SlideShare une entreprise Scribd logo
1  sur  28
DIGITAL RIGHTS MANAGEMENT
(DRM) AND YOU
By Marcin Marszałek
PROBLEM WITH TERMINOLOGY
 DRM means different things in different
environments:
Music/Movies/Games
Operating Systems and other software
 No one body defines the term
WHAT IS DRM?
Also known as:
 Copy Protection
 Copy Control
 Copy Prevention
 Digital locks
WHAT IS DRM AS COPY PROTECTION?
 Intends to limit copying.
WHAT IS DRM?
 Intends to limit copying or access to digital content
WHAT IS DRM?
 Intends to limit copying or access to digital content
WHAT IS DRM?
 Intends to limit copying or access to digital content.
 Used to protect the rights of the authors, artists,
creators, programmers, publishers
HOW DOES DRM WORK?
 DRM adds an extra layer of protection around a file
 It does so by embedding code
 Needs a key (license to unlock)
2 GENERATIONS OF DRM
 1st generation
Limited copying.
 2nd generation
Limits access (what you can do with) digital content.
USAGE OF DRM?
 DRM is used to limit copying of and access to:
Music
Ebooks
Movies
Software
 Programs
 Games
SHORT HISTORY OF DRM
 Altair BASIC for Altair 8800
SHORT HISTORY OF DRM
 Altair BASIC for Altair 8800
HISTORY OF DRM
 Bill Gates’s Open Letter to Hobbyists (1976)
“As the majority of hobbyists must be aware, most of
you steal your software. Hardware must be paid for,
but software is something to share.”
SHORT HISTORY OF DRM
 Bill Gate’s Open Letter to Hobbyists (1976)
“One thing you do do is prevent good software from
being written. Who can afford to do professional
work for nothing? What hobbyist can put 3-man
years into programming, finding all bugs,
documenting his product and distribute for free?
The fact is, no one besides us has invested a lot of
money in hobby software. “
SHORT HISTORY OF DRM
 Floppy disks
Paraphrases
Code wheel
Puzzle solving
Code sheets
CD-keys
 Dongle
Pieces of hardware that were plugged to a computer
SHORT HISTORY OF DRM: MOVING ONLINE
 Steam
 Origin
 Games for Windows LIVE
 Uplay
 iTunes
DRM PROS AND CONS
 Pros:
Help protect intellectual property from being stolen: in
other words, they prevent piracy (albeit not completely).
Helps transfer content only to authorized consumers.
Complete product and support: since hundreds of man-
hours were put into creation of proprietary software, bug
fixes etc. are done by the owner of the software.
(Maybe?)
DRM PROS AND CONS
 Cons:
DRM might prevent the possibility of making backup
copies of software.
Prevents lending of material
Limits materials for research/education under fair
dealing.
DRM PROS AND CONS
 Cons:
Creates a situation where you potentially have to pay
twice for the same product e.g. if you buy a computer
with a copy of Windows and then have to format your
computer.
Limits having the same material on multiple devices
since not all formats are compatible with or transferable
to other devices.
2 FACES OF DRM
 1. Limits illegal copying and distribution
 2. Sets limits on access of legally obtained
materials
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 2 different DRMs
1. Lending materials
2. Programming software
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 Can be implemented in digital libraries by:
Controlling access to materials through encryption and
watermarking
Ensuring the content is accessed only by authorized
consumers and remains unmodified
RELEVANCE TO
LIBRARIES/MUSEUMS/ARCHIVES
 Limits coding
 Open software a viable alternative
DRM ALTERNATIVES
 The GNU Project
 Linux
 Open Source Software
 Copyleft
DRM ALTERNATIVES
 Munich completely open source
DRM FUTURE
 Is DRM changing?
iTunes DRM-free
Gog.com
DRM: ETHICAL ISSUES
 Do you own the material you buy?
Well, not really!
 Can you resell your content?
Well, not really!
 Can you modify your content?
 Well, not really!
 Where does fair use doctrine fit?
DRM QUESTIONS
 1. Is DRM an answer to piracy? Does it create more
problems than it solves?
 2. Where do you think DRM will take us? Will we
forget the idea of ownership for the idea of access?
Is ownership relevant in the online world?

Contenu connexe

Tendances

Content Management Systems in Libraries
Content Management Systems in LibrariesContent Management Systems in Libraries
Content Management Systems in LibrariesChris
 
Digital preservation
Digital preservationDigital preservation
Digital preservationSarika Sawant
 
creative commons
creative commonscreative commons
creative commonsMarieke Guy
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
Internet
InternetInternet
Internetmustha3
 
Digital libraries: successfully designing developing and implementing your d...
Digital libraries:  successfully designing developing and implementing your d...Digital libraries:  successfully designing developing and implementing your d...
Digital libraries: successfully designing developing and implementing your d...Beatrice Amollo
 
Post coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information sciencePost coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information scienceharshaec
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservationsmtcd
 
Digital library technologies
Digital library technologies Digital library technologies
Digital library technologies Shriram Pandey
 
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan Mohapatra
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan MohapatraDIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan Mohapatra
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan MohapatraNIRANJAN MOHAPATRA
 
Basics of licensings electronic resources 2
Basics of licensings electronic resources 2Basics of licensings electronic resources 2
Basics of licensings electronic resources 2Barbara Dunham
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automationsaniul rahaman
 
ADOBE DREAMWEAVER
ADOBE DREAMWEAVERADOBE DREAMWEAVER
ADOBE DREAMWEAVERNi
 
Malware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesMalware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesJoseph Bugeja
 
Applying Digital Library Metadata Standards
Applying Digital Library Metadata StandardsApplying Digital Library Metadata Standards
Applying Digital Library Metadata StandardsJenn Riley
 

Tendances (20)

Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Content Management Systems in Libraries
Content Management Systems in LibrariesContent Management Systems in Libraries
Content Management Systems in Libraries
 
Evolution of Digital Libraries
Evolution of Digital LibrariesEvolution of Digital Libraries
Evolution of Digital Libraries
 
Digital preservation
Digital preservationDigital preservation
Digital preservation
 
creative commons
creative commonscreative commons
creative commons
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
Internet
InternetInternet
Internet
 
Dspace
DspaceDspace
Dspace
 
Digital libraries: successfully designing developing and implementing your d...
Digital libraries:  successfully designing developing and implementing your d...Digital libraries:  successfully designing developing and implementing your d...
Digital libraries: successfully designing developing and implementing your d...
 
Post coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information sciencePost coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information science
 
Digital Preservation
Digital PreservationDigital Preservation
Digital Preservation
 
Dublin Core Intro
Dublin Core IntroDublin Core Intro
Dublin Core Intro
 
Library management
Library managementLibrary management
Library management
 
Digital library technologies
Digital library technologies Digital library technologies
Digital library technologies
 
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan Mohapatra
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan MohapatraDIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan Mohapatra
DIGITAL ARCHIVAL INITIATIVE OF LIBRARY by Niranjan Mohapatra
 
Basics of licensings electronic resources 2
Basics of licensings electronic resources 2Basics of licensings electronic resources 2
Basics of licensings electronic resources 2
 
Dlis007 library automation
Dlis007 library automationDlis007 library automation
Dlis007 library automation
 
ADOBE DREAMWEAVER
ADOBE DREAMWEAVERADOBE DREAMWEAVER
ADOBE DREAMWEAVER
 
Malware and Modern Propagation Techniques
Malware and Modern Propagation TechniquesMalware and Modern Propagation Techniques
Malware and Modern Propagation Techniques
 
Applying Digital Library Metadata Standards
Applying Digital Library Metadata StandardsApplying Digital Library Metadata Standards
Applying Digital Library Metadata Standards
 

En vedette

Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for EbookseBOUND Canada
 
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...Kirk Biglione
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRMcastLabs
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingRamesh Kumar
 
Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishingGurleen Kaur
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM InteroperabilityHiram Juarbe
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07bobweber
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategyHeather Ford
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Amit Maitra
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content FrustrationSarah Houghton
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementRoberto García
 
Digital Strategy For Publishers
Digital Strategy For PublishersDigital Strategy For Publishers
Digital Strategy For PublishersLJ Interactive
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 

En vedette (18)

Digital Rights Management for Ebooks
Digital Rights Management for EbooksDigital Rights Management for Ebooks
Digital Rights Management for Ebooks
 
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
DRM, Digital Content, and the Consumer Experience: Lessons Learned From The M...
 
De-mystifying DRM
De-mystifying DRMDe-mystifying DRM
De-mystifying DRM
 
Digital Rights Management for Animation & Gaming
Digital Rights Management for Animation & GamingDigital Rights Management for Animation & Gaming
Digital Rights Management for Animation & Gaming
 
Web browsers and website publishing
Web browsers and website publishingWeb browsers and website publishing
Web browsers and website publishing
 
DRM Interoperability
DRM InteroperabilityDRM Interoperability
DRM Interoperability
 
Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07Weber DRM What Should The Model Be MIT 11 26 07
Weber DRM What Should The Model Be MIT 11 26 07
 
Developing a digital copyright strategy
Developing a digital copyright strategyDeveloping a digital copyright strategy
Developing a digital copyright strategy
 
Drm Evolution 2005 10 19
Drm Evolution 2005 10 19Drm Evolution 2005 10 19
Drm Evolution 2005 10 19
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Scenario Mapping
Scenario MappingScenario Mapping
Scenario Mapping
 
Electronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLIScElectronic Publishing Arun Joseph MLISc
Electronic Publishing Arun Joseph MLISc
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Digital Content Frustration
Digital Content FrustrationDigital Content Frustration
Digital Content Frustration
 
An OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights ManagementAn OWL Copyright Ontology for Semantic Digital Rights Management
An OWL Copyright Ontology for Semantic Digital Rights Management
 
Digital Strategy For Publishers
Digital Strategy For PublishersDigital Strategy For Publishers
Digital Strategy For Publishers
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 

Similaire à Digital rights management (drm) and you

Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminarcorinnejordan
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics ViewLeigh Dodds
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?blogzilla
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right ManagementOmkar Tembe
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia filesApurva Vyas
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatLeaMayMuozGaurino
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Paolo Nesi
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsMicky Metts
 
The free software history and communities’ journey ahead
The free software history and communities’ journey aheadThe free software history and communities’ journey ahead
The free software history and communities’ journey aheadRicardo Amaro
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010dixieyeager
 
Open source freeopensource & linux
Open source freeopensource & linuxOpen source freeopensource & linux
Open source freeopensource & linuxManura Perera
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11mrmwood
 

Similaire à Digital rights management (drm) and you (20)

Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
What is DRM?
What is DRM? What is DRM?
What is DRM?
 
Authorship Drm Seminar
Authorship Drm SeminarAuthorship Drm Seminar
Authorship Drm Seminar
 
Presentazione
PresentazionePresentazione
Presentazione
 
DRM: A Skeptics View
DRM: A Skeptics ViewDRM: A Skeptics View
DRM: A Skeptics View
 
Can DRM achieve its security goals?
Can DRM achieve its security goals?Can DRM achieve its security goals?
Can DRM achieve its security goals?
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Copyright powerpoint
Copyright powerpointCopyright powerpoint
Copyright powerpoint
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Digital Right Management
Digital Right ManagementDigital Right Management
Digital Right Management
 
digital rights management for multimedia files
digital rights management for multimedia filesdigital rights management for multimedia files
digital rights management for multimedia files
 
Presentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstatPresentation1.presentation presentation presenstat
Presentation1.presentation presentation presenstat
 
Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2Protection and distribution Systems, part B of 2
Protection and distribution Systems, part B of 2
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
The free software history and communities’ journey ahead
The free software history and communities’ journey aheadThe free software history and communities’ journey ahead
The free software history and communities’ journey ahead
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Open source freeopensource & linux
Open source freeopensource & linuxOpen source freeopensource & linux
Open source freeopensource & linux
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 

Dernier

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Dernier (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Digital rights management (drm) and you

  • 1. DIGITAL RIGHTS MANAGEMENT (DRM) AND YOU By Marcin Marszałek
  • 2. PROBLEM WITH TERMINOLOGY  DRM means different things in different environments: Music/Movies/Games Operating Systems and other software  No one body defines the term
  • 3. WHAT IS DRM? Also known as:  Copy Protection  Copy Control  Copy Prevention  Digital locks
  • 4. WHAT IS DRM AS COPY PROTECTION?  Intends to limit copying.
  • 5. WHAT IS DRM?  Intends to limit copying or access to digital content
  • 6. WHAT IS DRM?  Intends to limit copying or access to digital content
  • 7. WHAT IS DRM?  Intends to limit copying or access to digital content.  Used to protect the rights of the authors, artists, creators, programmers, publishers
  • 8. HOW DOES DRM WORK?  DRM adds an extra layer of protection around a file  It does so by embedding code  Needs a key (license to unlock)
  • 9. 2 GENERATIONS OF DRM  1st generation Limited copying.  2nd generation Limits access (what you can do with) digital content.
  • 10. USAGE OF DRM?  DRM is used to limit copying of and access to: Music Ebooks Movies Software  Programs  Games
  • 11. SHORT HISTORY OF DRM  Altair BASIC for Altair 8800
  • 12. SHORT HISTORY OF DRM  Altair BASIC for Altair 8800
  • 13. HISTORY OF DRM  Bill Gates’s Open Letter to Hobbyists (1976) “As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share.”
  • 14. SHORT HISTORY OF DRM  Bill Gate’s Open Letter to Hobbyists (1976) “One thing you do do is prevent good software from being written. Who can afford to do professional work for nothing? What hobbyist can put 3-man years into programming, finding all bugs, documenting his product and distribute for free? The fact is, no one besides us has invested a lot of money in hobby software. “
  • 15. SHORT HISTORY OF DRM  Floppy disks Paraphrases Code wheel Puzzle solving Code sheets CD-keys  Dongle Pieces of hardware that were plugged to a computer
  • 16. SHORT HISTORY OF DRM: MOVING ONLINE  Steam  Origin  Games for Windows LIVE  Uplay  iTunes
  • 17. DRM PROS AND CONS  Pros: Help protect intellectual property from being stolen: in other words, they prevent piracy (albeit not completely). Helps transfer content only to authorized consumers. Complete product and support: since hundreds of man- hours were put into creation of proprietary software, bug fixes etc. are done by the owner of the software. (Maybe?)
  • 18. DRM PROS AND CONS  Cons: DRM might prevent the possibility of making backup copies of software. Prevents lending of material Limits materials for research/education under fair dealing.
  • 19. DRM PROS AND CONS  Cons: Creates a situation where you potentially have to pay twice for the same product e.g. if you buy a computer with a copy of Windows and then have to format your computer. Limits having the same material on multiple devices since not all formats are compatible with or transferable to other devices.
  • 20. 2 FACES OF DRM  1. Limits illegal copying and distribution  2. Sets limits on access of legally obtained materials
  • 21. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  2 different DRMs 1. Lending materials 2. Programming software
  • 22. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  Can be implemented in digital libraries by: Controlling access to materials through encryption and watermarking Ensuring the content is accessed only by authorized consumers and remains unmodified
  • 23. RELEVANCE TO LIBRARIES/MUSEUMS/ARCHIVES  Limits coding  Open software a viable alternative
  • 24. DRM ALTERNATIVES  The GNU Project  Linux  Open Source Software  Copyleft
  • 25. DRM ALTERNATIVES  Munich completely open source
  • 26. DRM FUTURE  Is DRM changing? iTunes DRM-free Gog.com
  • 27. DRM: ETHICAL ISSUES  Do you own the material you buy? Well, not really!  Can you resell your content? Well, not really!  Can you modify your content?  Well, not really!  Where does fair use doctrine fit?
  • 28. DRM QUESTIONS  1. Is DRM an answer to piracy? Does it create more problems than it solves?  2. Where do you think DRM will take us? Will we forget the idea of ownership for the idea of access? Is ownership relevant in the online world?

Notes de l'éditeur

  1. It is used differently by different environments/industries. The world of music/movies vs. the world of OS etc.
  2. Claiming DRM is only about copying does not tell the whole truth. The second generation of DRM is concerned not just with copying but access, use, resale etc.
  3. Claiming DRM is only about copying does not tell the whole truth. The second generation of DRM is concerned not just with copying but access, use, resale etc.
  4. 1st generation concerned itself with physical objects (floppy disks, cds, dvds etc.)
  5. Limiting what buyers can do with the content they buy is nothing new. As far back as 1976, a certain Bill Gates of a certain Micro-Soft, penned an Open Letter to Hobbyists in which he expressed dismay at unauthorized copying of his system’s punched tapes.
  6. Can’t do much about punched cards if someone has a paper punching machine, they can easily make copies. Which is what happened.
  7. Can’t make back-ups of fragile floppy disks. Entering phrases from manual, using code wheel or sheets, puzzle solving was used.
  8. Until now, copy protection was limited to physical objects. Now it’s moved to digital files.
  9. If you are lending digital materials like ebooks, music or films, DRM ensures the content will be removed after loan period. If you are using Windows, you cannot modify it to fit your needs. Linux can be fully rewritten to better serve your individual needs.
  10. When you embed code into a file, you can specify how long it can be accessed for, how many devices can access it etc. If you are lending digital materials like ebooks, music or films, DRM ensures the content will be removed after loan period. If you are using Windows, you cannot modify it to fit your needs. Linux can be fully rewritten to better serve your individual needs.
  11. Gnu’s not UNIX. Richard Stallman. Open source is not public domain.
  12. Ideally, the consumer never experiences DRM but that has not been the case. The future of DRM might CISCO’s DRM cloud http://www.youtube.com/watch?v=L49uv81fSSc