Download presentation
Presentation is loading. Please wait.
1
Peer to Peer (P2P) and Cyber Security Thomas Bartlett, Apple Computer Martin Green, Esq. John E. Kolb, Rensselaer 15 July 2005
2
P2P and Cyber Security2Panel n Background –Technology –Services –Legal environment n Discussion of Issues –Legal –Cultural –Policy –Technology –Educational
3
15 July 2005P2P and Cyber Security3 How to Manage P2P? n Not allow n Limit through policy n Bandwidth limit n Filter based on “signature” of files n Education –Including changing of culture
4
Background
5
15 July 2005P2P and Cyber Security5 P2P Technology n Is it a step forward in technology or a step backwards in the use of the network? –Depends on content and use Could this be a method to distribute scholarly materials on all of the digital repositories that are being created?Could this be a method to distribute scholarly materials on all of the digital repositories that are being created? Could this be the technological basis for a new business and distribution model for the entertainment industryCould this be the technological basis for a new business and distribution model for the entertainment industry n Should universities provide a service or should they disintermediate? –iTunes
6
A Look at the Environment Martin Green, Esq.
7
iTunes Thomas Bartlett, Apple Computer
8
15 July 2005P2P and Cyber Security8 How are the Services being Used? n Digital Music News (July 2005) – Napster Faces Difficult Result at University of Rochester Napster faced some dour survey results from the University of Rochester, with most students avoiding paid downloads on the application. Napster has been brokering deals with several universities to provide students with a legal music alternative, with Rochester one college to jump on board. Most recently, UK-based newspaper The Register seized on the results from the recent survey, which showed heavy usage of the on-demand service without any subsequent a-la-carte purchases. A modest 8 percent of respondents indicated that they actually purchased downloads from competing stores like iTunes and MusicMatch, while a sizeable group most likely grabbed additional tracks from various P2P services.
9
15 July 2005P2P and Cyber Security9 How are the Services being Used? n Digital Music News (July 2005) – Napster Faces Difficult Result at University of Rochester The survey points to a very difficult college crowd, though the Napster application itself appears to be getting heavy usage. 86 percent of those surveyed indicated that they have actively streamed songs, or obtained a tethered download, both of which are covered by university fees. But the students raised concerns over the use of WMA- based DRM on permanent downloads, with most used to the freedom of unprotected MP3s. That highlights an interesting usage pattern, and places a tough spotlight on existing DRM strategies. For Napster, the big question is whether students will opt to continue their subscriptions upon graduation, though so far there is not strong evidence that this will happen.
10
15 July 2005P2P and Cyber Security10 Fall 2004 Course – Managing IT Resources n “Only the Paranoid Survive” (by Andy Grove) Business Goes on to New Heights Business Declines The Inflection Point
11
15 July 2005P2P and Cyber Security11 Legal Climate n How many people in this room have had “take down” notices at your institution? n How many have had to respond to subpoenas?
12
15 July 2005P2P and Cyber Security12 Where does it End? n Music n Movies n Software n Games n Etc.
13
15 July 2005P2P and Cyber Security13 How to Manage P2P? n Not allow n Limit through policy n Bandwidth limit n Filter based on “signature” of files n Education –Including changing of culture
14
15 July 2005P2P and Cyber Security14 Some Additional Information n How Much Information 2003? –http://www.sims.berkeley.edu/research/projects/how- much-info-2003/printable_report.pdf n CacheLogic – Consumer of Data –http://www.cachelogic.com/research/slide3.php n Rensselaer Policy on Electronic Citizenship –www.rpi.edu/web/comec n Rensselaer Research Libraries – “hot topics” –www.lib.rpi.edu/services/reserves/copyrighttopics.html n EduCAUSE –www.educause.edu/conference/policy/2005/ n Useful Legal Information –counsel.cua.edu/fedlaw/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.