11 results on '"PEER-to-peer file sharing"'
Search Results
2. I Spy with My Little Eye: Removing and Repelling Spyware and Malware.
- Author
-
McDermott, Irene E.
- Subjects
- *
SPYWARE (Computer software) , *COMPUTER software , *INTERNET , *PEER-to-peer file sharing - Abstract
This article addresses issues concerning spyware and malware. Spyware is software that users download from the Internet. It is often hidden in a package with peer-to-peer music file-sharing services such as Grokster, or with software such as GetSmiley, which offers free smiley faces for happy computers. Once users download and install one of these stealth programs, it monitors computer use and sends the information back over the Internet to the company that made it. These deceptive tactics are considered technically legal because downloaders must usually click on an OK button before the program is installed.
- Published
- 2005
3. The Future of P2P.
- Author
-
Pike, George H.
- Subjects
- *
PEER-to-peer architecture (Computer networks) , *PEER-to-peer file sharing , *DOWNLOADING , *COPYRIGHT infringement , *ACTIONS & defenses (Law) , *COMPUTER software industry - Abstract
This article focuses on the problem of illegal downloading of copyrighted materials through peer-to-peer (P2P) file-sharing networks in the U.S. One of the most significant decisions to impact copyright law and the information industry is for the court case MGM versus Grokster. The Grokster case is the latest effort by major media copyright holders to address the problem of illegal downloading. Earlier lawsuits had shut down the original Napster file-sharing network in 2002. Napster was vulnerable because its centralized servers facilitated illegal downloading. The true P2P structure of Grokster and Kazaa eliminated the centralized server so that these companies never actively participated in the file-transfer process. Copyright holders in the music, movie and software industries pursued several avenues of attack. The most positive response has been the success of legal downloading mechanisms such as the popular Apple iTunes and the reconstituted Napster.
- Published
- 2005
4. Protecting Future Policy.
- Author
-
Duncan, Dan
- Subjects
- *
INFORMATION technology , *COPYRIGHT , *PEER-to-peer architecture (Computer networks) , *PEER-to-peer file sharing , *ACTIONS & defenses (Law) - Abstract
The article looks at how policy decisions may affect the future of information and technology in the U.S. Both the courts and the U.S. Congress are currently debating copyright issues. Among them are decisions about the future of peer-to-peer (P2P) technologies, the ability to use copyrighted works whose owners cannot be found, and the extent to which Congress can govern the use of information outside the copyright law. The legal case garnering the greatest attention is MGM v. Grokster, which is awaiting decision by the U.S. Supreme Court after oral arguments were heard on March 29, 2005. The issue is whether P2P companies, such as Grokster, are liable for contributing to the undisputed infringements by users of their file-swapping software. All parties view Grokster as a watershed case and hope the court will clarify its 1984 Sony decision. Speaking of Congress, there is renewed interest in orphan works, a class of copyrighted materials that others want to use, but whose owners cannot be located. This is an issue with a long history. It first began simmering with the adoption of the life-plus-50-years copyright term under the 1976 Copyright Act and then became hotter during debate on the Berne Convention Implementation Act of 1988, which altered registration requirements for copyright owners.
- Published
- 2005
5. Curtailing Unintended File Sharing.
- Author
-
Lopresti, Michael J.
- Subjects
- *
LEGISLATIVE bills , *LEGISLATION , *PEER-to-peer architecture (Computer networks) , *PEER-to-peer file sharing ,UNITED States. Congress. House. Subcommittee on Commerce, Trade & Consumer Protection - Abstract
This article focuses on the proposed Informed P2P User Act being debated by the U.S. House Subcommittee on Commerce, Trade and Consumer Protection. The legislation seeks to address the unintended consequences of file sharing networks. Congressional attention was drawn into the issue of peer-to-peer (P2P) file-sharing networks after serious issues of privacy and national security concerns were discovered. Lime Wire LLC is expected among those which will be impacted by the legislation.
- Published
- 2009
6. Disrupting Digital Business Requires Right- and Left-Brain Thinking.
- Subjects
- *
TECHNOLOGICAL innovations , *BUSINESS models , *PEER-to-peer file sharing , *BIG data - Abstract
An interview with Ray Wang, founder and principal analyst of market research firm Constellation Research, is presented. Topics include his book "Disrupting Digital Business: Create an Authentic Experience in the Peer-to-Peer Economy," his views on the effect of technological innovations in the disruption of digital business models, the emerging trends of peer-to-peer economy, and the key advantages of big data analytics as a key foundation of digital business.
- Published
- 2015
7. The Ax: Is Your Content a Commodity?
- Author
-
CASTILLO, JOSE
- Subjects
- *
COMPUTER file sharing , *DATA transmission systems , *PEER-to-peer file sharing , *INTERNET content , *WEB syndication , *WEB content aggregators - Abstract
The article discusses three simple tests that can be used to determine if the content of a company is becoming a commodity. Topics covered include the human test which uses human signature or face on a corporate content, the community test wherein content created by a community is shared by everyone, and the party test wherein a company news item is shared and used as a topic of conversation at a party. It also discusses why companies dealing in commodities always get the ax.
- Published
- 2014
8. Playing a Different Tune.
- Author
-
Fritz, Kurt
- Subjects
- *
COPYRIGHT infringement , *MUSIC downloading (Computers) , *PEER-to-peer file sharing , *PEER-to-peer architecture (Computer networks) - Abstract
The article reports that the Recording Industry Association of America (RIAA) sent 401 prelitigation settlement letters on behalf of its member companies to 12 universities on February 21, 2008. The RIAA has filed 30,000 file-sharing copyright infringement lawsuits. According to Cara Duckworth, RIAA director of communications, the RIAA's work to halt online music theft has had an impact on the growth of illegal peer-to-peer (P2P) services. The article discusses the goals of the RIAA and its lawsuit against file-sharing service Napster.
- Published
- 2008
9. A Torrent of Textbooks.
- Author
-
Carr, John
- Subjects
- *
PIRACY prevention (Copyright) , *INTERNET piracy , *PEER-to-peer file sharing - Abstract
The article focuses on the issue of pirated textbooks and the efforts of the American Association of Publishers (AAP) to address the problem. The author describes how the AAP's approach differs from that of other organizations like the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA). Edward McCoyd, director of digital policy at AAP, notes that efforts to address the problem are spreading to individual publishers.
- Published
- 2008
10. Security: By the Numbers.
- Author
-
Brynko, Barbara
- Subjects
- *
DATA security , *COMPUTER security , *COPYING machines , *PRINTING machinery & supplies , *PEER-to-peer architecture (Computer networks) , *PEER-to-peer file sharing - Abstract
The article discusses statistics and offers insights on financial information security in the U.S. According to a survey by Sharp Electronics Corp., nearly 50% of the U.S. is not aware of the possible perils of using public copiers and printers that can leave them vulnerable for data theft. Identity Finder Chief Executive Officer (CEO) Todd Feinman notes that one of the easiest ways for a computer breach to take place is by peer-to-peer sharing (P2P) or file sharing on a network. According to Mary Engle of the U.S. Federal Trade Commission, the agency is concerned that consumers may accidentally share folders that contain private documents that they do not intend to share.
- Published
- 2008
11. Bertelsmann Gives P2P Another Try.
- Author
-
Fritz, Mark
- Subjects
- *
PEER-to-peer architecture (Computer networks) , *PEER-to-peer file sharing , *DOWNLOADING - Abstract
This article deals with the plans of media company Bertelsmann to venture again into the peer-to-peer (P2P) business as of June 2005. Bertelsmann reportedly pumped $85 million into the beleaguered Napster between 2000 and 2002, before Napster finally declared bankruptcy and its remains were scooped up by Roxio. However, Bertelsmann did get something from its dalliance with Napster: a profound respect for P2P technology and its potential for content distribution (especially of large media files). In fact, Bertelsmann apparently finds peer-to-peer so compelling that it has been willing to write off millions and start from scratch. The company has announced a new P2P file download platform called GNAB, set to officially launch around June. According to Gernot Wolf, spokesman for Bertelsmann subsidiary Arvato, there is no relation between GNAB and Napster, and not a single line of Napster code was used while developing GNAB. According to Wolf, what sets GNAB apart from the P2P pack is that it combines centralized and decentralized download. Of course, decentralization is what gives P2P its power. Despite its downside, some centralization is necessary, says Wolf. It is the part of the puzzle that Napster left out and that led to its demise. It is GNAB's centralization that permits it to track its users to make sure content isn't stolen.
- Published
- 2005
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.