Feeds

BT chief speaks fluent PowerPoint

Boss sets telco against royalty share

3 Big data security analytics techniques

CISAC BT's Dutch chief executive Ben Verwaayen may be the first keynote speaker to talk entirely in PowerPoint™: He's reduced his speeches to a series of motivational slide headings.

Verwaayen was delivering a keynote to the Copyright Summit, CISAC's global event for authors, writers and composers.

The problem is his slide headings are often confusing, or plain contradictory. For example, we think Verwaayen was trying to warn authors about complacency. This is how he put it:

"Technology is here. You are no longer comfortable. Technology is easy..."

His advice on future business opportunities was similarly baffling: "The conventional model still has a future. But less," he continued. "Its a mass market of one. Numero Uno. Me."

That's not a mass market, you might think - correctly.

Verwaayen's technique is to assemble a montage of contradictions, presumably to soften up the audience so his punchline has more impact. This must work great when BT management go on their weekend retreats, but it mystifies the listeners even more when the payoff is as baffling as his was today.

Verwaayen's parting advice was pulled straight from the Stategy Boutique. He advised creators to make their new business models, "Global. Open. And Real-Time."

But this feisty audience didn't need to be told how to suck eggs. The attendees here are artists, authors and the collection societies, and these societies waste no time in recognizing new technology-based businesses - often before striking deals (as with the original Napster) while other rights holders are trying to close them down.

So Verwaayen was asked if he'd share the revenue from his network with the creators.

"To be honest, it's nonsense," he said. "You'd better think of a way out of the box because if you think someone will solve your problem, they won't."

The response was met with boos. One pointed out that everyone was making money from music except the musicians.

"Oh, but he will pay. What does he think the value of the network is without the stuff people want? Why does he think they're there?"

He has a point: users aren't flocking to the internet to see clips of cats falling down stairs. We're figuring out how much value there is in "user generated content": by OFCOM's logic it's a "market failure" (which necessitates the creation of a £100m a year quango, the Public Service Publisher) - and no one's going to build a BT-sized business off that. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.