Copyright and Shared Networking Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Copyright and Shared Networking Technologies Copyright and Shared Networking Technologies By Gaetano Dimita A Thesis Submitted for the Degree of Doctor of Philosophy Queen Mary, University of London 2010 1 I confirm that the work presented in the thesis is my own and all references are cited accordingly. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. Gaetano Dimita 2 Abstract The technological zeitgeist has transformed the social-cultural, legal and commercial aspects of society today. Networking technologies comprise one of the most influential factors in this. Although this transformation can be discounted as a mere historical phenomenon dating back to the advent of the printing press, empirical data concerning usage of these technologies shows that there has been a radical shift in the ability to control the dissemination of copyright works. Networking technologies allow, in an unprecedented manner, user-initiated activities including perfect replications, instantaneous dissemination, and abundant storage. They are immune to technological attempts to dismantle them, and impervious to legal attempts to control and harness them. They affect a global audience, which in turn, undermine at negligible costs, the legal and business parameters of copyright owners. The problem is whether it will now be possible to establish a copyright framework which balances the interests of the following groups: (a) copyright owners in their control of the dissemination of their works; (b) authors demanding remuneration for the exploitation of their works; (c) users wishing to consume works with clear immunity guidelines using networked technologies; (d) technologists striving to continuously innovate without legal and policy restrictions. Copyright law is not a mechanism for preserving the status quo or a particular business model. It is, as suggested above, a reflection of the needs and interests of authors, copyright owners, entertainment industries, users and technologists. This thesis examines whether the balance between these actors can be achieved and, if so, how it can be implemented within international, regional and national copyright laws. It finds that a balance can be struck; but that this balance should be aligned along three key concepts: user integrity; technological innovation; and authors‘ and owners‘ remuneration. The proposal is that the optimal method for achieving this triptych is the introduction and global implementation of a reasonable and unobtrusive system of remuneration. 3 Table of Contents Abstract ...…………..…………..................................................................................................... p. 3 Table of Content …………………………………………………………………………..……. p. 4 Table of Figures …………………………………………………………………………………. p. 8 Table of Abbreviations ………………………………………………………………………….. p. 9 Acknowledgements ………………………………….………………………………………….. p. 11 Introduction Problem Review …………..…..……………..………….………………………......................... p. 12 Objective and Scope of the Study ……………………………………………………………….. p. 15 Methodology, Sources and Limitations …………………………………………………………. p. 17 Chapters Outline ………………………………………………………………………………… p. 18 Chapter One - A History of Decreasing Control over Dissemination 1.1 - Introduction …………………………….………………………………………………….. p. 20 1.2 – Printing Press …..…………………………………………………..................................... p. 20 1.3 – Phonograph Machine & Broadcasting ……………............................................................. p. 23 1.4 – User-Accessible Copying Technologies ………….………………...…………………….. p. 24 1.5 – The Digital Revolution ……...……….…………………………..……………………….. p. 28 1.6 – Origins of Networking Technologies ……………………………...……………………… p. 29 1.7 - Web1.0 & Pre-File-Sharing Technologies …….................................................................... p. 31 1.8 – Conclusion ………………………………………………………………………………… p. 32 Chapter Two - An Introduction to Networking Technologies 2.1 – Introduction ………………………………………………………...................................... p. 34 2.2 – Peer-to-Peer File-Sharing ……………………………………….………………………… p. 34 2.2.1 – ‗Generations‘ ……………………………………………………………………. p. 35 2.2.1.1 – Centralised File List ……………………………………………………. p. 35 2.2.1.2 – Gnutella/Fast Track ……………………………………………………. p. 36 2.2.1.3 – BitTorrent ……………………………………………………………… p. 37 2.2.1.4 – Private Networks ………………………………………………………. p. 38 2.2.2 – Softwares ………………………………………………………………………… p. 38 2.2.2.1– Napster ………………………………………………………..………… p. 38 2.2.2.2 – Aimster …………………………………………………………............. p. 39 2.2.2.3 – Kazaa ……………………………………………..…………….............. p. 39 2.2.2.4 – File Rogue, WinMX (WinNY), Soribada, & Kuro …..…….…………. p. 40 2.2.2.5 – Morpheus (Grokster) ……………….………………………………….. p. 42 2.2.2.6 – eMule …………………………………....….......................................... p. 42 2.2.2.7 – LimeWire ……………………………………………………................ p. 43 2.2.2.8 - BitTorrent ……………………………………….…............................... p. 43 2.2.2.9 – WASTE, OneSwarm, Tor & Torrent Privacy .……………………...…. p. 46 2.3 – Web2.0 ……………………………………………………..…………………………….. p. 48 2.3.1 – Semantic Web ……………………………………………………………........... p. 49 2.3.2 – User-Generated Content (UGC) ………………………….................................... p. 49 2.3.2.1 – Wikis …………………………………………………………………… p. 51 2.3.2.2 – Content-sharing sites ………………………………………………….. p. 51 2.3.2.3 – Social-Networks …………....................................................................... p. 53 2.3.3 – Virtual Worlds ………………………………………………………………….. p. 54 2.4 - Future Synergies ………………………………………………………………………….. p. 55 2.4.1 – Broadband ……….……………………………………………………………… p. 55 2.4.2 – Cloud Computing ………………………………………………………………. p. 56 2.5 – Conclusion ………………………………………………………………………………. p. 57 Chapter Three - Contextualising Networking Technologies within Copyright Law 3.1 – Introduction …………………………………..…………………………………………… p. 58 3.1.1 – Moral Rights …………………………………………………………….….…… p. 60 3.1.2 – Reproduction Right …………………………………………………………..…. p. 60 3.1.3 – Communication to the Public & On-Demand Making Available Right ............... p. 62 3.1.4 – Distribution Right …………………………………………………………..…… p. 63 4 3.1.5 – Other Rights ………………………………………………………………..…… p. 64 3.1.6 – Infringement ….………………………………………………………………… p. 64 3.1.7 – Limitations, Exceptions and Defences ………………………………………..… p. 65 3.1.8 – Jurisdiction and Applicable Law ……………………………………………….. p. 66 3.2 – The Users ………………………………………………………………………………… p. 67 3.2.1 – Infringement by Copying …………….………………………………………… p. 68 3.2.2 – Infringement by Communicating to the Public (including Making Available and Distribution) ........................................................................................................ p. 69 3.2.3 – Limitations and Exceptions ……………………………………………………… p. 70 3.2.4 – Stealth Technologies, Privacy Shields and Counterattacks ……………………… p. 71 3.2.5 – Nationals Approaches ……………………………………………………………. p. 73 3.2.5.1 – UK ……………………………………………………………………… p. 73 3.2.5.2 – US ………..……………………………………….................................. p. 76 3.2.5.3 – France …………………………………………….................................. p. 80 3.2.5.4 – Germany …………………………………………….............................. p. 82 3.2.5.5 – Italy …………………………………………………………………….. p. 83 3.2.5.6 – Spain …………………………………………………………………… p. 84 3.2.5.7 – Canada …………………………………………………………............ p. 85 3.2.6 – User Status ……………………………………………………………………… p. 86 3.3 – The Facilitators: Software Provider ……..……………….………..................................... p. 87 3.3.1 – Potential Defences …………….………………………………............................ p. 91 3.3.2 – Dodging Lawsuits ………………………………………………………………. p. 92 3.3.3 - Nationals Approaches ……………………………………………………............ p. 93 3.3.3.1 – UK ……………………………………………………………………… p. 93 3.3.3.2 – US ………………………………………………................................... p. 95 3.3.3.3 – France …………………………………………..................................... p. 96 3.3.3.4 – Germany ……………………………………………............................. p. 97 3.3.3.5 – Australia ……………………………………………………………….. p. 97 3.3.4 – Software Provider Status ………………………………………………………… p. 98 3.4 – The Facilitators: Intermediaries .…..……………………………….……………………… p. 99 3.4.1 – Definition ………………………………………………………………………… p. 99 3.4.1.1 - Internet Access Providers ……………………………………………….. p. 100 3.4.1.2 – Online Service Providers ………………………………………………. p. 101 3.4.1.3 – Communication Network Providers …………………………………… p. 101 3.4.2 – Disclosure of Personal Data …………………………………………………….. p. 102 3.4.2.1 – EU ……………………………………………………………………... p. 102 3.4.2.2 – US ……………………………………………………………………… p. 103 3.4.3 – Potential Defences ..……………………………………………………………… p. 103 3.4.4 – Take-Down Notice ………………………………………………………………. p. 105 3.4.5 – User-Generated-Content License ……………………………………................... p. 105 3.4.6 – National Approaches …………………………………………………………….. p. 106 3.4.6.1 – UK ……………………………………………………………………… p. 106 3.4.6.2 – US ………………………………………………................................... p. 108 3.4.6.3 – France …………………………………………...................................... p. 110 3.4.6.4 – Germany ……………………………………………............................. p. 112 3.4.6.5 – Belgium ………………………………………………………………… p. 112 3.4.6.6 - Italy ……………………………………………………………………… p. 113 3.4.6.7 – Spain ……………………………………………………………………. p. 114 3.4.6.8 - Sweden ………………………………………………………………….. p. 114 3.4.6.9 – Australia ……………………………………………............................... p. 115 3.4.6.10 – Canada …………………………………………………........................ p. 116 3.4.6.11 – Iceland ………………………………………………………………… p. 117 3.4.7 – Intermediaries Status …………………………………………………………….. p. 117 3.6 – Conclusion
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • CJ E&M CORPORATION and SUBSIDIARIES Condensed
    CJ E&M CORPORATION AND SUBSIDIARIES Condensed Consolidated Interim Financial Statements June 30, 2015 and 2014 (Unaudited) (With Independent Auditors’ Review Report Thereon) Contents Page Independent Auditors’ Review Report 1 Condensed Consolidated Interim Statements of Financial Position 3 Condensed Consolidated Interim Statements of Comprehensive Income (Loss) 5 Condensed Consolidated Interim Statements of Changes in Equity 7 Condensed Consolidated Interim Statements of Cash Flows 9 Notes to the Condensed Consolidated Interim Financial Statements 11 Independent Auditors’ Review Report Based on a report originally issued in Korean The Board of Directors and Shareholders CJ E&M Corporation: Reviewed financial statements We have reviewed the accompanying condensed consolidated interim financial statements of CJ E&M Corporation and its subsidiaries (the “Group”), which comprise the condensed consolidated interim statement of financial position as of June 30, 2015, the condensed consolidated interim statements of comprehensive income (loss) for the three- and six-month periods ended June 30, 2015 and 2014, the condensed consolidated interim statements of changes in equity and cash flows for the six-month periods ended June 30, 2015 and 2014 and notes to the interim financial statement. Management’s responsibility Management is responsible for the preparation and fair presentation of these condensed consolidated interim financial statements in accordance with Korean International Financial Reporting Standards (“K-IFRS”) No. 1034, ‘Interim Financial Reporting’, and for such internal control as management determines is necessary to enable the preparation of financial statements that are free from material misstatement, whether due to fraud or error. Auditors’ review responsibility Our responsibility is to issue a report on these condensed consolidated interim financial statements based on our reviews.
    [Show full text]
  • The Korean Internet Freak Community and Its Cultural Politics, 2002–2011
    The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 by Sunyoung Yang A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Anthropology University of Toronto © Copyright by Sunyoung Yang Year of 2015 The Korean Internet Freak Community and Its Cultural Politics, 2002–2011 Sunyoung Yang Doctor of Philosophy Department of Anthropology University of Toronto 2015 Abstract In this dissertation I will shed light on the interwoven process between Internet development and neoliberalization in South Korea, and I will also examine the formation of new subjectivities of Internet users who are also becoming neoliberal subjects. In particular, I examine the culture of the South Korean Internet freak community of DCinside.com and the phenomenon I have dubbed “loser aesthetics.” Throughout the dissertation, I elaborate on the meaning-making process of self-reflexive mockery including the labels “Internet freak” and “surplus (human)” and gender politics based on sexuality focusing on gender ambiguous characters, called Nunhwa, as a means of collective identity-making, and I explore the exploitation of unpaid immaterial labor through a collective project making a review book of a TV drama Painter of the Wind. The youth of South Korea emerge as the backbone of these creative endeavors as they try to find their place in a precarious labor market that has changed so rapidly since the 1990s that only the very best succeed, leaving a large group of disenfranchised and disillusioned youth. I go on to explore the impact of late industrialization and the Asian financial crisis, and the nationalistic desire not be left behind in the age of informatization, but to be ahead of the curve.
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Beat the Heat! Come Inside! Cool
    PAGE TWENTY-FOUR F R ID A Y , J U L Y 18, 1989 Manrbt'Btipr lEtic^rnttg iimlb ATHRge Dait)r N et P raw Run Var The Week Ended June M, IMk The Weather Fair, .(Cooler, less humid to­ >15,459 day. Low In the 6(>s. High Sun­ day 80 to 85. ■ ManeheUer— 4 City of ViUofe Charm 1 VOL. LXXXVin. NO. 246 (SIXTEEN PAGES—TV SECnON) MANCHESTER, CONN., SA-TURDAY, JULY 19, 1969 (TMeatned AdvertWng on Page 1 8 ) PRICE TEN CENTS 8'V*-' A 'v\ V: \*/ On Tarfret ^ r ^ C \ O f ^ r i ( .............................f l l ( / 0........................................ \ .... ................................................ ........... BEAT THE HEAT! COME INSIDE! COOL OFR Moon Blots Out Sun Apollo ]^ears Goal; V SAVE WITH THESE VALUABLE COUPONS TONIGHT and SATURDAY ■sS' By HOWARD BENEDICT two days of g r ^ t human ad­ He also reported a brilliant AP Aerospace Writer DON'T FORGET TO CHECK ALL STORES — IF YOU FIND YOUR venture. solar corona as the moon ec­ SPACE CENTER, Houshm As they darted Into an arejs lipsed all but the halo of gases (A P ) — Apollo U’b explorers where the moon blotted out the surrounding the stki. NAME POSTED — YOU'RE A LUCKY WINNER! raced Into the shadow of the sunUght at 8:60 a.m. EOT, com­ “ It. looks like an eerie sight," moon today and reported a mander Nell A. Armstrong re­ the Apollo H commander said. spectacular final sighting of ported picking out lunar fea­ Armstrong, Edwin E. Aldrln their tatget as they prepared tures Illuminated by light re­ Jr.
    [Show full text]
  • ISP Liability in the Field of Copyright
    Internet Service Providers’ Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law WIPO International Seminar on Copyright Jointly organized by WIPO and the Ministry of Culture of Brazil 26 November 2008 A/Prof Daniel Seng Faculty of Law, National University of Singapore 1 Internet Intermediaries • Who is an Internet “service provider”? – Infrastructure intermediaries e.g. Internet Access Service Providers, proxies, DNS – Services intermediaries e.g. search engines, archives – Software developers of networks and connectivity tools e.g. FreeNet, Kazaa, Morpheus – Operators and hosting companies e.g. content hosts, exchange platforms, forums – Diverse types of intermediaries with different roles offering different services • Are intermediaries liable for: – Direct liability e.g. reproductions, communication of works on their infrastructure? – Indirect/secondary liability e.g. authorising or facilitating the infringement of their users/subscribers? 2 Developments Worldwide • Legislative Developments to Protect Internet Service Providers – WIPO Copyright and Performances and Phonograms Treaties 1996 – US Digital Millennium Copyright Act 1998 – Australian Copyright Amendment (Digital Agenda) Act 2000 – EU Information Society and E-Commerce Directives 2001 – Singapore Copyright Amendment Act 2005 – HK Copyright (Amendment) Bill (proposed, 2007) – New Zealand Copyright (New Technologies) Amendment Act 2008 – France, “Three-Strikes” Law (4 Nov 2008); cf: U.K.’s “Graduated Response” Law 3 Litigation Worldwide • Exposure of
    [Show full text]
  • Riverside Quarterly V2N4 Sapiro 1967-03
    Riverside XZ ‘ RIVERS lue. QUARTERLY March 1967 Vol. u, 4 Editor: Leland Sapiro Associate Editor: Jim Harmon Poetry Editor: Jim Sallis Assistant Editors: Redd Boggs Edward Teach Jon White Send business correspondence and prose manuscripts to: This issue is dedicated to John W. Campbell, Jr., who is Box 82 University Station, Saskatoon, Canada the main subject in two articles. If Orlin Tremaine changed science fiction "from a didactic exercise into a form of art," Send poetry to: R.D. 3, Iowa City, Iowa 52240 then Campbell changed it from romance to novel, i.e., into an art form with social content. I do not prefer the type of story emphasised by Mr. Campbell's present magazine, but this in no way reduces indebtedness to him for any science fiction reader. table of contents "NOW HEAR THIS'." Everyone is urged to register at once for the 1967 science­ RQ Miscellany .................... 231 fiction convention to be held in New York city, September 1—4. Superman and the System ..... A S3 registration fee paid now entitles you to the usual con­ (first of two parts) ........... W.H.G. Armytage .... 232 vention privileges (e.g., reduced room rates) plus progress reports and a program book mailed in advance. Send cash or in­ Consubstantial ............ ....... Padraig 0 Broin .... 243 quiries to Nycon 3, Box 367, Gracie Square Sta., New York 10028. Creide's Lament for Cael ............ 244 Parapsychology: Fact or Fraud? .... Raymond Birge ..... 247 "RADIOHERO" The Bombardier .................... Thomas Disch ....... 265 Old Time Radio fans can anticipate Jim Harmon's book, The Great Radio Heroes, scheduled for publication by Doubleday On Being Forbidden Entrance to a Castle ...
    [Show full text]
  • Bryan Curtis
    The Library of America • Story of the Week Reprinted from Football: Great Writing about the National Sport (The Library of America, 2014), pages 413–34. Headnote by John Schulian. Originally appeared in Texas Monthly (January 2013). Copyright © 2013. Reprinted by permission of Texas Monthly. Bryan Curtis Bryan Curtis (b. 1977) is predictable only in that there seem to be surprises in everything he writes, good surprises, the kind that let readers know they can count on him for a unique take no matter what the subject. Consider the surge in concern over concussions in football from the NFL on down to the youth leagues. It was the youth leagues that fascinated Curtis, a staff writer at the website Grantland and a native Texan whose byline appears fre- quently in Texas Monthly. He wanted to see “how they were processing the news about football. How they were coming to grips with it. How they were, in some cases, ignoring it.” Curtis found the perfect team to study in Allen, Texas, outside Dallas—undefeated for years, loaded with prize elementary school athletes who would realize only later that they were saying good-bye to childhood. His story about them, “Friday Night Tykes,” appeared in Texas Monthly’s January 2013 issue and provided further evidence that he is one of the new century’s very best sportswriters. Curtis began his journalism career by writing about the real world for the New Republic and Slate, first explored the world of fun and games at the New York Times’ sports magazine Play, and returned to the serious side to help Tina Brown, the mercurial former Vanity Fair and New Yorker editor, launch The Daily Beast.
    [Show full text]
  • P2P Protocols
    CHAPTER 1 P2P Protocols Introduction This chapter lists the P2P protocols currently supported by Cisco SCA BB. For each protocol, the following information is provided: • Clients of this protocol that are supported, including the specific version supported. • Default TCP ports for these P2P protocols. Traffic on these ports would be classified to the specific protocol as a default, in case this traffic was not classified based on any of the protocol signatures. • Comments; these mostly relate to the differences between various Cisco SCA BB releases in the level of support for the P2P protocol for specified clients. Table 1-1 P2P Protocols Protocol Name Validated Clients TCP Ports Comments Acestream Acestream PC v2.1 — Supported PC v2.1 as of Protocol Pack #39. Supported PC v3.0 as of Protocol Pack #44. Amazon Appstore Android v12.0000.803.0C_642000010 — Supported as of Protocol Pack #44. Angle Media — None Supported as of Protocol Pack #13. AntsP2P Beta 1.5.6 b 0.9.3 with PP#05 — — Aptoide Android v7.0.6 None Supported as of Protocol Pack #52. BaiBao BaiBao v1.3.1 None — Baidu Baidu PC [Web Browser], Android None Supported as of Protocol Pack #44. v6.1.0 Baidu Movie Baidu Movie 2000 None Supported as of Protocol Pack #08. BBBroadcast BBBroadcast 1.2 None Supported as of Protocol Pack #12. Cisco Service Control Application for Broadband Protocol Reference Guide 1-1 Chapter 1 P2P Protocols Introduction Table 1-1 P2P Protocols (continued) Protocol Name Validated Clients TCP Ports Comments BitTorrent BitTorrent v4.0.1 6881-6889, 6969 Supported Bittorrent Sync as of PP#38 Android v-1.1.37, iOS v-1.1.118 ans PC exeem v0.23 v-1.1.27.
    [Show full text]
  • The K-Pop Wave: an Economic Analysis
    The K-pop Wave: An Economic Analysis Patrick A. Messerlin1 Wonkyu Shin2 (new revision October 6, 2013) ABSTRACT This paper first shows the key role of the Korean entertainment firms in the K-pop wave: they have found the right niche in which to operate— the ‘dance-intensive’ segment—and worked out a very innovative mix of old and new technologies for developing the Korean comparative advantages in this segment. Secondly, the paper focuses on the most significant features of the Korean market which have contributed to the K-pop success in the world: the relative smallness of this market, its high level of competition, its lower prices than in any other large developed country, and its innovative ways to cope with intellectual property rights issues. Thirdly, the paper discusses the many ways the K-pop wave could ensure its sustainability, in particular by developing and channeling the huge pool of skills and resources of the current K- pop stars to new entertainment and art activities. Last but not least, the paper addresses the key issue of the ‘Koreanness’ of the K-pop wave: does K-pop send some deep messages from and about Korea to the world? It argues that it does. Keywords: Entertainment; Comparative advantages; Services; Trade in services; Internet; Digital music; Technologies; Intellectual Property Rights; Culture; Koreanness. JEL classification: L82, O33, O34, Z1 Acknowledgements: We thank Dukgeun Ahn, Jinwoo Choi, Keun Lee, Walter G. Park and the participants to the seminars at the Graduate School of International Studies of Seoul National University, Hanyang University and STEPI (Science and Technology Policy Institute).
    [Show full text]
  • Operation D-Elite Results in Jail Time for Bittorrent Admin by Jessie B
    Operation D-Elite Results in Jail Time for BitTorrent Admin By Jessie B. Sweetland Daniel Dove, an administrator of EliteTorrent.org, a peer-to-peer (P2P) BitTorrent site was convicted on July 28, 2008 of one count each of conspiracy and copyright infringement for his involvement with the site. On September 9, 2008 Dove was sentenced to a term of 18 months of incarceration and a $20,000 fine. The FBI and the U.S. Immigration and Customs Enforcement (ICE) shut the site down on May 25, 2005 as part of Operation D-Elite. Agents of the FBI and ICE targeted EliteTorrent primarily for its illegal distribution of copyrighted movies. The Department of Justice reported that the site had a copy of Star Wars Episode III: Revenge of the Sith available for download six hours before it was shown in theatres. Users downloaded the movie 10,000 times within the following 24 hours. At its peak the site had over 125,000 users that downloaded approximately 700 movie titles over 1.1 million times. Several other BitTorrent sites have shut down in recent years, including LokiTorrent and SuprNova.org due to threats of legal action or a legal shut down. Shutting down BitTorrent sites does little to deter users of P2P networks. As quickly as one site shuts down users move to other sites, many of which are hosted outside of the United State and therefore are harder for the United States government to control. Dove’s conviction follows the convictions of several other administrators’ for the P2P network, including Grant Stanley and Scott McCausland who each received five months incarceration, followed by five months home confinement and a $3,000 fine.
    [Show full text]
  • Report on S-4 Starts Storm of Protests Saves Woman
    ’.^“.•'V'^ •*4n '-p £ ' HM'"*" _ C,--V ■, , ’ ',V >X5',V' PBBSH BUX fSieiihst hr V. 8. <WejaSer Bhrem, AVBRAGB DAltiY CIHCVLATIOX Mew Have* ; for the month of January, 1€ J8 'Increasing cloudineea and warm* er, followed by rain late ton i^ t 5 , 0 8 7 and Tlinradaf; ^ ateMher -of tke Aadlt Baroaa of !t.-« ' CIrcalatlooa State Library •'^- (FOUiSiM«-. -1 AGES) PRICE THREE CENTS MANCHEStER; CONN., WEDNESDAY,- FEBRUARY 22, 1928. VO L. XUl„ NO. 122. Classified Advertising on Page 12. CATFISH GROWS IN REPORT ON S-4 COAST BEAN PATCH. West Palm Beach, Fla., Feb. 22.— Farmer Jake Gray swears STARTS STORM to this fish story from the Everglades. He was plowing his Bean patch, he says, when he turned OF PROTESTS up a live catfish. If true, there is no telling what might have happened if the fish had remained in the Multi-Millionaire Oil M apaU Congressmen, Admirals and soil and become crossed with a snap Bean. The glades might With H. Mason Day and have reproduced a stew that Treasury Officials Indig­ would Be the envy of the now infamous army “ slumgullion.’ Celebrates The Day William J. Bnms Heat nant Over Results of Conrt’s Verdict on Con­ Alexandria, Va FeB, 22— Liter-<s»Alexandria had a Birthday fete for Naval ProBe. ^Washington which he attended per­ ally buried beneath flags and bunt­ SAVES WOMAN sonally. The 'date, however, was tempt Charges— Day Gets ing, .and inordinately proud of Its FeBruary 11, that Being the date Washington, FeB. 22.— Stormr. or distinction, this plaOT -Jittle .^Afir. upon which he actually was Born, Fonr Months and Noted protest ana indignation gathered FROMSHARKS ginla town led the uhtiq^.
    [Show full text]