Feeds

Google turns up nose at ebook monopoly claims

How much is an orphan worth?

  • alert
  • submit to reddit

High performance access to file storage

The Positive/Negative Feedback Loop

For Dan Clancy, Google's settlement doesn't hamper competition. It feeds competition, encouraging authors and publishers to step forward and claim their work - creating a copyright database that anyone else can use.

"The idea is to build a system that helps define who the rights holders are to make it easier for everybody. The fact that access to these books is being made available, that money is being held, that there's an organization where you can find the rights holders, it incentivizes people to come forward...It creates this positive feedback loop of getting more and more works claimed. So it means that other people who have all sorts of ideas can take advantage."

But this also means that a single, private concern will control prices on all claimed works. It's not an open market. "There is very little incentive for the BRR to engender competition for vending alternative access to the books because it would drive prices downwards, thus diminishing returns to registered rights holders," says Peter Brantley.

And because of this, rights holders may be less likely to join. "Many writers and authors are so incensed, they are pulling their books out - more of a negative feedback loop if you ask me," Brantley continues. "The rights registry should be a public asset, not a private good. The Book Rights Registry should either be provided through the Copyright Office or regulated to engender public access. We don't want a private organization stipulating when we will have access to public data."

What's more, the Registry won't include the orphans. Again, those rights will rest with Google and Google alone. Even if you can negotiate a decent price with the Registry, you won't have access to the same works as Mountain View. Which brings us full circle, back to the voices howling that Google is weeks away from securing a digital monopoly around orphan works.

Surely, they're worth listening to. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.