SlideShare a Scribd company logo
1 of 20
DRM:  Evolution & E-books
DRM: Basic Info ,[object Object],[object Object],[object Object],[object Object]
DRM: Now
   
:58-1:14
DRM: Privacy Violations ,[object Object],[object Object],[object Object],[object Object]
Reaction:  Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
DRM: Non E-books ,[object Object],[object Object]
Interoperability: E-books ,[object Object]
Ipod & Kindle
  Kindle Scandal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nook and Sony Reader ,[object Object],[object Object],[object Object],[object Object],[object Object]
Epub ,[object Object],[object Object],[object Object],[object Object]
Adobe Epub ,[object Object],[object Object],[object Object],[object Object]
Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?     1. Use “Customized for…” with the user’s name and e-mail address.    2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy      According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.    
Back Lash ,[object Object],[object Object],[object Object],[object Object]
Author’s Take ,[object Object],[object Object],[object Object]
Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.    "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."    Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  
DRM=Piracy

More Related Content

Viewers also liked

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • GuanacasteSilvia Pacheco
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1F2G1
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Harold Smits
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Harold Smits
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpointguest67c25f
 

Viewers also liked (9)

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • Guanacaste
 
P2
P2P2
P2
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1
 
Edificio buen campo
Edificio buen campoEdificio buen campo
Edificio buen campo
 
Some Projects
Some ProjectsSome Projects
Some Projects
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
 
Michelangelo
MichelangeloMichelangelo
Michelangelo
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpoint
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Burstyn Ccc

  • 2.
  • 6.
  • 7. Reaction: Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?    1. Use “Customized for…” with the user’s name and e-mail address.   2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
  • 16. Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy     According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.   
  • 17.
  • 18.
  • 19. Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.   "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."   Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  

Editor's Notes

  1. The current DRM system is nothing more than a usage license, that use-based DRM systems are contracts of adhesion between the consumer and the copyright holder in which the consumer is restricted to agreeing with draconian DRM policies.  
  2. Step 1: The consumer makes a request from the license server for a valid, unique set of rights. Step 2: The license server evaluates the request from the consumer. The server then compares these requests to a standard of rules and policies. It then determines what rights can be granted and then that set of rights is granted to the consumer. Step 3: The license server presents the consumer with a set of rights that closely matches the request. Step 4: The consumer obtains a satisfactory set of rights or can choose to go back to step I.
  3. Similar to iTunes content, you can share eBooks between up to six Kindles on the same account     No one but Apple is allowed to make players for iTunes Music Store songs, and no one but Apple can sell you proprietary file-format music that will play on the iPod. Yay DMCA They were able to create an eBook ecosystem where their customers purchased content solely through Amazon. As Apple had done with digital music, Amazon was now doing with eBooks.     Amazon’s proprietary AZW format, as well as support for PDF, HTML, DOC, JPEG, GIF, PNG, BMP through conversion.   I'm not going to lie to you: some stuff just isn't coming with you. Your DRM-ed AAC audio files, iTunes movies and TV shows, and even those iTunes audiobooks, just can't survive outside of the iTunes/iPod universe. So quell those fantasies of uninstalling iTunes, because you'll still need it to play your protected iTunes purchases.    The good news is, most everything else from iTunes is fair game, including your unprotected AAC and MP3 files, podcasts, unprotected videos, and playlists. Even your iTunes Smart Playlists can be reconstructed with a decent resemblance.     based on its DRM system, not all Kindle books can be re-downloaded, a sticking point even with some fans. For those that can, all Kindle eBooks include limits on the number of re-downloads and those limits vary per book.