Remove tag drm
article thumbnail

Episode 187: Filtergate is DRM for Water

The Security Ledger

In this episode of the podcast (#187), sponsored by Virsec, we talk with journalist and author Cory Doctorow of BoingBoing.net about the recent GE Filtergate incident and how DRM is invading our homes. DRM: An Invitation to Mischief. In this conversation Corey and I talk about the insidious spread of DRM and digital monopolies.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Digital Rights Management (DRM). Closely associated with DAM is DRM. Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content. DRM is defined as “any access control technology used to protect and license digital intellectual property (IP).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Honest Torrent

ChiefTech

But I hear that Joost are busy signing up commercial content and now BitTorrent will be selling DRM protected TV shows and movies - from Wired : " The BitTorrent Entertainment Network was set to launch Monday with films from Warner Bros., See, this could never happen in Australia. See, this could never happen in Australia.

Paper 40
article thumbnail

This is the old ChiefTech blog.: Online customer service failure

ChiefTech

The most prevalent examples are DRM and other attempts to control how users can interact with software and data, but similar thinking (in different degrees) is evident in many aspects of the built environment - such as anti-loiter and anti-homeless benches - and in product design in general.

article thumbnail

Security Keys

Imperial Violet

The DRM in Encrypted Media Extensions might be an exception, and there was an appropriately large fight over that. You don’t have to support tags or indefinite lengths in CBOR though because the CTAP2 canonicalisation format forbids them. I’m not making any judgment about the result of that here though.).

Security 118