Rightscorp, a provider of monetization services for artists and holders of copyrighted Intellectual Property (IP), announced that it plans to expand its copyright monetization services into the consumer book publishing market. Rightscorp will soon represent authors and publishing companies by monitoring and monetizing their digital assets against copyright infringement and illegal downloading.
Posted Apr 15, 2014
Sookasa, Inc., a provider of compliance for popular cloud applications and mobile devices, introduced Sookasa Cloud Compliance Service, a Compliance as a Service solution that simplifies the protection of sensitive files across popular cloud services and mobile devices. Sookasa enables professionals to natively use their favorite cloud services, such as Dropbox and Gmail, and mobile devices, while transparently encrypting sensitive data and addressing regulations such as HIPAA and FERPA.
Posted Apr 10, 2014
Lumeta Corporation announced the addition of cloud and virtual machine (VM) versions of its Lumeta IPsonar and Lumeta Enterprise Situational Intelligence (ESI) network situational awareness solutions. With these new deployment capabilities, customers can take advantage of the convenience and quick implementation of a software-as-a-service (SaaS) delivery model, as well as benefit from a pay-as-you-go alternative to on-premises infrastructure. Additionally, because Lumeta ESI listens to and crawls physical or virtual networks in near-real time, ESI enables organizations to gain network situational awareness of their presence in private, public, and hybrid clouds.
Posted Mar 18, 2014
Based on initial results with Ford Fiesta, Chiquita, Xbox, Salvation Army, United Way of Southeastern Michigan, Moosejaw, and Kabam, Are You a Human-- a Detroit start up that specializes in game-based verification systems -- has broadly launched PlayThru a verification ad unit that allows marketers to deliver a brand message while users play a quick game to prove they are, well, human. PlayThru can replace CAPTCHA, a series of distorted characters traditionally used by websites.
Posted Oct 29, 2013
Copyright Clearance Center, Inc. (CCC), a not-for-profit organization creating global licensing and content solutions for copyright, announced key findings from Outsell's 2013 study on Enterprise Information Access, Consumption and Use. According to the data, 48% of executives believe it's acceptable to share information as long as it's not used for commercial purposes, and 45% believe digital or print paid information is fine to share.
Posted Jul 22, 2013
From encrypted passwords to firewalls, a company will expend immeasurable amounts of energy and money to protect its information. Just keeping data safe from outside assaults is an on going task, but company outsiders are no longer the only ones who pose a threat. Insiders with unlimited access to sensitive data can cause just as much damage to an organization as the average hacker. On July 13, 2010, Imperva, a data security company, aims to mitigate the problems that accompany securing sensitive information with the release of SecureSphere File Security.
By Eileen Mullan
Posted Jul 13, 2010
OnCopyright 2010, a 1-day event held at the Union League Club in New York City and sponsored by the Copyright Clearance Center (CCC), tackled the issue of copyright from four vantage points: art, society, technology, and law. The 19 experts from these four sectors provided insights into the changing parameters of remixing, mashups, collaboration, and disruptive technology.
For social network junkies-and companies that rely on sites such as Twitter and Facebook to interact with clients-Aug. 6 was a bleak day. A massive distributed denial-of-service (DDoS) attack targeting a single pro-Georgian blogger drastically slowed or stopped five major sites: Facebook, Twitter, YouTube, LiveJournal, and Fotki.
This year, when Proofpoint, Inc., an email security and data loss provider, conducted its annual study on outbound email and data loss prevention issues, it had an additional question in mind: Is the recession creating an increased risk? By the time "Outbound Email and Data Loss Prevention in Today's Enterprise, 2009" was released in July, Proofpoint had found the connection it was looking for.
Everybody is doing it: "tweeting," that is. Yet like so many other things that are all the rage, Twitter has a bit of a dark side. No, I'm not talking about users who detail their entire day via the microblogging site. Recently, concerns about hacking and "maltweets" have plagued users of the popular free social networking site and others.
The recent proposal of the Commercial Felony Streaming Act, and the uproar over the potential it holds to send artists like Justin Bieber to jail for copyright violation, has put the subject of intellectual property and copyright on the front page. The following is an excerpt from a chapter in the book, Dancing with Digital Natives: Staying in Step with the Generation That's Transforming the Way Business is Done. The full chapter is titled: "Ethics, Technology, and the Net Generation: Rethinking Intellectual Property Law" and is written by Albert M. Erisman. The book is available on Amazon, Barnes & Noble, and other retailers in e-book and print format.
By Albert M. Erisman
Posted Oct 27, 2011
In October, The Wall Street Journal reported that several popular Facebook applications had been transmitting users' personal identifying information to literally dozens of advertising and internet tracking companies. While Facebook maintains that there is "no evidence that any personal information was misused or even collected as a result of this issue," not all observers have been appeased.
The question bellows this year from every podium, in every digital media conference panel, and in reams of articles. Will users finally start paying for their online content when so many alternatives crowd a search-driven, user-generated, all-you-can eat buffet of free? Well, we'll spare you the suspense. The short answer is: Online, users already pay for content.
By Steve Smith
- April 2010 Issue
Posted Apr 07, 2010
Social networking sites and online collaboration tools make it easier for employees to collaborate and share their knowledge. Add email and instant messaging (IM) to the mix and the result is a knowledge-sharing system that can bolster communication and productivity throughout an enterprise.
With so much enterprise information now residing online and in overlapping applications both inside and outside firewalls, with employees and contractors dispersed in offices around the globe, and with software as a service becoming an everyday part of enterprise architecture, the need for flexible and secure identity and access management has become of foremost importance for any organization.
In light of Edward Snowden's recent disclosure that the NSA is keeping tabs on our every electronic move, it's hard not to think about privacy (or the lack thereof). While I often try to ignore it, sometimes it feels like science fiction movies (starring Tom Cruise...of course) about the watchful eye of the government are slowly becoming reality. That's when I begin worrying about the fabric of society. Shouldn't we all be worried about our privacy (especially if Tom Cruise isn't going to fix this problem)? Not surprisingly though, some of us worry more than others.
Column/Dispatches from Digital Natives
By Eileen Mullan
Posted Jul 04, 2013
Tor/Forge Books, a Macmillan imprint, announced in April that it would remove DRM (digital rights management) from its books. Many readers and authors were ecstatic. They believe that DRM is too restrictive and hinders end users from using/storing/sharing/enjoying ebooks in perfectly legal ways. Naysayers were sure that removing DRM was like handing over the keys to the store to digital pirates and that sales would plummet.
By Peggy Hageman
Posted Aug 16, 2012
Lately, it seems that every other article about ebooks is news about a new lawsuit. Ebooks have a series of legal ramifications inherent to the format, problems that did not exist (or did but to a far lesser degree) in other book formats. Collusion, piracy, and who owns the right to publish what are just a few of the legal boondoggles that ebook publishers and authors are currently facing.
By Peggy Hageman
- June 2012 Issue
Posted Jun 12, 2012
A recent PricewaterhouseCoopers report titled "Trial by Fire," found that in a global survey of 7,200 senior managers responsible for information security, not one reference to the problems arising from search security are to be found. Securing search should be a key concern in search implementations, however.
July/August 2010 Issue
Posted Jul 21, 2010
Dear Warner Music Group Executives:
The BBC reports that 20 million people wanted to purchase tickets to the historic Led Zeppelin show held at the O2 Arena on Dec. 10, 2007. Needless to say, with only 20,000 tickets available, there were many disappointed fans who couldn’t be there when the band took the stage for the first time in 19 years.
By David Meerman Scott
- April 2007 Issue
Posted Mar 28, 2008