Archive
Predicting the (near) Future
Copyright And Technology 2012 Conference
Yesterday saw the first UK edition of this annual conference, which took place in London’s Kings Fund venue. The full day conference featured panels and expert speakers on that most interesting, challenging and potentially lucrative junction of copyright, content and technology. And, another buzzword for the ‘social’ melting pot – Social DRM!

Copyright And Technology Conference Word Cloud
The event format involved the usual keynotes and plenary sessions, during the morning segment, and a split into two streams, (covering technology and legal aspects), in the afternoon. My key take-aways include:
- User education on copyright content infringement is far too one-sided. According to expert copyright lawyer, Andrew Bridges, potential infringers / fans need ‘credible teachers’ with a more balanced agenda
- Traditional Hollywood release window is under threat (from user demand for content, here and now!)
- Piracy data collection / analysis are increasingly used by big content owners (e.g. Warner Bros and Harper Collins) to identify potential demand for specific content, via pirate channels. An interesting question by conference chair, Bill Rosenblatt, was whether content providers saw any potential for combining piracy data collection/analysis with social media buzz analysis, in order perhaps to help identify new market opportunities, remained mostly unanswered
- Media monitoring organisations can collect and analyse, (with consumers’ permission), actual usage data from user computers. According to the speaker from Warner Bros, their research apparently confirms claims that HADOPI has had an impact, with a recent decline in Peer-to-Peer file-sharing, in France.
- According to MarkMonitor, a high proportion of pirated ebook content are in the PDF format, which some think may be a result of easy portability between devices. Also, according to Harper Collins speaker, key motivational factors for ebook piracy include: Pricing, DRM and territorial restrictions.
- In the Technology stream, the panel on content identification (e.g. via fingerprinting vs. session based watermarking) discussed creation of content aware ecosystems using Automatic Content Recognition
- The term ‘Social DRM’ (a buzzword if I ever heard one) is the use of user information to uniquely identify digital content (and to potentially name and shame file sharers), as described by CEO of Icontact. One attendee grilled the presenter about ways and means to crack it! Apparently, the term Social DRM was coined by Bill McCoy at Adobe (now at IDPF), and is really just watermarking content with personally identifiable information
- Bill Rosenblatt described LCP (Lightweight Content Protection) for ePub as being somewhere in the middle of the content protection continuum (i.e. between no DRM and very strong DRM). Also, he observed that thepublishing industry stance on DRM is still in flux, and that genres such as (sci-fi, romance, IT) were mainly going DRM-free, whilst other e.g. higher education still used strong DRM to protect content
- Finally, my technology stream panel session on Security Challenges of Multi-Platform Content Distribution saw key contributions from experts, with multiple perspectives, from: a Security Consultant (Farncombe), DRM Provider (Nagra), Business PoV (Castlabs) and Content Provider / Owner (Sony Picture Entertainment).
Overall, this was a very good first outing for the Copyright and Technology conference in London. The co- organisers, GiantSteps and MusicAlly, did a great job to pull it off, despite disappointment (by last minute cancellation of a keynote) from the HADOPI Secretary General). I would certainly encourage anyone interested in the opportunities and challenges of content, technology and copyright to attend this conference in future. And yes, Social DRM is my new buzzword of the month!
IT Security: Still Hot & Cloudy!
This a refresh of an older, but still relevant, post I did last year about security and cloud which remains mostly true even today. The origin and subject of the post was from an event on IT security at the BCS Chartered institute for IT which featured 3 speakers on IT Security and Cloud.
I said back then that if I was a betting man, I’d wager the IT security industry was on the brink of a major revolution on the back of the Cloud, and indeed that still appears to be the case today. In fact, the question asked then of how many people in the audience actively used the cloud will have many more hands raised in response, if asked today, mainly because people are much more aware of the cloud then before. Which is not to say that the cloud has completely become front and centre; it still exists rightfully behind the scenes, powering various services that may still be taken for granted by the consumer, however some more recent services are also leveraging increased awareness of cloud by consumers and positioning themselves directly as cloud services. E.g. think Apple’s iCloud or Amazon’s Cloud drive for instance.
But I digress, what’s this got to do with IT Security you ask? The answer is very simple, if the cloud is really a behind-the-scenes enabler, then cloud security should also be behind the scenes right? But I still have this uneasy feeling, that we’ll yet see someone get sued over security breaches emanating from the Cloud. How long will it be before we get cloud compliance and cloud security risk assessment models, regulations and perhaps even exotic insurance policy for Cloud based services? Furthermore, the Internet (and consequently the cloud) is essentially borderless technology, which means that various national and international data governance regimes may have a thing or two to say about where data is stored – assuming it can be found in one place! This could well be a nightmare in the making for eDisclosure and/or eDiscovery.
Finally, apparently some clever Silicon Valley types are actively seeking ways to commoditize the cloud, and cloud based services, such that it can be traded as a financial instrument. Hmmm, now where did we see that one before (does Collateralized Debt Obligation ring a bell)? Suffice it to say there’s a lot of food for thought when it comes to Cloud Security, and far better qualified people than I have pondered, spoken and written about it (e.g. see my review of an excellent book about Cloud Security), so I shall just leave well enough alone.
To conclude, I dare say that cloud has come a long way since last year, especially in the minds of consumers, and it is looking likely to stay that way for a while yet, or at least until the next big hot topic strikes the zeitgeist. We can only wait and see.
Note: This post is brought to you in partnership with Intel(R) as part of the “Technology in tomorrow’s cloud & virtual desktop” series. For more information please click – HERE
Digital Content and the Cloud
This is first in a series of posts about cloud computing and digital content which will look at some of the immediate impact, as well as emerging and potential future trends of digital content in the context of cloud computing.

Digital Content in Cloud
Once upon a time, it was normal expectation and practice to run a decent-sized content business entirely from your own servers, storage and website. Nowadays this is not necessarily part of the conversation, even for small content businesses, as a result of the pervasive awareness of this thing called cloud and all the benefits it can deliver to the bottom line. The obvious advantages (e.g. scale, flexibility and reach) far outweigh most of the real and perceived disadvantages, but for content businesses, and I mean those businesses that rely on digital assets for their livelihood, this is a critical step with an intolerably high cost of failure.
In order to play in this field, content businesses must make it a point to ensure they are well placed and able to handle challenges posed by certain key aspects of doing business in the clouds, so to speak. These include:
- Storage – Along with the vast compute power, virtually unlimited storage is one of the key calling cards of the cloud optimist or evangelist. It is a compelling argument but there are still some key operational challenges to be faced in dealing with the vast amount of content stored in the cloud.
- Security – Cloud security is a staple topic of criticism by those I would refer to as cloud pessimists, but even now it is still way too early to tell which way the dice will fall on this one
- Collaboration – the ability to collaborate over space and time is another key attraction of cloud for content creators, business users and the even consumers (e.g. for User Generated Content)
- Intellectual property – The ability to monitor and enforce IP rights is a slow burner of an issue which will only get hotter as the more immediate challenges get resolved
- Emerging Usage models – The content industries face a major challenge dealing with constantly changing user needs and behaviours, (e.g. in the social context) resulting in the need for a highly flexible business model to cope with the onslaught; and this in my opinion, is where cloud technologies can really help enable the businesses of tomorrow
These and other related topics will form the main subjects for discussion in my subsequent posts for this series. In the meantime, I’d like to reiterate that the opinions expressed in this post and in the subsequent series of posts (and indeed my entire blog), are strictly mine and do not in anyway reflect the views of my employer, Capgemini, or the BCS Chartered Institute for IT.
DISCLAIMER: This post is brought to you in partnership with Intel(R) as part of the “Technology in tomorrow’s cloud & virtual desktop” series.
IT Security is Hot & Cloudy!
Wednesday’s BCS event on IT security certainly made that point on many different levels. If I was a betting man, I’d wager that the IT security industry is on the brink of a major revolution, on the back of that vague and fluffy thing called the Cloud.
Case in point, my question of how many people in the audience actively use the Cloud saw only a pitiful couple of hands raised. However when put in another way, by one of the presenters, i.e. how many people used Android phones for example; a few other hands went up along with looks of dawning comprehension. The Cloud rightfully exists behind the scenes, powering various services that are often taken for granted by the consumer, and the Android example simply confirms that in spite of all the buzz, your common, garden variety, consumer has little understanding or interest in this techie catnip known as cloud computing. And who can blame her, after all was it not the same geeky fads that brought us other similar buzzwords as: Application Service Provider (or ASP), Grid computing, and heck even Web 2.0?
But I digress, what’s this got to do with IT Security you ask? The answer is very simple, if the Cloud is really a behind-the-scenes enabler, then Cloud security should also be behind the scenes; but I get this uneasy feeling in the pit of my stomach (no, not from eating too many nibbles after the event), that it won’t be long before someone gets sued over some security breach emanating from the Cloud. How long before we get Cloud Compliance and Cloud Security Risk Assessment models, regulations and perhaps even some exotic insurance policy for Cloud based services? Furthermore, the Internet (and consequently the Cloud) is essentially borderless technology, which means that various national and international data governance regimes may have a thing or two to say about where data is stored – assuming it can be found in one place!
Finally, we also learnt that some clever Silicon Valley types are actively seeking ways to commoditize The Cloud, and Cloud based services, such that it can be traded as a financial instrument. Now where have we seen that one before – does Collateralized Debt Obligation ring a bell? Suffice it to say there’s a lot of food for thought when it comes to Cloud Security, and far better qualified people than I have pondered, spoken and written about it (e.g. see my review of an excellent book about Cloud Security), so I shall just leave well enough alone.
Aside from the cloudy issue of cloud security (sic), the event provided many opportunities for attendees to hear and debate other key topics of interest in IT Security, and our four speakers did a great job of keeping people engaged throughout. More information, including presentation slides, can be found on the BCS NLB website.
About the Economy, Piracy, Privacy (and Facebook’s Face-ache)
Last week was certainly hectic in the ever-dramatic world of online digital content and personal privacy. Highlights include some events in London; the ongoing Pirate Bay trial; and a major about-face for Facebook. So where to begin…?
A week is a long time in politics, and digital content, (so much so that I’ll be proposing a name change for this blog to better reflect its breadth of coverage, but more on that later). Below are just a few of the stuff that went down last week
1. Events galore – Some rather interesting events took place last week in London, and I was fortunate enough to attend the following:
- First Tuesday at the British Library (Tuesday 17th) – This focused on how to raise money for new ventures even in a recession. Founder and VC, Julie Meyer, spelled it out to attendees in a live interview by FT’s enterprise correspondent, Jonathan Moules.
- Computer Hacking at BCS London (Wednesday 18th) – In this sold out event, SANS security expert, Jess Garcia, broke down the latest trends in computer hacking and the implications to individuals and businesses.
- Broadcast Video Expo at Earls Court (Thursday 19th) – ETV’s Adrian Swift noted, in his conference session on emerging media, that the path to the future lay in adopting hybrid models which combine the strengths of both existing and emerging media to reach the target audience.
- Power of Personal Information at BCS London (Thursday 19th) – In this excellent event, Tom Ilube (Founder & CEO of Garlik), painted a stark picture of just how vulnerable people are with respect to personal information. He encouraged everyone to exercise their rights by making “Subject Access Requests” for all personal information held by organisations with which they have / had some relationship (e.g. energy, telecoms, travel and even the grocery stores with loyalty card schemes)
2. The Pirate Bay trial begins (and IFPI website got hacked) – To some, this is about “piracy on trial”, with promise of major global repercussions, but it is probably more a rerun of the age-old struggle between old & new: mindsets / cultures / business models (i.e. transition & change in general). This one is still ongoing, but it hasn’t disappointed with the expected drama. Check out Wired’s blog for regular updates on the trial.
3. Facebook’s about-face – This is now old news / so yesterday, but one major point of interest is how users can make a very rapid and visible difference to web2.0 services like Facebook. To be fair, Facebook now has a track record for responsiveness (remember the Beacon affair?), but perhaps they really should stop trying to annoy their users in the first place, but what do I know?
4. The ISP’s Dilemma – My latest article, published in last week’s edition of Computing magazine, looks at the potential impact of Digital Britain on UK ISPs
So there you have it, an eventful week indeed. As mentioned previously, I hope to rename this blog to something more in line with its topical coverage of current / emerging trends in content protection, copyright and personal privacy. DRM Blog is just so…, *ahem*, restrictive, so watch this space, and any suggestions are welcome.
——-
Note: This post was previously published on my BCS DRM Blog, where you can find the original post, and reader comments, in the archives.
Tech Predictions 2009: A more sensible approach to de-risking data loss
This is one that should have happened a while back, given that all the technology pieces are in place and readily available, but fear not, 2009 will be the year for comprehensive information rights management. Yes, I said it.
So what has changed, and why should 2009 be any different?
- Well for one thing, the frequent reports of data loss incidents mean that the corporate world has had to start looking at ways to prevent future mishaps. However, even current initiatives like wholesale corporate data encryption and data loss prevention strategies are not totally fool proof; therefore many organisations are still likely to need a more effective approach towards managing and securing information, especially one that will work even after data is lost or misplaced.
- Secondly, there are signs that ERM vendors are waking up to the key role they have to play in creating the ecosystem of solutions required to tackle data loss issues head-on. For example, some vendors have begun integrating their ERM products with existing Data Loss Prevention systems in order to provide effective control of information, both within and outside the enterprise security perimeter, (i.e. in the Jericho philosophy of deperimeterised security).
- Finally, although ERM is a direct offshoot of media Digital Rights Management (DRM), and provides similar capabilities for content control, it is unlikely to face the same fate as the latter, (see more on this from my DRM blog), for the simple reason that they serve very different markets / needs. A recent study of the ERM market shows a steady increase in awareness and adoption by organisations in various sectors like finance, healthcare and IT consulting among others
.In light of the above, I believe it that we shall start to see more examples of holistic security and information management as a major step towards mitigating the risk of data loss. The solutions, like the problems they solve, are not restricted to one product, channel or strategy; therefore it would most likely be achieved via a combination of components that include: ERM / IRM solutions; DLP systems; enhanced Information Security Policies; and the traditional corporate security and perimeter defence mechanisms.
>>===
Note: Originally posted on Capgemini’s Technology blog. You can see the original post, including comments, at: http://www.capgemini.com/technology-blog/2008/11/help_theres_an_architect_in_th.php
No More Data Loss?
Signs abound that the previously quiet realm of enterprise DRM is now making the must have list for enterprise security system vendors. This promises the potential for enterprises to gain full control of corporate information and data even outside the traditional security environment.
Like anything else in life it often takes a calamity to jumpstart what should have been an obvious requirement in the first instance. After last year’s data loss debacle, many public and private services organisations have had to take a fresh look at how to mitigate the risk associated with data loss. The upshot of this is the recognition of a need for information control even outside traditional corporate security perimeters, a problem that is neatly solved by enterprise DRM solutions as shown in the diagram below.
Although most organisations already have some form of perimeter security mechanisms (e.g. firewalls, data encryption and authentication), many have not bothered too much with the question of what happens if and when information leaves the premises on USB memory sticks or CDRs – a method frequently used by their own employees. However, it all looks set to change now as traditional enterprise security vendors are looking at including this level of control into their offerings.
Diagram showing Traditional Enterprise Security vs. Additional Enterprise DRM
(Source: The World Beyond Digital Rights Management, BCS 2007)
According to an article on DRMwatch, some enterprise content management vendors already recognised the need to control information in this way and acquired relevant companies and products into their portfolios. However, it has taken slightly longer for enterprise security solution vendors, who might be considered a more natural fit, to start integrating this capability into their solutions in order to create a holistic offering that delivers both internal and external control over enterprise data. The hope is that public and private sector organisations will jump on board and buy / implement these solutions with some alacrity, but enterprise customers just like ordinary consumers sometimes do the unexpected. We await further developments with eager anticipation.
——-
Note: This post was previously published on my BCS DRM Blog, where you can find the original post, and reader comments, in the archives.