Many times, videos posted on YouTube are removed whenever anyone from a record label to a TV network to the National Football League can claim copyright to anything that infringes on their intellectual property.
But what if a record label orders an instructional video that has no music on it to be taken down? I mean, it’s bad enough that Universal Music Group [UMG] can lay claim to Zoë Keating’s works even though she never signed a deal with them. Now, there’s Warner Music Group [WMG] taking down a video posted on YouTube by one Teresa Richardson in which she teaches crocheting, and has been seen over 50,000 times. Did Ms. Richardson ever sign a deal with WMG? Highly doubtful, since that video had no music on it, but that matter was eventually resolved, and her video was posted back on YouTube.
As for UMG, they apparently haven’t learned from their Zoë Keating mistake. Now, they’ve recently ordered a takedown of a video by a rap act that isn’t actually signed to their label. Granted, this is a more interesting case because it involves the unsigned act, After the Smoke, recording a “beat,” then shopping it around before drawing the interest of a rapper named Yelawolf, who then recorded his own words over this beat just as he got signed to UMG.
But then Yelawolf’s track got leaked, After the Smoke never got credit, then recorded their own track over the beat they themselves recorded, and that version was the one that got taken down because, UMG assumed, Yelawolf got to it first. According to Techdirt’s report, it turned out that neither UMG nor Yelawolf had officially licensed the “beat,” but when After the Smoke’s complaint to YouTube resulted in them claiming UMG “owned the track,” the label realized what they made a mistake and backed off.
Accounts like these are part of what happens when major record labels that complain about Internet “piracy” decide to become pirates themselves by staking claims to material that isn’t really theirs to begin with. And it’s no surprise that UMG and WMG are among the best at bogus extreme takedowns. Some of their past efforts were enough to put them in the Electronic Frontier Foundation’s “Takedown Hall of Shame.”
Democratic Congressmember, Zoe Lofgren, represents a constituency in central California that includes parts of San Jose and the Silicon Valley. In late October 2011, after some of her colleagues in the US House of Representatives, led by Congressmember and Chairman of the House Judiciary Committee Lamar Smith of Texas, introduced a bill called the Stop Online Piracy Act [SOPA], Ms. Lofgren declared her opposition to the proposals as “the end of the Internet as we know it.”
SOPA, sometimes known as E-PARASITE [Enforcing and Protecting American Rights Against Sites Intent on Theft and Exploitation], is the House’s equivalent of the Senate’s PROTECT-IP [Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property] bill, in that both are meant to put a stop to websites that carry content that infringes on copyrights, combined with Senate Bill 978, which would criminalize online streaming even of people who sing others’ songs on YouTube. Whatever kind of anti-online piracy legislation gets passed, there is the thinking that it could do more harm than whatever good may come of it. How so? Let us count some of the ways:
Under the proposals, any copyright holder can get a court order to shut down a website that posts any infringing material without giving the accused website an opportunity to challenge such a shutdown in court. On top of that, the owner of such a website could even be denied Internet access…again, without due process.
Prof. Mark Lemley of Stanford told the public radio program “Marketplace” that if you so much as put up a link to a website that carries the infringed copyright material, you’ll end up just as guilty of “facilitating infringement” as the website that infringes copyright. Even Google, Twitter, Facebook and YouTube could be all but put out of business as a result.
David Sohn of the Center for Democracy & Technology commented that under SOPA, “a central issue is that the bill’s definitions of bad websites are vague and broad.” So much so that the Future of Music Coalition commented that even legitimate sites, both within and outside of the US, could be held for violations of SOPA, thus making the Internet “too wide for comfort.” On top of that, copyright owners, by filing a court order against an infringing website, don’t have to go to court and explain their actions, which adds to there being no opportunity at justice for the accused.
Previously, I wrote about how a neighborhood in Houston, Texas was experimenting with wireless broadband [a.k.a. wifi] that used unlicensed “white spaces” between TV channels. Now, it looks like this idea, based on what the Federal Communications Commission authorized back in September 2010, has bred a standard that will increase its availability.
The Institute of Electrical and Electronics Engineers, who sanctioned the “wireless local area network” standard known numerically as 802.11, has given a number to this new “wireless regional area network” idea…802.22. According to IEEE’s press release, the “Wireless Regional Area Networks” that can be spawned from this new standard can cover a radius of up to 62 miles [100 km], based on flat terrain, and can deliver speeds of up to 22 mbps, which, by itself, would rival most existing available broadband services, wired or wireless.
But just because a new wireless broadband standard can provide speeds equal to much of what’s available now doesn’t quite mean it will. A more realistic scenario that could occur if twelve users are on any one unoccupied “white space” channel would have speeds at just 1.5 mbps for downloading, and 384k for uploading, on a par with DSL systems.
Even so, rural areas of the US, as well as in many underdeveloped parts of the world, are reported to be the most likely of areas to gain this new wireless broadband technology once it takes hold by 2013 or so, because those areas don’t have as much Internet access, but are certain to have plenty of white spaces due to less over-the-air digital TV channels. Larger cities, which have more TV channels on air, are less likely to have “white spaces,” though “channel bonding” [more than one empty TV channel] can increase the available bandwidth.
A couple of subjects from some of my past blogs have been getting some press lately. The first has been doing some new things, while the second has gotten into some deep trouble.
Let’s start with Rebecca Black, whom I’ve written about twice already in light of her instant success from, as well as the controversies behind, her song “Friday.” Lately, it seems like Black’s fame clock hasn’t quite run out yet. First, she did a quickie cameo appearance in the video of Katy Perry’s hit “Last Friday Night.”
Katy Perry: Last Friday Night (T.G.I.F.)
Now, just as this is being written, Black is about to release a followup to “Friday,” entitled “My Moment,” which she will put up first on YouTube and iTunes, to be followed in August 2011 by a 5-song EP, which she will release herself rather than through a label, so at least she and her mom are already learning to hang on to those master recordings.
Just a few words of advice to Ms. Black, from a layperson’s perspective…just make sure you put together a grassroots tour that would benefit you financially. Options would range from a “mall tour,” like everyone from Tiffany to Selena Gomez has done over the years, with a corporate sponsor to back it; to maybe playing some small auditoriums. I was going to suggest “house concerts,” but I think you’re a bit too popular for those.
While Rebecca Black is getting more time added to her fame clock, Rupert Murdoch, the media magnate whom I wrote about last month for his plans to innovate digital education, is loosing the fame clock. Maybe you’ve known by now that Murdoch had to shut down one of his newspapers in London after charges circulated that the paper’s staff had hacked cellphones of everyone from victims of murder and 9/11/01 terrorism to celebrities and government officials.
Whenever a complex issue like the economy can be summed up in a matter of seconds, or in this case a matter of minutes, regardless of viewpoint—it’s worth a post.
Former Labor Secretary Robert Reich delivers “the big picture in less than two minutes fifteen seconds.”
1. Since 1980, the American economy has doubled in size. But adjusting for inflation, most people’s wages have barely increased.
Will Sony PlayStation Network get back up off the mat?
It has been six days and Sony PlayStation Network is still down. Initially, the outage as reported by IDG, Sony said the outage was caused by an external intrusion, but for five days Sony had yet to provide details.
As a gamer, I found that troubling. I could imagine the service being down for a day, but at that point, since there wasn’t any news on what was happening—the frustration was mounting.
Then Tuesday night of day five, Sony announced that PlayStation Network has been hacked into and revealed that information of PSN user accounts was accessed during the intrusion—names, addresses, birth dates, passwords, security questions and answers.
There is no way of telling the effects to the user base Sony will incure at this time, but if all things being equal, they have a long, hard uphill battle to face. The real question is how this will change the perception that Sony can compete with Xbox in the network space.
PlayStation users have been vocal on Twitter and Facebook, perhaps Sony will have to appease the angry villagers some way.
Yesterday, O’Reilly Media researchers, Alasdair Allan and Pete Warden released an article exposing a hidden file that records every movement of an iPhone. All iPhones store location data in a file called consolidated.db. Warden released an OS X application to show users the significance of their discovery. The application shows each user where they have been since last July. Not only is the data stored on your phone but also your computer.
This database of your locations is stored on your iPhone as well as in any of the automatic backups that are made when you sync it with iTunes.
This isn’t the first time we have heard of the file. In fact in February 2011, Sean Morrissey and Alex Levinson previewed Lantern 2.0 at a Cyber Crimes Conference in Washington DC. Lantern 2.0 however is a commercial forensics product that retails from $600-700. And before that, Alex Levinson began work on the vulenerabilities of iPhone and iPad. Check that out by clicking here.
Not long ago Las Vegas wasn’t part of the technology innovation. In fact, the basic premise of Vegas has kept it simple in a way—gambling, drinking, and showgirls. The nightlife is unrivaled and the entertainment is unforgettable. “Vegas means comedy, tragedy, happiness, and sadness all at the same time.” —Artie Lange. Artie has it right! Vegas is everything to everyone. But would you ever say Vegas was a technology hub?
Not until recently did I find myself in awe of some of the technology advancements going on in Sin City. I stay at the same room on the strip, great views and superb staff at the Paris/Bally’s, but then I hit the smokey casino floor, the waitresses clad in skimpy dresses, music was loud, and the craps table had a gang around it screaming and clapping. The sounds of slots and people from around the world engaging in all their vices. I found myself at a Pai Gow table. I play poker. I enjoy poker. The cards, the drinks, the felt tables where cards float across as if on a cushion of air, and that is when I noticed. There in the middle of this table, I couldn’t believe it, a small touch-screen LCD panel the dealer keeps tapping. As I watch for the next few hands—it hits me—that screen is a display of all the hands around the table. Wait, wait wait. I have been going to Vegas for years, but I have never seen anything like this. How did it know? If players had problems setting their Pai Gow hand the dealer would simple push the according seat number on the LCD and it would say how to play with best odds and correctly.
So I inquired with the Pit Boss and he explained to me that automatic shufflers not only shuffle, but continuously monitor the cards in the deck. It knows when cards are missing, what card is missing and which players have which cards. It knows everything on that table!
As much as I love being indoors playing on some computing device, there are times when I want to be out playing in the sun. I am fortunate that I live in Southern California. I spend weekends exploring the many things to do from Ventura to San Diego. But something caught my eye recently. Geocaching.
What is this thing might you ask? Let me tell you.
Geocaching (pronounced geo-cashing) is an outdoor sporting activity in which the participants use a Global Positioning System (GPS) receiver, or other navigational techniques, to hunt hide-and-seek containers, called “geocaches” or “caches,” anywhere in the world. Simply: It’s a treasure hunting game that requires some sort of GPS. Think pirate maps where “X” marks the spot, but then add technology.
Geocaching is more similar to the 150-year-old game letterboxing, which uses clues and references to landmarks embed into stories. Geocaching was conceived shortly after the removal of Selective Availability from GPS on May 1, 2000, because the improved accuracy of the system allowed for a small container to be specifically placed and located. The first documented placement of a GPS-located cache took place on May 3, 2000, by Dave Ulmer of Beavercreek, Oregon.
The state of the mobile network during and after Japan’s earthquake was in shambles. The emergency services and local authorities used what was left of the badly damaged network. But fear not my little social media peeps; during such emergencies, it seems Twitter, Facebook, and in Japan’s case Mixi all remained untouched by the natural disaster.
Ok kids, let’s explore what happens and how social networks are the best source of communication during major catastrophes.
As seen in Japan, earthquakes are monsters. The latest info and technology has been aimed at prediction and awareness. However, the latest in earthquake technology has turned to the community at large. The iShake Project developed by University of California, Berkeley Civil Engineering is using the smartphone network to help emergency responders locate the most heavily damaged areas during an earthquake through its user base. The new “social media,” and I hesitate to label it that, application uses the accelerometer to collect ground motion intensity and runs in the background of your smartphone. When an earthquake hits, it sends a report to emergency services to assess the most damaged areas so that they are able to respond accordingly.
This turns every phone with the app into an effective earthquake measuring device. The data gleaned from the application is a valuable source of information, not only for emergency responders, but for us John Q. Public. The application allows us to see the damaged areas as well through its iShake map. We then can avoid areas of heavy damage and allow the responders to get in. Through iShake people will be able to make use of their own smartphones and participate in an effective and valuable process to inform emergency responders in the event of an earthquake.
Every developer of mobile applications faces the same issues: discovery, monetization, and security. Well, security wasn’t at the forefront until something happened that changed the industry. As seen recently, the mobile world for the first “real” time has been under attack. Last week’s attack on Android has shown there are serious flaws in security. Experts in security have predicted that smartphones will be targeted heavily as more users migrate from computers to smartphones in 2011. Moreover, the attack is even new to the world of computing. For the first time hackers can send malware packets and it costs the user real money.
While Google has reportedly expunged over 50 apps on the Android Market, it is very clear that malware and piracy on mobile devices are at the forefront of the new generation of hackers. It is important for mobile developers to begin a paradigm shift in the business and technology models in maintaining a healthy marketplace for mobile users. And more importantly, for the business. In the meantime Google and the likes will have to battle quickly to change the mindset of the community. After last week’s attack Google responded with some vague notions of their plans to help in the cyber war.