Via YahooNews.com: Five easy steps to plug online music leaks:
"Recent new releases from rock bands Guns N' Roses, Metallica and AC/DC all found their way onto peer-to-peer (P2P) file-sharing networks before they reached the stores, proving that even the most closely guarded projects are vulnerable.
But it's not the end of the world. After angrily beating your head against the wall, there are several measures you can implement to mitigate the damage. Here are five recommendations not intended for artists or managers who deliberately leak their own material."
http://news.yahoo.com/s/nm/20081207/en_nm/us_leaks
Issues and developments related to IP, AI, and OM, examined in the IP and tech ethics graduate courses I teach at the University of Pittsburgh School of Computing and Information. My Bloomsbury book "Ethics, Information, and Technology", coming in Summer 2025, includes major chapters on IP, AI, OM, and other emerging technologies (IoT, drones, robots, autonomous vehicles, VR/AR). Kip Currier, PhD, JD
Showing posts with label mitigating damage. Show all posts
Showing posts with label mitigating damage. Show all posts
Tuesday, December 9, 2008
Subscribe to:
Posts (Atom)