Feeds

'Tens of thousands' of US students sign up for legal P2P

Paying to be guinea pigs, apparently

3 Big data security analytics techniques

The end of control...and safe harbor, too

Playlouder MSP boss Paul Sanders said attitudes had moved forward radically in the last 18 months.

"The rights holding community is now willing to engage with the ISP community. Only two years ago, we'd approach a major label and explain the unlimited model. They'd go, 'fine but our wholesale price is 55p per track.' No one's ever going to start to have a sensible commecial conversation if that's the premise."

He predicted the debate would become more sophisticated as paid-for services were better understood.

"ISPs want a proper, professionally managed service that they can hold accountable for it. That's not the same as a free-for-all. They want the grey area content [eg, mashups, live recordings, and bootlegs], but in a managed environment. A lot of these questions recede as the managed and invested-in services emerge."

Griffin had one interesting observation that was a side-effect of the Net Neutrality fuss.

"How dare you [ISPs] speed some packets up, slow some down, but claim you didn't know what was in them. They no longer deserve the Safe Harbour exemption. To claim otherwise would be blind ignorance. "

"Let's toss it out."

Now that will drive the freetards completely nuts. ®

Top three mobile application threats

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.