SlideShare a Scribd company logo
1 of 20
DRM:  Evolution & E-books
DRM: Basic Info ,[object Object],[object Object],[object Object],[object Object]
DRM: Now
   
:58-1:14
DRM: Privacy Violations ,[object Object],[object Object],[object Object],[object Object]
Reaction:  Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
DRM: Non E-books ,[object Object],[object Object]
Interoperability: E-books ,[object Object]
Ipod & Kindle
  Kindle Scandal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nook and Sony Reader ,[object Object],[object Object],[object Object],[object Object],[object Object]
Epub ,[object Object],[object Object],[object Object],[object Object]
Adobe Epub ,[object Object],[object Object],[object Object],[object Object]
Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?     1. Use “Customized for…” with the user’s name and e-mail address.    2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy      According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.    
Back Lash ,[object Object],[object Object],[object Object],[object Object]
Author’s Take ,[object Object],[object Object],[object Object]
Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.    "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."    Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  
DRM=Piracy

More Related Content

Viewers also liked

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • GuanacasteSilvia Pacheco
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1F2G1
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Harold Smits
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Harold Smits
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpointguest67c25f
 

Viewers also liked (9)

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • Guanacaste
 
P2
P2P2
P2
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1
 
Edificio buen campo
Edificio buen campoEdificio buen campo
Edificio buen campo
 
Some Projects
Some ProjectsSome Projects
Some Projects
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
 
Michelangelo
MichelangeloMichelangelo
Michelangelo
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpoint
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Burstyn Ccc

  • 2.
  • 6.
  • 7. Reaction: Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?    1. Use “Customized for…” with the user’s name and e-mail address.   2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
  • 16. Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy     According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.   
  • 17.
  • 18.
  • 19. Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.   "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."   Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  

Editor's Notes

  1. The current DRM system is nothing more than a usage license, that use-based DRM systems are contracts of adhesion between the consumer and the copyright holder in which the consumer is restricted to agreeing with draconian DRM policies.  
  2. Step 1: The consumer makes a request from the license server for a valid, unique set of rights. Step 2: The license server evaluates the request from the consumer. The server then compares these requests to a standard of rules and policies. It then determines what rights can be granted and then that set of rights is granted to the consumer. Step 3: The license server presents the consumer with a set of rights that closely matches the request. Step 4: The consumer obtains a satisfactory set of rights or can choose to go back to step I.
  3. Similar to iTunes content, you can share eBooks between up to six Kindles on the same account     No one but Apple is allowed to make players for iTunes Music Store songs, and no one but Apple can sell you proprietary file-format music that will play on the iPod. Yay DMCA They were able to create an eBook ecosystem where their customers purchased content solely through Amazon. As Apple had done with digital music, Amazon was now doing with eBooks.     Amazon’s proprietary AZW format, as well as support for PDF, HTML, DOC, JPEG, GIF, PNG, BMP through conversion.   I'm not going to lie to you: some stuff just isn't coming with you. Your DRM-ed AAC audio files, iTunes movies and TV shows, and even those iTunes audiobooks, just can't survive outside of the iTunes/iPod universe. So quell those fantasies of uninstalling iTunes, because you'll still need it to play your protected iTunes purchases.    The good news is, most everything else from iTunes is fair game, including your unprotected AAC and MP3 files, podcasts, unprotected videos, and playlists. Even your iTunes Smart Playlists can be reconstructed with a decent resemblance.     based on its DRM system, not all Kindle books can be re-downloaded, a sticking point even with some fans. For those that can, all Kindle eBooks include limits on the number of re-downloads and those limits vary per book.