tag:blogger.com,1999:blog-5052457920976107820.post7422353053869429327..comments2023-08-27T05:24:09.436-06:00Comments on Jim's Thoughtspot: IPRM != DRMJim Earleyhttp://www.blogger.com/profile/05803711165788676445noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-5052457920976107820.post-7034683306472769262012-01-22T21:32:33.808-07:002012-01-22T21:32:33.808-07:00Great article Jim.
You maybe interested in a whit...Great article Jim.<br /><br />You maybe interested in a whitepaper we wrote back in the IPR Systems days:<br /><br />http://xml.coverpages.org/IPR-CMDRMWP200304.pdf<br /><br />RenatoRenato Iannellahttp://renato.iannella.itnoreply@blogger.comtag:blogger.com,1999:blog-5052457920976107820.post-41888256749354835052011-11-08T07:44:17.303-07:002011-11-08T07:44:17.303-07:00Thanks for the compliment! Indeed, a key facet to...Thanks for the compliment! Indeed, a key facet to DRM is the underlying enforcement technologies. In fact, there are technologies that can leverage ODRL for that purpose as well (one of its principle use cases). <br /><br />IPRM, and asset management as a whole, is just beginning to come into its own, thanks in part to ODRL and other RELs, but in larger part because the publishing paradigm is undergoing radical change. The industry is being pulled (some might suggest that it's being dragged, kicking and screaming) away from print-centric models, and now must transform themselves as "media companies". This shift means that more emphasis and focus has to be placed on better management of the digital assets they own or purchase rights to.Jim Earleyhttps://www.blogger.com/profile/05803711165788676445noreply@blogger.comtag:blogger.com,1999:blog-5052457920976107820.post-34781832890498324952011-11-07T21:49:46.126-07:002011-11-07T21:49:46.126-07:00Hello,
I genuinely loved this brilliant article. ...Hello,<br /><br />I genuinely loved this brilliant article. It is important to note that digital rights management relies on other technologies to enforce controls. These include encryption and licensing technology that prevents unprotected content from being accessed, and lock protected content to specific licensed machines. hanks for this wonderful post and hoping to post more of this.Secured Document Sharinghttp://www.locklizard.com/secure-document-sharing.htmnoreply@blogger.com