and speaks on that. The presentation is not intended to be self-explanatory.
Guide til debatt om fildeling. Brosjyren er ment til å skrive ut tosidig og brettes til 1/3 ark.
Guiden har huskeregler for fildelingsdebatter, vanlige argumenter, kort ordliste og kategorier av fildeling
Introduction to internal Telenor seminar about openness. The intention of the seminar was to introduce openness, and to begin an evaluation about how openness can be used for "Best Practice" within Telenor
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
22. Roles separated to get non-exclusivity Content owner User Content owner Content owner User User Aggregator Distributør Distributør Aggregator
23. Needs an independent registry Content owner User Content owner Content owner User User Aggregator Distributor Distributor Aggregator Registry
24. Example roles Writer User Public Library Registry Musician Painter User User Internet Archive FreeArt.com MSN music store Registration Co.
25. Eksempel of use John Walsh Peter: Reads the book for free on his PC Public Library Registry Walter: Buys the paperback FreeBooks.com HardPop Writers Guild $ 5 $ 20 free John’s chosen licence sais digital copies are free, if you publish a paper book give me 5 bucks
26. Content owner Owner of the content. Can be an individual or company Content registrar Facilitates access to Content registry User registry Public registry of which users owns which content Application User Consumes the content Application Distributor Distributes content Content registry Public registry of Content