A Post-Napster Analysis of the Rapidly Developing File Sharing Technology

Total Page:16

File Type:pdf, Size:1020Kb

A Post-Napster Analysis of the Rapidly Developing File Sharing Technology Vanderbilt Journal of Entertainment & Technology Law Volume 4 Issue 1 Issue 1 - 2002 Article 6 2002 The Peer-to-Peer Revolution: A Post-Napster Analysis of the Rapidly Developing File Sharing Technology Joseph A. Sifferd Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Intellectual Property Law Commons, and the Internet Law Commons Recommended Citation Joseph A. Sifferd, The Peer-to-Peer Revolution: A Post-Napster Analysis of the Rapidly Developing File Sharing Technology, 4 Vanderbilt Journal of Entertainment and Technology Law 92 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol4/iss1/6 This Note is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. A -Music Introduction an Internet chat-room friend, founded Napster, Inc., In its dispute with peer-to-peer file sharing develop- a peer-to-peer file sharing business that enabled its ers such as Napster, the music industry is using the users to trade and share music files for free over the 4 legal system, most notably existing copyright law, to Internet. -_:- maintain its chokehold on music distribution. His- Napster provided its members with free MusicShare tory has shown that the entertainment industry will software,5 allowing them to connect to Napster s serv- oppose any technology that has the potential to upset ers. Once connected, MusicShare scanned the MP3 its monopoly over artists and consumers. Throughout files available on the hard drive of any user connected the development of copyright law in the United States, to the Napster site, adding those file names or song Congress has made an effort to balance legitimate titles (not the actual files themselves) to the directory of technological advances and the rights of individual available songs on Napster s server index. Napster also copyright holders, as required by the Constitution.' allowed its users to play the music they downloaded Likewise, the courts, in interpreting these statutes, and provided a chat room for members to interact.6 have tried to separate justifiable versus unjustifiable MusicShare was an integral part of the protocol for uses of creative works. Napster file-sharing, and its user-friendly simplicity This Note will focus on A&M Records, Inc. v. Napster, was largely responsible for Napster s global popular Inc. 2 and will include an analysis of copyright law ty First, a user sent a particular song request to applicable to the legality of the incipient peer-to- the Napster server. The server then combed the peer file-sharing technology. The first Section will hard drive of other users who were online to locate provide a brief factual his- that selection. If the server tory and introduction to found a match, Napster the Napster legal discussion. E users instantly then linked the searching The second Section of this INTERF 4 Efell in love with computer with the com- Note will include a survey puter holding the file.7 The of relevant copyright doc Napster The number ofNapster users soared to over 20 million file was then downloaded trines, followed by a discus- in just over a year afterNapster's inception and peaked at around directly from the host's sion of the Ninth Circuit's 90 million prior to its shut down on July I, 2001. personal computer ("PC") analysis of these doctrines to the requesting user's as applied to the facts pre PC.8 Once music files were sented in Napster Finally, I will address the future of downloaded, users had the freedom to use the songs the peer-to-peer phenomenon, including a review and as they pleased, which included using other computer -analysis of different types of peer-to-peer networks capabilities unrelated to the Napster software to transfer that are experiencing continued use and development. songs from their hard drive onto compact discs ("CDs"), Some Napster offspring are constructed in a way that a process known as "burning." Napster never actually makes them seemingly immune to copyright liability touched the copyrighted materials. 9 However, it did Thus, using post-Napster copyright law I will address post the names of the songs and users screen names whether the judicial system will be able to control on its indices. online music piracy, or whether Congress will be forced Internet users instantly fell in love with Napster. to address the issue with additional legislation. Ulti- The number of Napster users soared to over 20 mil- mately, the evolution of peer-to-peer networks may lion in just over a year after Napster s inception and spark a congressional response that will reshape copy- peaked at around 90'million prior to its shut down right law to more effectively deal with Internet-related on July 1, 2001.'° Napster operated as-a-non-profit technological advances.3 company receiving $15 million in investment funds from the Silicon Valley venture capitalist firm Hummer Napster" Facts and Procedural History Winbald." Most of the money was used for legal fees In 1999, an eighteen year-old college dropout, Shawn and employee salaries. Napster continued to operate as Fanning, developed an idea that sent the music industry a non-profit company throughout its court battles. into a frenzy That year, Fanning and Sean Parker, The Recordink Industry Association of America JOSEPH A. SIFFERD ("RIAA") and eighteen affiliates of the top five record and provide defenses for alleged infringers. In order labels filed suit against Napster on December 6, 1999 to explore the legalities of peer-to-peer file-sharing in the U.S. District Court for the Northern District of networks, it is important to have a basic understand- California. 2 This initial suit was followed by a flurry of ing of copyright law. This Section thus provides a lawsuits by artists seeking to protect their copyrighted brief explanation of the relevant portions of copyright works, including suits brought by heavy metal rock law. This discussion is also crucial to understanding group Metallica and rapper Dr. Dre.13 Anticipating the Ninth Circuit's analysis, which will be discussed Napster's early demise, users flooded the Internet. At immediately following this Section. I will begin with a one point, the Napster.com web site averaged 945,000 review of the theories relied on by the music industry 4 visitors per day. in bringing its suit: contributory and vicarious liability. Napster hired the law firm Fenwick & West and also The analysis will then turn to an expansive body of law recruited prominent attorney David Boies to handle oral from which Napster marshalled its defenses. These arguments before the district court and Ninth Circuit defenses include: the "fair use" defense under the 1976 Court of Appeals.' 5 On July 12, 2000, plaintiffs moved Copyright Act, the "substantial non-infringing use" 6 jointly for a preliminary injunction against Napster1 doctrine established by the Supreme Court in Sony v. Boies lost his first battle with the RIAA on July 26, Universal, "noncommercial" recording associated with 2000 when U.S. District Judge Marilyn Patel granted the Audio Home Recording Act ("AHRA"), "safe har- the music industry's motion for a preliminary injunc- bors" available under the Digital Millennium Copy- tion that would have forced Napster to shut down its right Act ("DMCA") for immunity to Internet-related services based on findings of contributory and vicari- infringement. Finally, a discussion of the No Electronic ous infringement of plaintiffs' copyrighted works. 7 Theft Act ("NETA"), which creates liability for non- However, on July 27, 2000, Napster filed an emergency commercial infringement on the Internet that might motion to stay the injunction, which was granted otherwise go unpunished, will follow. the following day. 8 After hearing oral arguments on October 2, 2000, the Ninth Circuit remanded the case Contributory and Vicarious Infringement and allowed Napster to continue servicing its users To be held liable for contributory infringement, the pending the outcome of the trial. 9 plaintiff must show that the defendant had actual or In February of 2001, the Ninth Circuit determined constructive knowledge of its users infringing activi- that Napster, as it was currently organized, violated ties, and that defendant substantially participated in existing copyright law, but forced the district court to the infringement by inducing, causing, or materially narrow the scope of its injunction. Napster voluntarily contributing to its occurrence.22 To be vicariously shut down its system on July 1, 2001, just four months liable, the plaintiff must demonstrate that defendant 2 after the Ninth Circuit opinion was released. ' Either actually supervised or exercised control over the direct Napster was unable to meet the Ninth Circuit's restric- infringement and that the defendant had a direct finan- tions, or it made a business judgment to restructure cial interest in the infringing activity.23 No actual its system so as to produce a service that would be knowledge of the infringing activity is required for appealing to the music industry for purposes of creating vicarious liability, and no financial motive is needed an Internet music distribution partnership. The latter to establish contributory liability. reason is more likely, as Napster seems to be making In order to prove either contributory or vicarious progress in settlement negotiations with the various copyright infringement, the music industry must show sectors of the music industry. Even after its file-sharing that Napster users were engaged in direct infringement. service was terminated, Napster continues to be one of Direct infringement simply means that one of the 2 the most visited entertainment websites on the Internet.
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Napster: Winning the Download Race in Europe
    Resolution 3.5 July/Aug 04 25/6/04 12:10 PM Page 50 business Napster: winning the download race in Europe A lot of ones and zeros have passed under the digital bridge on the information highway since November 2002, when this column reviewed fledgling legal music download services. Apple has proved there’s money to be made with iTunes music store, street-legal is no longer a novelty, major labels are no longer in the game ... but the Napster name remains. NIGEL JOPSON N RESOLUTION V1.5 Pressplay, co-owned by UK. There’s an all-you-can-download 7-day trial for Universal and Sony, received top marks for user UK residents who register at the Napster.co.uk site. Iexperience. Subscription service Pressplay launched While Apple has gone with individual song sales, with distribution partnerships from Microsoft’s MSN Roxio has stuck to the subscription model and service, Yahoo and Roxio. Roxio provided the CD skewed pricing accordingly. ‘We do regard burning technology. In November 2002, Roxio acquired subscription as the way forward for online music,’ the name and assets of the famed Napster service (which Leanne Sharman told me, ‘why pay £9.90 for 10 was in Chapter 11 protective bankruptcy) for US$5m songs when the same sum gives you unlimited access and 100,000 warrants in Roxio shares. Two months to over half a million tracks?’ earlier, Napster’s sale to Bertelsmann had been blocked Subscription services have come in for heavy — amid concerns the deal had not been done in good criticism from many informed commentators — mostly faith — this after Thomas Middlehoff had invested a multi-computer and iPod owning techno journalists like reputed US$60m of Bertelsmann’s money in Napster.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • You Searched for Busy Mac Torrents
    1 / 2 You Searched For Busy : Mac Torrents You can use it forever, at no cost. Premium features can be purchased in the app. Also available on the Mac App Store. Requires macOS 10.12 / iOS 11 / iPadOS .... Apr 20, 2021 — If you search for the best torrent websites for Mac check out the ... Going to a cinema is not always possible with the busy life we all have to lead .... May 18, 2018 — BusyContacts is a contact manager for OS X that lets you create, find ... a powerful tool for filtering contacts, creating saved searches, and even .... We've posted a detailed account of our trouble with PayPal, and the EFF's efforts to ... This has not been ideal, especially of late since I've been so very busy with .... Back. undefined. Skip navigation. Search. Search. Search. Sign in ... Fix most file download errors If you .... 4 days ago — If you wish to download this Linux Mint Cinnamon edition right away, visit this torrent link. ... instilled by other operating systems like Windows and Mac. ... The system user has the option of dismissing the update notification when busy. ... Nemo 5.0 additionally lets a system user perform a content search.. Mar 23, 2020 — Excel For Mac Free Download Demonoid is certainly heading ... Going to a film theater is definitely not generally an option with the busy existence we all possess. ... To download torrénts conveniently we suggest best torrent client for ... You can possibly enter the name of your preferred show to search for it .... Jul 14, 2020 — You'll just need the best Mac torrenting client and a reliable Internet connection.
    [Show full text]
  • Financing Music Labels in the Digital Era of Music: Live Concerts and Streaming Platforms
    \\jciprod01\productn\H\HLS\7-1\HLS101.txt unknown Seq: 1 28-MAR-16 12:46 Financing Music Labels in the Digital Era of Music: Live Concerts and Streaming Platforms Loren Shokes* In the age of iPods, YouTube, Spotify, social media, and countless numbers of apps, anyone with a computer or smartphone readily has access to millions of hours of music. Despite the ever-increasing ease of delivering music to consumers, the recording industry has fallen victim to “the disease of free.”1 When digital music was first introduced in the late 1990s, indus- try experts and insiders postulated that it would parallel the introduction and eventual mainstream acceptance of the compact disc (CD). When CDs became publicly available in 1982,2 the music industry experienced an un- precedented boost in sales as consumers, en masse, traded in their vinyl records and cassette tapes for sleek new compact discs.3 However, the intro- duction of MP3 players and digital music files had the opposite effect and the recording industry has struggled to monetize and profit from the digital revolution.4 The birth of the file sharing website Napster5 in 1999 was the start of a sharp downhill turn for record labels and artists.6 Rather than pay * J.D. Candidate, Harvard Law School, Class of 2017. 1 See David Goldman, Music’s Lost Decade: Sales Cut in Half, CNN Money (Feb. 3, 2010), available at http://money.cnn.com/2010/02/02/news/companies/napster_ music_industry/. 2 See The Digital Era, Recording History: The History of Recording Technology, available at http://www.recording-history.org/HTML/musicbiz7.php (last visited July 28, 2015).
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • The Quality of Recorded Music Since Napster: Evidence Based on The
    Digitization and the Music Industry Joel Waldfogel Conference on the Economics of Information and Communication Technologies Paris, October 5-6, 2012 Copyright Protection, Technological Change, and the Quality of New Products: Evidence from Recorded Music since Napster AND And the Bands Played On: Digital Disintermediation and the Quality of New Recorded Music Intro – assuring flow of creative works • Appropriability – may beget creative works – depends on both law and technology • IP rights are monopolies granted to provide incentives for creation – Harms and benefits • Recent technological changes may have altered the balance – First, file sharing makes it harder to appropriate revenue… …and revenue has plunged RIAA Total Value of US Shipments, 1994-2009 16000 14000 12000 10000 total 8000 digital $ millions physical 6000 4000 2000 0 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 Ensuing Research • Mostly a kerfuffle about whether file sharing cannibalizes sales • Oberholzer-Gee and Strumpf (2006),Rob and Waldfogel (2006), Blackburn (2004), Zentner (2006), and more • Most believe that file sharing reduces sales • …and this has led to calls for strengthening IP protection My Epiphany • Revenue reduction, interesting for producers, is not the most interesting question • Instead: will flow of new products continue? • We should worry about both consumers and producers Industry view: the sky is falling • IFPI: “Music is an investment-intensive business… Very few sectors have a comparable proportion of sales
    [Show full text]
  • AT&T MOBILE MUSIC: Take Control of Your Music
    AT&T MOBILE MUSIC: Take Control of Your Music AT&T Mobile Music is the only service that lets you bring subscription music services to your wireless phone, and it offers the largest collection of mobile music content available today from leading music retailers, such as Napster, Yahoo!® Music and eMusic. Designed to deliver “your music, your way,” AT&T Mobile Music puts you in touch with all things music directly from the handset. Available on select handsets, such as the Samsung a717 and a727, AT&T Mobile Music is the ultimate mobile music experience and provides one-click access to a complete suite of music-related content. Music Player Rip music from your CD collection, load it to your phone and select handsets, or play tracks that are accessible from digital music stores. You’ll need a data cable, memory card and stereo headset to fully rock your phone. Shop Music Show your style by downloading ringtones and Answer Tones™. Buy tracks from leading digital music stores, such as Napster, Yahoo! Music and eMusic on select handsets. Streaming Music When you need a change from your music, dozens of commercial-free channels stream the latest tunes in rock, hip-hop, jazz, Latin and other favorites. Add XM Radio or MobiRadio for $8.99 a month. Music Video With an AT&T 3G phone, you can watch your favorite music videos anytime, anywhere. The dancing, the amazing effects, the hot hits — all in the palm of your hand. MusicID “Who sings this?” “What’s this song called?” Know in a flash just by holding up your phone to the music.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • Services for Microsoft Onedrive for Business
    Service Overview SERVICES FOR MICROSOFT ONEDRIVE FOR BUSINESS Simplify where workers go for content sharing and collaboration Business Challenge ESSENTIALS Dynamic teams are constantly collaborating, which means easily Dell Technologies Consulting Services can sharing personal and team documents is a must for todays’ help you gain the most from your OneDrive innovative workers. All too often organizations have multiple content for Business investment with: repositories without a single standard for the entire workforce which • Repeatable, mature methodologies can cause frustration and impact worker productivity. designed for delivery efficiency and Simplifying where your workers go to collaborate and share content quality accelerate content migrations can boost innovation, increase productivity and more importantly • Determining and delivering the optimal worker satisfaction. For organizations who have adopted Office 365, OneDrive client deployment model as OneDrive for Business is the logical choice. But how do you part of your Windows 10 and Office 365 efficiently migrate, retire and consolidate personal and team files ProPlus initiatives from overlapping content repositories to control costs? • Security and management tuning at the It’s easy with Dell Technologies Consulting Services. We are a Gold worker, device and application level Certified Microsoft Partner with experience migrating organizations of all sizes and verticals to Office 365. • Migration and consolidation of content from a wide variety of sources • The right mix of
    [Show full text]
  • FASTTRACK Through FUJITSU-DEV
    FASTTRACK through FUJITSU-DEV Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA FASTTRACK through FUJITSU-DEV FASTTRACK FASTTRACK Name/CLI Keyword fasttrack Full Name FastTrack Description FastTrack is a file sharing client software that is based on peer-to-peer connection. FastTrack is used by multiple file sharing applications such as Kazaa, Grokster, iMesh, and Morpheus. Initialization: Initial the connection with FastTrack server over HTTP. Search: Searching for files in FastTrack server. Download: Download request from FastTracker server. Reference http://developer.berlios.de/projects/gift-fasttrack/ Global ID L7:57 ID 57 Known Mappings UDP Port - TCP Port - IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 2 FASTTRACK through FUJITSU-DEV FASTTRACK-STATIC FASTTRACK-STATIC Name/CLI Keyword fasttrack-static Full Name fasttrack-static Description FastTrack Traffic - KaZaA Morpheus Grokster... Reference - Global ID L7:1322 ID 1322 Known Mappings UDP Port 1214 TCP Port 1214 IP Protocol - IP Version IPv4 Support Yes IPv6 Support Yes Application Group fasttrack-group Category file-sharing Sub Category p2p-networking P2P Technology Yes Encrypted No Tunnel No Underlying Protocols - 3 FASTTRACK through FUJITSU-DEV FATSERV FATSERV Name/CLI Keyword fatserv Full Name Fatmen Server Description Fatmen Server Reference - Global ID L4:305 ID 305 Known
    [Show full text]