21 January 2014

Music Industry against Google

The IFPI and RIAA, music industry entities, have resumed their attacks on the search giant, accusing Google of breaking its promise to tone down piracy portals in its search rankings. The outfits have both published articles in a coordinated campaign in order to call for Google to adopt a 5-point plan to fight digital piracy.

google-logo-008.jpg

This move is the latest in a fight between the entertainment industry and Google, even though the tech giant is an increasingly strong partner for various music labels and publishers via its YouTube and Google Play services. Nevertheless, the industry remains cross, claiming that their anger is justified, but the outfits don’t suggest any clear plan to resolve the argument.

In the meantime, the tech giant points at its 100 millionth takedown notice received from music copyright owners. The notices have been received within the last 2.5 years, at an accelerating pace: in December 2013 alone, the British music body the BPI sent 5.2 million notices, while the Recording Industry Association of America sent 2.3 million. The copyright owners consider Google the largest piracy discovery website in the world.

In response, Google published a report last September hitting back at the claims that it fails to address piracy and questioning whether the issue is as huge as the music industry claims. The report broke down Google’s activities, including such legitimate services as YouTube and Google Play, as well as Content ID system for helping copyright owners make money from uses of their music on someone’s videos. The company also emphasized its efforts within its advertising business – Google ensured that its adverts weren’t appearing on piracy websites.

Google pointed out that turnaround time on takedown notices was less than 6 hours, and keeps decreasing despite the rocketing volume of requests. Finally, the tech giant reminded that search was never a major driver of traffic to pirate sites. Indeed, all traffic from Yahoo, Bing, and Google combined accounts for only 15% of traffic to BitTorrent trackers.

Besides, Google questioned the methodology music industry used for the rightsholders’ research. The company provided its own statistics showing that people searched for a “song title” 16 times more often than “song title mp3” on Google and found lots of legal links at the top of the results.

US Ban Didn’t Harm Huawei

The Chinese tech giant has made a 40% rise in annual operating profit despite being blacklisted in the United States because of claims of cyber spying. The record growth is attributed to Huawei growing in emerging markets.
huawei-logo-350x350.jpeg

The results of 2013 showed that Huawei had a tough year, as two of the largest markets (the US and Australia) refused to let the company take government contracts. Huawei chose another way and placed its hopes in developing markets and Europe, where it has made headway building 4th-generation mobile networks.

The unlisted company has denied any spying links with the Chinese government and recently reported an unaudited 2013 operating profit of $4.8 billion (increase of 43%). Huawei’s revenue was $39.3 billion (8% increase, despite the goal of 10%). The Chinese giant, which ranks behind Ericsson in telecom gear sales, is expected to release audited financial results for 2013 in the 2nd quarter of 2014. Huawei’s flagship carrier business, which provided almost 3/4 of revenue in 2012, sells equipment to telecom operators.

In addition, smartphone shipments reached 52 million units worldwide in 2013, though the goal was 60 million unit target. The company is recognized as the 3rd-largest smartphone maker globally in the 3rd quarter of 2013, with a 5% market share. But the company is far beyond Samsung and Apple, accounting for 35% and 13% share respectively. Finally, Huawei also has an enterprise segment, which builds and sells communications equipment to businesses and institutions.

Google Acquired Nest Labs for $3.2 Billion

The tech giant is expanding its presence in consumer homes: Google announced its acquisition of Nest Labs, a connected device company producing smart thermostats and smoke detectors. Apparently, the company wants to enter a new market of app-controlled household devices.
google-builds-a-nest-for-future-of-smart-homes.jpg

Nest called the deal momentous but pointed out that they would retain current leadership and brand identity, so not much will change for the company. Industry experts believe that partnering with Google will help Nest realize its vision of the “smart home” faster than if it continued solo, because Google can provide Nest with business resources, global scale, and platform reach.

Mass media named Nest’s smoke alarm as one of the notable technological innovations of last year, as it could distinguish burnt toast from a real domestic threat, speak rather than bleep and switch on its nightlight when detecting people walking underneath in the dark.

Nest products are currently available only in the United States and can be accessed remotely with a smartphone app. The latter can provide you with information on battery power and emergency alerts. The thermostat is able to learn user behavior and find out whether a building is occupied or not through its temperature, humidity, activity and light sensors.

Within the last few years, Nest has created 300 patents for consumer technology and started exploring energy-efficient domestic technologies. Even now, despite the deal with Google, the company is going to allow its customers to continue controlling devices through Apple products.

The acquisition, expected to be completed in the nearest future, demonstrated that Google relies on hardware/software solutions rather than just building OS for other manufacturers to implement.

Apparently, the tech giant will open up the somewhat closed approach that Nest used to date, in order to better integrate with conscious home solutions that emerged in 2013, like SmartThings, AT&T Digital Life, or Revolv.

The acquisition didn’t affect Google’s wallet. A few months ago, the company reported holding almost $57 billion in cash, cash equivalents and marketable securities.

FCC Won’t Protect Net Neutrality

ISPs may be able to offer faster connections to preferred online portals and even block their rivals, as an American appeals court decided that regulators could no longer enforce the so-called “net neutrality”.

verizon-logo.jpg

Recently, the US court of appeals ruled in favor of Verizon. In the case, FCC regulators argued that forcing ISP to provide equal access to worldwide web and bandwidth to all legitimate material is very important for the open Internet and encourages innovation. However, ISPs believe that net neutrality hampers both their ability to strike commercial deals with content providers and ability to provide higher-speed access to premium content – for example, high-definition movies. The broadband providers argue deregulation could spur more growth in emerging markets.

Despite the commercial impact, the court decision drew immediate concern from free speech groups that worry about the consequences of undermining net neutrality all over the world. They claim that the court decision will adversely affect the daily lives of US citizens and change the open nature of the web.

Some claim that court’s ruling grants commercial entities the right to block traffic and give preferential treatment to websites they like, thus steering users to or away from them. The FCC is going to appeal the decision, which may eventually wind up with the US supreme court.

One of the judges pointed out that regardless of the merits of net neutrality, the FCC simply had no legal power to treat ISPs like traditional telephone operators. Of course, Verizon welcomed this court ruling, but insisted that it would extend consumer choice in the future. The company assured that this move won’t affect users’ ability to access and use the Internet, but rather allow Verizon more room for innovation.

However, net neutrality supporters claim that allowing powerful tech giants to strike deals with ISPs to promote their material over others may hamper the growth of social media. They complain that the ability of the web to spread and share ideas is getting better, so individuals and small groups are now able produce resources that used to be the exclusive domain of large entities.

NEVER LOST AGAIN WITH NEW DIGITAL OBJECT (DO) ARCHITECTURE @~?

Robert E Kahn is considered one of the key Internet pioneers. An engineer and computer scientist, who, along with Vint Cerf, invented the Transmission Control Protocol (TCP) and the Internet Protocol (IP), the fundamental communication protocols at the heart of the Internet.
His latest project is the Digital Object (DO) Architecture. A key feature of the DO Architecture is the unique persistent identifier associated with each digital object. Imagine a large document or blog post with a lot of embedded URLs. After a certain amount of time those URLs will most likely become non-operational. If you replace those URLs with unique persistent digital object identifiers then, if properly administered, the links will never be lost – because the identifier is now associated with a digital object rather than a port on a machine. That’s only part of the story though, DO Architecture is exciting technology, it also provides security features that can, for example, better enable transactions and rights management. Libraries and the film industry are among early adopters of this technology.
ITU talked to Robert E Kahn about his work on DO Architecture and his motivation for bringing it to ITU.
With DO Architecture were you trying to address current challenges or facilitate new ways of doing things or both?
In the late 1980s, my colleague Vint Cerf and I perceived the need to move beyond the rather static methods being used to manage information in the Internet. This led to an effort which we called Knowbot programing, or more generally, mobile programing. We wrote a report – The Digital Library Project, Vol. 1:  The World of Knowbots (March 1988) – that describes the basic components of an open architecture for a digital library system and a plan for its development. Certain information management aspects of this effort, in particular the identifier/resolution component, were later developed to become the basis for the Digital Object (DO) Architecture, an overview of which is available here.
ITU-T recently approved a global standard for the discovery of identity information (Recommendation ITU-T X.1255) that was based on CNRI’s contribution.  What is Recommendation ITU-T X.1255 and why it is important?
With the proliferation of information systems in the Internet that has developed across the world, and with the associated creativity and innovation,  a critical question has arisen: “What are the basic building blocks available to the public that will enable interoperability across such heterogeneous systems?”
ITU-T X.1255 was based on CNRI’s DO Architecture and expanded by ITU-T Study Group 17, the ITU-T group leading security and identity management (IdM) standards work  Discussions in SG17 took the starting point of analysis from the notion of “digital object,” or more abstractly, “digital entity,” defined as an “entity” that is represented as, or converted to, a machine-independent data structure (of one or many elements) that can be parsed by different information systems, with each such digital entity having an associated unique persistent identifier.
These concepts are the basis for the deployment of systems of registries to improve the discovery and accessibility of not just identity-related management information, but information in digital form, more generally. The Digital Entity Data Model, and associated Digital Entity Interface Protocol, also described in ITU-T X.1255 are basic information infrastructure elements that should span technology generations and stand the test of time.
What contribution can the implementation of the DO Architecture in fields such as banking, healthcare and transportation, make towards addressing security and privacy?
Security is a fundamental capability of the DO Architecture, which is not the case for other distributed management systems for information in digital form in the Internet.
The basic administration of the identifier/resolution component of the DO Architecture is based on a public key encryption (PKI) regime. The creator of a digital object (or more abstractly, digital entity) has the ability to restrict access to their objects to known users; people or machines known to the system by their respective identifiers.
In practice, this system allows for a direct correlation between the security measures deployed and the degree of privacy achieved. Think of the medical records doctors keep on their patients. If a record is structured as a digital entity, access to this confidential information can be limited to authorized users, based on their identifiers and their ability to respond accurately to a PKI challenge. In some cases, access may mean permission to obtain a digital entity in its entirety. In other cases, access may mean permission to perform specific operations on all or part of the digital entity.
How will Recommendation ITU-T X.1255 enable communications and transactions between “things”?
There is a tendency to view “things” in the Internet as being identified with respect to their physical manifestation, but specific information about things is more important. In the Internet today, an IP address is associated with “things” such as a port on a machine, typically a user’s computer or a network-based server, or more generally, a device such as a smart phone or a digitally enabled light bulb socket or a refrigerator.
Moving away from identifying information about things to identifying the information itself, represented in digital form, makes it possible to associate this information with other types of information. This ability to link related kinds of information in digital form holds great promise for enabling new ways of doing business in the Internet. ITU-T X.1255 describes metadata registries that are interoperable, and may be federated to ensure the long-term discoverability and utility of information structured as digital entities with resolvable persistent identifiers that endure over time.
What next for the DO Architecture?
The basic structure of the DO Architecture is applicable to information management needs of all kinds, but its development over the coming years will likely see the creation of multiple metadata schemas for different domains. We can expect the ability to search DO Registries to benefit from advances in search technology. Keyword search is still a primary technique, but other techniques including image understanding, speech analysis and pattern matching in large data sets will prove very useful.
In 2014, the DO Architecture will reach a significant juncture with a change in the administration of one of its key components, the Global Handle Registry (GHR). CNRI has maintained control over the administration of the GHR since it was first made available in the Internet by CNRI in 1994.
Plans are now well underway to transfer overall administration of the GHR to the DONA Foundation, a non-profit organization to be based in Geneva. The Foundation, once established, will be responsible for determining the set of system administrators, for digitally signing critical system information, and for establishing the overall policies and procedures governing the GHR’s operation. Multiple independent parties, which are authorized and credentialed by the Foundation, will be responsible for the distributed operation of the GHR.
Robert_KahnRobert E. Kahn is Chairman, CEO and President of the Corporation for National Research Initiatives (CNRI), which he founded in 1986 after spending thirteen years at the U.S. Defense Advanced Research Projects Agency (DARPA). Dr. Kahn was responsible for the system design of ARPANET, the first packet-switched network. He is a co-inventor of the TCP/IP protocols and was responsible for originating DARPA’s Internet Program. In his recent work, Dr. Kahn has been developing the concept of the Digital Object Architecture, which provides a framework for interoperability across heterogeneous information systems. After receiving a B.E.E. from the City College of New York in 1960, Dr. Kahn earned M.A. and Ph.D. degrees from Princeton University in 1962 and 1964 respectively. He is a recipient of the 1997 National Medal of Technology, the ACM Turing award, the 2004 Presidential Medal of Freedom, the Japan Prize in 2008 and the Queen Elizabeth Prize for Engineering in 2013.