Peer to Peer (P2P) and Cyber Security Thomas Bartlett, Apple Computer Martin Green, Esq. John E. Kolb, Rensselaer 15 July 2005.

Slides:



Advertisements
Similar presentations
Developing the Digital Market October 23, 2006 Mitch Singer EVP Technology and New Media Sony Pictures Entertainment.
Advertisements

Let’s Talk About Cyber Security
MP3 Critics Web-Based Music Downloading Services CSCI 110 Dr. Bowring Matt Lyons Jarrett Bouchette Brittany Bridges.
THE AFTERMATH OF P2P NETWORK DOWNLOADS IN THE MUSIC INDUSTRY AND RIAA {THE NEW DIRECTION OF THE INDUSTRY}
iPOD+ iTUNES SOFTWARE (2001)
Online Content and Media
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
1 Penn State/Napster 2.0 Trial Russell S Vaught Associate Vice Provost, Information Technology Copyright Russell S. Vaught This work.
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Ebook Distribution Contracts Legal Issues and Beyond Cali Bush ©2011 O’Reilly Media, Inc.
Peer-to-Peer (or P2P) From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Corey Chan Andrew Merfeld.
Web Resources Andrew Corallino Feb. 3, 2009 Andrew Corallino Feb. 3, 2009.
John Fennekohl CSC 101. Blogs A blog is a web site, usually maintained by an individual with regular entries of commentary, descriptions of events, or.
Napster By Gediminas Sumyla. Company overview Napster was initially created in 1999 by 19 year old Shawn Fanning who attended Boston Northeastern University.
Social and Economic Impacts of IT Professor Matt Thatcher.
Marketing Music and Theater Chapter 8.3. Today’s Music  The media used for recording and playing back music and the channels of distribution continue.
Opportunities for the Online Distribution of Music, Movies, and other Digital Content on the University and College Campus Technology Task Force Joint.
The Role of Paraprofessionals in Technical Services in Academic Libraries: A Survey Lihong Zhu Head, Technical Services Washington State University Libraries.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Nic Jenkins Mike Boring. History Online music started to become popular in the 1990’s Started with file sharing companies like Kazaa Legal issues led.
This business summary (the “Summary”) contains confidential, non-public and proprietary information about Cdigix and its affiliates. Without the company’s.
Raising awareness in relation to copyright – Facing piracy Christian Sommer Chairman of the Board German Federation against Copyright Theft (GVU)
Quiz Anti Piracy 101.
Digital Entertainment on Campus: The Ruckus Approach Michael Bebel CEO, Ruckus Network, Inc.
Surveys of Media Access and Consumer Attitudes on Copyright Mike Palmedo & Jimmy Koo March 2011 Photo (cc) Irish Typepad (bit.ly/huMnIf)
Intellectual Property Rights Online File Sharing Brett Colbert Wendi Jardin Victor Cortez Brett Colbert Wendi Jardin Victor Cortez.
© Folens 2008 Cultural changes in music Brought about by ICT.
Solo and Small Law Firm - COST RECOVERY ABA GP/SOLO MEMBERSHIP SURVEY RESULTS.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Apple Inc. Kayla Baumann. Background Apple Inc. is an American corporation that designs and manufactures computer hardware, software, and other computer.
1 Good Digital Citizenship: Examining Student Peer-to-Peer Activity at Illinois State University EDUCAUSE Live! David Greenfield, Director Student Technology,
Digital Distribution of Media Issues That Arise From The Use of Digital Distribution. Ross McleodMagnus ReidSwaminathan Nandakumar Illustration by Erin.
The iTunes Store Jack Oh / DipIT0803. History of iTunes Store April 28, 2003 Sept 8, 2003 Oct 16, 2003 Dec 16, 2004 July 18, 2005 Aug 4, 2005 Oct 12,
Shibboleth and Napster. Napster - History One stop shop for pirated (and free) MP3s. –Unlimited use download Sued by Recording Industry Association of.
Penn State/Napster 2.0 Trial Russell S. Vaught Associate Vice Provost Information Technology.
The International e-Depot to Guarantee Permanent Access to Scholarly Publications Marcel Ras Tartu, June 2012.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
EC The transformative character of the IT sector and the eCommerce applications built upon it is deep and provocative. Consider the example of the entertainment.
These five lines tell you the important information about your iPod This capacity bar tells you how much space you have left on your iPod.
Design iPod classic All iPods have five buttons, integrated into the click wheel — a design which gives an uncluttered, minimalist interface. The buttons.
Cdigix at Yale Chuck Powell Director, Academic Media & Technology, ITS Yale University September 15, 2004 Copyright Charles Powell.
| 1 Commercial Scholarly publishing In the world of open access Derk Haank Edinburgh CEO Springer 11 April 2005 Science+ business media.
Department of Professional & Staff Development Career Tech and Special Education Digital Copyright – Media Permissions for 21 st Century Citizenship Presented.
A presentation on an article excerpted from The Wall Street Journal; by Chelsea Eggenschwiller, Ryan Damman, & Kyle Foley.
Digital Commerce By: Ashley Barnett. Standards Model Digital Age Work and Learning Teachers exhibit knowledge, skills, and work processes representative.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Discussion Session: Options for Legal Music and Movie Services John Arpino, The George Washington University Ellen Yu Borkowski, University of Maryland.
Penn State Napster 2.0 Trial1 Penn State/Napster 2.0 Trial Russ Vaught.
Internet2 Spring 2004.pptApril 2004 Napster University Program Elements of Success W. Pence Chief Technology Officer Napster LLC.
Team Wikipedia Distributing digital stored information (computer programs, multi-media, etc). Regular methods : Removable media
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
New Media Technology: The Impact on the Music Industry
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Incorporating PDC Topics into University Level Digital Principles Class Abstract: Digital Computer Principles (CSC 115) is a university wide freshman level.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Avv. Daniela De Pasquale Content Licenses for the new media LL.M. in Intellectual Property 2006 Università degli Studi di Torino - WIPO Università degli.
DMCA Compliance: Adapting Strategies to Hit a Moving Target Jeff Gimbel
Earn money by sharing files on P2P networks
Complete Steps to slay the Apple Music DRM dragon
Online Content and Media
Napster Intellectual Property Rights vs. Music for Free
Icloud Cloud Computing
How Innovation Affects Our Lives
Music Downloads By Garen Mirzoian.
Digital Rights Management (DRM)
Presentation transcript:

Peer to Peer (P2P) and Cyber Security Thomas Bartlett, Apple Computer Martin Green, Esq. John E. Kolb, Rensselaer 15 July 2005

P2P and Cyber Security2Panel n Background –Technology –Services –Legal environment n Discussion of Issues –Legal –Cultural –Policy –Technology –Educational

15 July 2005P2P and Cyber Security3 How to Manage P2P? n Not allow n Limit through policy n Bandwidth limit n Filter based on “signature” of files n Education –Including changing of culture

Background

15 July 2005P2P and Cyber Security5 P2P Technology n Is it a step forward in technology or a step backwards in the use of the network? –Depends on content and use Could this be a method to distribute scholarly materials on all of the digital repositories that are being created?Could this be a method to distribute scholarly materials on all of the digital repositories that are being created? Could this be the technological basis for a new business and distribution model for the entertainment industryCould this be the technological basis for a new business and distribution model for the entertainment industry n Should universities provide a service or should they disintermediate? –iTunes

A Look at the Environment Martin Green, Esq.

iTunes Thomas Bartlett, Apple Computer

15 July 2005P2P and Cyber Security8 How are the Services being Used? n Digital Music News (July 2005) – Napster Faces Difficult Result at University of Rochester Napster faced some dour survey results from the University of Rochester, with most students avoiding paid downloads on the application. Napster has been brokering deals with several universities to provide students with a legal music alternative, with Rochester one college to jump on board. Most recently, UK-based newspaper The Register seized on the results from the recent survey, which showed heavy usage of the on-demand service without any subsequent a-la-carte purchases. A modest 8 percent of respondents indicated that they actually purchased downloads from competing stores like iTunes and MusicMatch, while a sizeable group most likely grabbed additional tracks from various P2P services.

15 July 2005P2P and Cyber Security9 How are the Services being Used? n Digital Music News (July 2005) – Napster Faces Difficult Result at University of Rochester The survey points to a very difficult college crowd, though the Napster application itself appears to be getting heavy usage. 86 percent of those surveyed indicated that they have actively streamed songs, or obtained a tethered download, both of which are covered by university fees. But the students raised concerns over the use of WMA- based DRM on permanent downloads, with most used to the freedom of unprotected MP3s. That highlights an interesting usage pattern, and places a tough spotlight on existing DRM strategies. For Napster, the big question is whether students will opt to continue their subscriptions upon graduation, though so far there is not strong evidence that this will happen.

15 July 2005P2P and Cyber Security10 Fall 2004 Course – Managing IT Resources n “Only the Paranoid Survive” (by Andy Grove) Business Goes on to New Heights Business Declines The Inflection Point

15 July 2005P2P and Cyber Security11 Legal Climate n How many people in this room have had “take down” notices at your institution? n How many have had to respond to subpoenas?

15 July 2005P2P and Cyber Security12 Where does it End? n Music n Movies n Software n Games n Etc.

15 July 2005P2P and Cyber Security13 How to Manage P2P? n Not allow n Limit through policy n Bandwidth limit n Filter based on “signature” of files n Education –Including changing of culture

15 July 2005P2P and Cyber Security14 Some Additional Information n How Much Information 2003? – much-info-2003/printable_report.pdf n CacheLogic – Consumer of Data – n Rensselaer Policy on Electronic Citizenship – n Rensselaer Research Libraries – “hot topics” – n EduCAUSE – n Useful Legal Information –counsel.cua.edu/fedlaw/