Feeds

RIAA flames Sun

Networked computers causing trouble

  • alert
  • submit to reddit

Security for virtualized datacentres

Sun Microsystems employees have been caught with their hands in the file-trading cookie jar, and the Recording Industry Association of America (RIAA) is not happy about it.

The RIAA sent a "cease and desist" order to Sun after discovering that some of the server makers' employees had been downloading copyrighted files at work. This is part of a broad attack by the RIAA against college students, the military and companies.

Sun responded to the RIAA's order by issuing its own cease and desist order to employees.

"Downloading copyrighted software is illegal and a violation of Sun's business conduct policies regarding inappropriate use of Sun's resources," a pair of Sun executives wrote in an e-mail, The Register has confirmed. "Sun employees are prohibited from engaging in this practice using Sun time or Sun resources."

"Employees engaged in this practice are putting Sun (not to mention themselves) in legal jeopardy and must cease and desist IMMEDIATELY," the e-mail continues. "In addition, employees who have such downloaded songs on their Sun systems must IMMEDIATELY purge these works. . . We will be conducting an internal audit shortly to ensure compliance, and that infringing materials have been removed from Sun's systems."

Sun does have intellectual property of its own that it likes to protect, but in many ways this must have been a bitter pill to swallow.

Sun's long-standing mantra has been "The Network is the Computer," and P2P systems provide a nice proof point of the power inherent in connected systems. Millions of files zipping across the Internet also means more business for Sun's server and storage groups.

In addition, Sun developed its JXTA project to help make P2P networks work better and to create, in the long run, more demand for powerful servers.

Intel's Chairman Andy Grove has also spoken out about his appreciation for P2P networks as a driver for the technology business. Again, more media files demand more processing power, which plays right into Intel's hands.

It's time for the technology powerhouses in the U.S. to stand up and fight the music labels. Technology is the future of this country, and we should not let a few laggards keep us in the 20th century just so they can preserve an ancient music distribution model. ®

New hybrid storage solutions

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Forget silly privacy worries - help biometrics firms make MILLIONS
Beancounter reckons dabs-scanning tech is the next big moneypit
Microsoft's Office Delve wants work to be more like being on Facebook
Office Graph, social features for Office 365 going public
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.