background preloader

Copyright

Facebook Twitter

Opensource

RCCS: View Book Info. Code: Collaborative Ownership and the Digital Economy Editor: Rishab Aiyer Ghosh Publisher: Cambridge, MA: MIT Press, 2005 Review Published: September 2008 If one were to ask me what are the three key monographs to read on the emergence of peer production, peer governance, and peer property, I would rather easily have an answer for the first two topics. The key monograph on commons-based peer production is undoubtedly the already classic The Wealth of Networks by Yochai Benkler.

With The Success of Open Source, Steve Weber has written a very satisfactory account of peer governance, or the governance of open source communities producing free software. What is lacking to date is a monograph on the new common property formats that have been emerging to guarantee the social reproduction of peer production processes. Part One: Creativity and Domains of Collaboration Chapter two to five are anthropological case studies. Paul A. Part Two: Mechanisms for Collaboration Overall Assessment.

Telegraphjournal.com - Canadians protest Harper's draconian copyright bill. The Canadian DMCA: What You Can Do. With the Canadian version of the DMCA likely to be introduced within the next two weeks, there has a remarkable outpouring of interest from individual Canadians about what they can do to have their concerns heard. The unfortunate reality is that there is nothing can be done about what the bill will look like when it is introduced - Industry Minister Jim Prentice has simply decided discard consumer, education, research, and privacy interests, ignore his own party's policy platform, and the cave into U.S. pressure.

Once the bill is introduced, however, Canadians can send a message to their MPs, the Ministers, and others, calling for a fair copyright bill that addresses Canadian concerns (those in Calgary can do so in person on December 8th as Prentice hosts an open house). Many people have pointed to the my 30 Things You Can Do posting. I've decided to update the posting - and create a short YouTube video - to better reflect the current situation. What can you do? Blog*on*nymity - blogging On the Identity Trail. « Privacy is Changing Outsourcing in Canada | Main | Wearable Sensors to Improve Soldier Post-Action Reports » EULAs and the Geniuses of Uninformative Dissemination posted by:Jeremy Clark // 08:50 AM // May 09, 2006 // ID TRAIL MIX “[C]ontrol of the Western species of the human race seems to turn upon language. Anyone who has worked with language, from the devil on, has been in the business of spreading knowledge. They are not knowledge itself. In one unintentional way, Sony’s decision to secure a series of audio CDs with a very nasty piece of digital rights management (DRM) last fall was a partial victory for anti-DRM activists.

I will not detail each twist and turn of the subsequent events that eventually provoked a recall on the CDs, and a series of lawsuits. However there is another side to the Sony debacle that I want to focus on: user consent. As these events transpired, I recalled an opinion piece I read a few years ago in Wired by Mark Rasch. Post a comment. Home - Berkman Center for Internet & Society. The role of digital rights management in Open Access. The role of digital rights management in Open Access By: Richard Poynder, Freelance Journalist, United Kingdom on: 22/04/05 [14:07 UTC] Introduction OA has gained a lot of traction over the last year, but it has also attracted considerable resistance from commercial and society publishers.

Since they currently generate substantial incomes from selling subscriptions to their journals scholarly publishers fear that if research is made freely available on the Internet these revenues will be significantly threatened. Given the consequent struggle simply to make Open Access happen many OA advocates argue that worrying about DRM today could prove a distraction from the more important task of "freeing the refereed literature. " Since many also view DRM as synonymous with the use of "technical measures" designed to restrict access, rather than as a broad set of tools for managing rights in a digital environment, there is a tendency to see DRM as an issue for proprietary interests alone.

Concepts and a Design for Fair Use and Privacy in DRM. Abstract Typical digital rights management (DRM) systems used for piracy protection in content distribution provide access to encrypted content only on the hardware identified in a digital license. This hardware locking restricts fair use, e.g., by preventing copying content for private use. Using hardware identity, media distributors can also link together all customer purchases, which can threaten customer privacy. The need to design DRM systems and electronic commerce business models that allow fair use is commonly agreed. But the intelligence and contextual factors that a judge uses in interpreting the legal limits of fair use in the US cannot be fully implemented in the licensing rules of DRM systems. 1. Digital Rights Management (DRM) deals with controlling and managing digital rights over intellectual property [12, 21].

This article is a step towards fair use by design. DRM systems focusing on content protection are intended to enforce legal license practices by technical means. NtentGuard talks DRM futures | The Register. High performance access to file storage ContentGuard has followed the traditional development path of most intellectual property businesses. First it thought is was a product company with dreams of building a DRM monopoly on the back of technology leadership, then it found the going tough and the pickings too small and finally it dropped back to pushing intellectual property with a handful of key staff. Today it is a 32-man operation encompassing two locations, selling IP and software tools, as well as standing behind the standard for a rights expression language called XrML, backed by both MPEG and ISO. The company is now owned by Microsoft, Time Warner and Thomson, the French CE manufacturer.

Michael Miron the CEO admits to not being one of the technology developers, but has been associated with the business since 1999 when Xerox asked him to build them an internet business. Blunt talk “Software vendors especially want to keep the trust chain and rendering proprietary. Trust model. On Copyright Law and Myopia: Corante > Copyfight > January 31, 2005 On Copyright Law and Myopia Posted by Donna Wentworth Seth Schoen has a nice exercise in reductio ad absurdum, pointing out that the only argument the Business Software Alliance (BSA) makes in its recent legislative agenda to refute the notion that copying is beneficial to society is that restricting copying will make the software industry larger and more profitable. Says Seth, "The idea that helping a business sector get larger and richer is a primary duty of legislators or of the public is so peculiar that it bears trying to come up with a few parallel arguments. " For example, BSA asserts: Some have attempted to paint copyright piracy as a victimless crime, arguing that "if I make a copy of a computer program, you still get to keep your copy, and we are both better off.

" ...so Seth suggests we might also argue: BSA's logic is not unlike that of the National Association of Broadcasters (NAB). Seth's oh-so-clever metaphor breaks down in the follow-on sentence. The Public Patent Foundation. Real Software Slams Microsoft's Patent Effort. Hewlett-Packard will apparently need close to two months to start fulfilling backorders for the (temporarily) revived TouchPad tablet. "It will take 6-8 weeks to build enough HP TouchPads to meet our current commitments, during which time your order will then ship from this stock with free ground shipping," read an email sent to customers and reprinted in a Sept. 7 posting on the Precentral.net blog. "You will receive a shipping notification with a tracking number once your order has shipped. "That would place the new TouchPads in consumers' hands sometime in either late October or early November.

The reduced-price devices are not returnable, according to the email. HP originally acquired webOS as part of its takeover of Palm in 2010. The manufacturer originally had big plans for loading the operating system onto a variety of devices, including tablets, smartphones, desktops and laptops. Blogging is all fun and games, until the boss finds out - Feb. 15, 2005.

NEW YORK (CNN/Money) - Mark Jen landed a dream job with Google Inc. in January. He was fired less than a month later. His infraction? He ran a Web log, where he freely gabbed about his impressions of life at the Mountain View, Calif. -based Internet search giant. Web logs, or blogs, the online personal diaries where big names and no names expound on everything from pets to presidents, are going mainstream. While still a relatively small piece of total online activity, blogging has caught on with affluent young adults. As Forrester Research analysts recently noted, blogging will become increasingly common as these consumers age. For companies, the growing popularity of blogs is a double-edged sword. "Blogs are enabling people to have a conversation with a much wider audience," said Kurt Opsahl, a staff attorney with the Electronic Frontier Foundation, a group that monitors Internet use and privacy rights.

Bloggers besieged Employee bloggers aren't the only ones feeling the heat. Foundation for a Free Information Infrastructure. Bill Gates and other communists | Perspectives | CNET News.com. Dangerous Terms: A User's Guide to EULAs. When you use the Internet, you entrust your online conversations, thoughts, experiences, locations, photos, and more to companies like Google, AT&T and Facebook. But what happens when the government demands that these companies to hand over your private information?

Will the company stand with you? Will it tell you that the government is looking for your data so that you can take steps to protect yourself? The Electronic Frontier Foundation examined the policies of 18 major Internet companies — including email providers, ISPs, cloud storage providers, and social networking sites — to assess whether they publicly commit to standing with users when the government seeks access to user data. We looked at their terms of service, privacy policies, and published law enforcement guides, if any. We also examined their track record of fighting for user privacy in the courts and whether they’re members of the Digital Due Process coalition, which works to improve outdated communications law.