In This Issue
- Music Big Data Prob
- Clinton’s Cyber Lapse
- Trump’s Disruption
- Report from the CEO
- GSMA EU Comments
- VZ Open Source Net
- Telefonica Data Ctr
- NetApp Acquisition
- Smith to NetApp BoD
- AWS Above the Rest
- Google Wins in Case
- Cybersecurity $400M
- Lawmakers Advice
- “Stop Data Breaches”
- Up Cyber Command
- Level 3 Security Move
- Coming DCIA Events
One of the hopes that digital music brought was for a faster and more accurate way for everyone in the food chain to get paid.
That sounds good on paper, but unfortunately hasn’t quite panned out the way anyone in the industry expected.
While it’s true that it’s easy to count online sales and downloads in the digital realm as well as streams and views, digital accounting lags far behind the expectations of artist, label or publisher alike.
But now, music’s big data problem is beginning to be changed thanks to the efforts of companies like Kobalt Music and DistroKid, a trend that hopefully will be adopted by the rest of the industry at some point.
One of the major problems in the current world of music big data has been that although the streaming services could provide accurate info to labels and publishers, it came in a format that was incompatible with their accounting systems.
That meant that all those reams of data (more than ever, thanks to the services ability to granularly collect everything) was delivered in stacks of hard copy, which then had to be manually input into the label or publisher’s system.
And of course, the problem was that the person doing the inputting was often an intern or a low-on-the-totem pole employee… Read More
Hillary Clinton, like a long and growing list of American leaders in business and government, left important digital data she was ultimately responsible for vulnerable to online attackers.
In that shortcoming, the former Secretary of State joins the heads of dozens of Fortune 500 companies — ranging from retailing giant Target to Sony Pictures — and the government’s own Office of Personnel Management, which stores classified data on federal workers with security clearances.
A report released last week from the State Department’s Office of Inspector General on the Clinton emails said in one instance, the presidential candidate’s aides were so over-matched by their cybersecurity challenge that they literally pulled the plug on her Internet server to protect its data, after they realized it was being probed.
So far there’s no proof that anything of national import was stolen.
Still, if this were a political column, one could argue that the report findings represent a large blemish on the resume of the former senator from New York who now wants the job of chief executive of the federal government.
Indeed, Clinton continued to use her private email account for occasional official business — and some of her aides used theirs… Read More
Donald J. Trump would not be Silicon Valley’s first choice as president. Or its second. Or maybe even its third.
The presumptive Republican presidential nominee wants to restrict immigration while bringing back manufacturing.
He compulsively uses tech products like Twitter but is not in awe of the people who built them.
He made his fortune the old-fashioned way, by going into the family business, in the old-fashioned industry of real estate.
He’s not the valley’s kind of entrepreneur.
Worst of all, Mr. Trump is revealing Silicon Valley’s vulnerability.
In recent years, technology companies have extended their enormous reach while becoming ever wealthier and more powerful.
Music rights holders have had difficulties keeping their business models in sync with both technological capabilities and consumer behavior ever since digital copying of music tracks and distributed computing supplanted analog vinyl album sales.
Once it became possible to make perfect digital replicas of songs – by burning CDs, for example – and simply click to distribute them without degradation – to millions of listeners for instant streaming or easy downloading – methods for monetizing music had to change.
Such costs as manufacturing physical albums, transporting copies and point-of-sale materials, and paying shelf-stocking fees to retailers, were eliminated, with fans themselves incurring the costs of replication, distribution, and, to some extent, even marketing.
But frankly, it has been challenging to innovate business models to keep-up with the pace of change in delivery and consumption of music.
Harnessing new technologies, so that creators and rights holders continue to get paid for their intellectual property, has eluded record labels, whose first response, predictably, has been to turn to the courts to protect their existing economics by enforcing copyright laws.
The second response has been to turn to lawmakers – to change laws – when enforcement activities have seemed insufficient.
And indeed, technology pioneers in the areas of file-sharing, streaming, and social media, have all been the targets of legislative as well as judicial system assaults by music interests.
Now YouTube is being targeted, which has in recent years taken the place that the original MTV held as an effective way to promote music videos and market new artists.
YouTube has directly contributed three billion dollars to the music industry in its first decade, and its proprietary Content ID system is highly effective, handling more than ninety-nine percent of music claims automatically and, to date, already contributing half of YouTube’s music royalties through user-generated content (UGC).
The DCIA believes YouTube is on a path to provide not only an extremely innovative but also an enormous music income generator, leveraging the dual revenue streams of subscription fees and advertising payments.
We urge restraint by lawmakers in responding to big music’s lobbying for changes to the Digital Millennium Copyright Act (DMCA), which would likely have unintended consequences affecting many other types of media and content distribution systems.
It should also be noted by lawmakers and industry observers that this year YouTube is engaged in a renegotiation of its licensing arrangements with the major labels. Share wisely, and take care.
The rapid evolution in mobile broadband and broadcast services requires Europe to keep all options open for how the UHF spectrum band will be used, in particular in the sub-700MHz band.
Mobile data usage continues to grow dramatically as more people consume increasing amounts of content on mobile devices.
However, Europe has fallen behind other developed regions in fast mobile connectivity, putting the future of mobile, as well as the wider economy, at risk.
The timely and coordinated release of the 700MHz band is critical for the development of mobile communications in Europe.
We applaud the positive developments in countries such as France and Germany that have already licensed the 700MHz frequencies well ahead of the 2020 deadline suggested by the proposal.
The GSMA encourages the co-legislators to adopt similar forward-looking approaches as it is essential that Member States have flexibility to move sooner to respond to the sustained growth in mobile data traffic.
To prevent frequency overlap with non-Union countries delaying implementation it is crucial for the proposal to maintain dates… Read More
Verizon has moved a major portion of its managed services network to open source infrastructure, demonstrating the viability of so-called white box open source networking for enterprises as well as service providers like Verizon.
That’s according to Verizon’s Director of Network Infrastructure Planning, Chris Emmons.
The rise of white box networking has been much discussed for the last five years, using software-defined networking (SDN), as an important shift in networking architecture threatening the dominant position and high profit margins of established networking vendors led by Cisco Systems.
That big shift has been slow to arrive, but Verizon’s deployment could indicate the shift is underway.
According to Emmons, the Verizon deployment shows a disaggregated white box architecture is viable, and delivers significant benefits.
Benefits he cited include simpler operational management of the network, greater scalability, an avoidance of bandwidth bottlenecks—and more choices of vendors.
SDN is an approach to computer networking that allows network administrators to manage network services… Read More
Telefonica Chile has launched operations at a new Tier III data center in Chile, its third in the country from which the company plans to offer co-location, hosting, IaaS and managed services.
The facility, located 40 km outside capital Santiago, will form part of Telefonica’s network of 83 data centers worldwide and will be of strategic importance in Latin America.
The building, measuring 5,000 square meters, has 1,000 square meters of space for housing client equipment and for offering Telefonica cloud services.
That space can be expanded to 3,000 square meters and multiply its energy capacity threefold.
The data center is Tier III-certified, includes security measures based on telemetry and can withstand earthquakes measuring 9 on the Richter scale.
According to Telefonica, the data center is the first in Chile to offer local Open Cloud solutions.
These 100% cloud solutions are based on OpenStack, which is a free and open-source software platform for cloud computing… Read More
Watch out for consolidation in the storage industry, SolidFire‘s Mark Conley warns.
The director of channel sales said lukewarm increases in IT expenditures and a more difficult fundraising climate may encourage smaller companies to consider M&A.
His own company recently was bought by the systems manufacturer NetApp.
The acquisition closed in February.
Conley said the deal will have a major impact on the storage industry.
Channel Partners: Can you talk about the impact the acquisition by NetApp has had on SolidFire?
Mark Conley: It has been really great. We have difficulty — like any small startup company — having the amount of legitimacy that we believe we should have and the amount of attention we want to get.
Having the NetApp name behind us gives us instant credibility, gives us instant access to a lot of accounts that wouldn’t even talk to us before… Read More
Smith’s appointment brings the number of NetApp board members to ten, nine of whom are independent.
“Steve’s 25 years of broad experience and work as an active CEO will add a valuable perspective to our board of directors,” said George Kurian, Chief Executive Officer at NetApp.
“He has a wealth of deep technology expertise and understanding of how IT environments are evolving.”
“We look forward to benefiting from his insight.”
“Steve is both a veteran and a visionary and will further strengthen our board’s breadth of talent and background,” said NetApp Chairman of the Board Mike Nevens.
“We are excited to bring him on to our board.”
“I am honored to join the board of a company so passionate about customer success,” said Smith.
“I look forward to working together with the NetApp board and management team to continue to deliver their compelling vision… Read More
According to Time Magazine, Netflix users consume more than a third of all Internet download traffic during peak hours. Amazon, on the other hand, now offers four times as many movies as Netflix.
In the area of streaming video services, Amazon and Netflix are clearly direct competitors.
Keep that in mind for this next fact: Netflix has spent the last seven years moving onto (not away from) Amazon’s Web Services.
Netflix has been migrating as much of its on-premises operations as it can to AWS, even though Amazon is a direct competitor to Netflix’ primary income source.
Netflix, as far back as 2006, knew Amazon was offering a competing video streaming service, and still undertook the migration to AWS… Read More
Oracle contended that Google used copyrighted material in 11,000 of its 13 million lines of software code in Android, its mobile phone operating system.
Oracle asked for $9 billion from Google. Google said it made fair use of that code and owed nothing.
The victory for Google cheered other software developers, who operate much the way Google did when it comes to so-called open-source software.
Unlike traditional software created by corporations and tightly held, open-source products are released, often with some restrictions, for anyone to use and modify.
The cybersecurity industry could see a boost in venture capital, thanks to new threats the Internet of Things (IoT) provide to smart homes, autonomous cars, and future factories.
Investment in cybersecurity rose by 78 percent in 2015 to $228 million and Lux Research expects it to reach $400 million this year, in part because of the rapid adoption of IoT devices.
“Connected consumer and business products have begun flooding the market, but security has been an afterthought.”
“The world now has to figure out how to secure the multitude of things that have recently become connected,” said Lux Research Vice President, Mark Bunger.
Security for IoT systems is critical, especially in situations where an entire grid of devices could be turned offline. Security services are cropping up all across the globe to tackle the issues raised from IoT and a growing reliance on computers handling product management and logistics.
Most of the startups want to create a horizontal platform, capable of securing multiple IoT devices within a network.
Behavioral analysis and IoT authentication are also high up there on the list of priorities for the security startups mentioned… Read More
Here’s a shocker: Congress is really bad at cybersecurity.
The political capital is constantly facing network attacks and hacks from outside hackers and nation states — and that’s before the CIA wages its own wave of targeting intelligence committee members.
Most lawmakers have never heard of PGP or even SSL, let alone used it (and most lawmakers still don’t).
For some, it’s an endemic problem that bleeds into the political world — which might explain why some of its cybersecurity legislation is so ill-conceived and badly thought-out.
The proposed bill would put every American at risk of being spied on by foreign nations, hackers, or even the next US President.
It’s no wonder a bipartisan duo of computer science majors turned politicos got tired of it.
House lawmakers Ted Lieu (D-CA,) and Will Hurd (R-TX) penned an email to their colleagues Monday warning them of some of the biggest dangers and threats to their information and operational security, amid a recent spate of cyber-attacks… Read More
In the latest chapter of the long-running policy dispute between retailers and the financial industry over who is responsible for improving consumer data security, an array of financial groups has launched a new campaign to pressure Congress to pass legislation requiring more protections from merchants.
The financial industry is getting frustrated by the slow progress on a key piece of data-security legislation sitting in Congress.
So to play up the impact of the measure, financial groups are amplifying a new call to action.
The “Stop the Data Breaches” campaign aims to draw attention to the costs associated with merchant data breaches and make the case that legislative action is needed.
It’s backed by seven trade groups: the American Bankers Association (ABA), the Consumer Bankers Association (CBA), the Credit Union National Association (CUNA), the Independent Community Bankers of America (ICBA), the Financial Services Roundtable, the National Association of Federal Credit Unions (NAFCU), and The Clearing House.
The groups support the Data Security Act, versions of which (HR 2205 and S 961) are up for a vote in the House and Senate… Read More
A bipartisan group of Senators wants to bring the Senate version of a national defense bill in line with its House counterpart on a change in authority for the US military’s cyber-unit.
An amendment to the National Defense Authorization Act (NDAA) would direct the president to elevate US Cyber Command to a standalone warfighting entity, pulling it out from under the authority of Strategic Command.
The House version of the legislation, passed 277-147 last week, already includes a similar provision.
The move appears to have widespread support from lawmakers, as well as Adm. Michael Rogers, the unit’s head. He said last month that elevating the unit to a full combatant command would make it more nimble and “generate better mission outcomes.”
But the White House opposes a statutory requirement that the unit be elevated.
The administration, which is threatening a veto on the House version of the bill, argues that the secretary of Defense and chairman of the Joint Chiefs of Staff “should retain the flexibility to recommend to the President changes to the unified command plan that they believe would most effectively organize the military to address an ever-evolving threat environment… Read More
Level 3 Communications is adding a new wrinkle to security services, introducing a new cloud-based service developed on next-generation firewall technology that has been built into its global network to replace on-premises security infrastructure.
The Enterprise Security Gateway service is delivered from 40 Level 3 points of presence globally, can protect data on any device and is available to subscribers of any carrier.
The new service moves the security perimeter from the enterprise itself to the Level 3 network: One of its key goals is to address the rising costs of security for enterprises, which currently spend up to 60% of their IT dollars on that one function, says Chris Richter, Senior Vice President of Global Security Services for Level 3 Communications.
It covers a range of security issues including anti-malware with sandboxing, data loss protection, application awareness and enforcement and next-generation firewall.
“This new service is very powerful in ability to stop, block and detect attacks,” he commented.
“We have the horsepower, the network reach, the global reach, so we thought, ‘Why not roll out gateways… Read More
DataCloud Europe 2016 — June 8th-9th in Monte Carlo, Monaco. The 2016 conference will focus on cloud computing advances and changes in data management, with a stellar line-up of speakers including global infrastructure leaders and subject matter experts.
Cloud and DevOps World Forum 2016 — June 21st-22nd in London, England. Now in its eighth year, C&DWF is firmly established as the leading content-led exhibition for the European Cloud and DevOps community and the premiere meeting place for CIOs.
2016 Creative Storage Conference — June 23rd in Culver City, CA. The tenth annual CS will bring together digital storage providers, equipment manufacturers, software distributors, and professional media and entertainment end-users to explore the conference theme “The Art of Storage.”
Security of Things World — June 27th-28th in Berlin, Germany. Topics include securing cyber physical systems for IoT, expanding IT security with intelligence-led ops, business continuity management considerations, data privacy in an interconnected world, and security strategies.
Mobile World Congress Shanghai — June 29th – July 1st in Shanghai, China. MWC Shanghai is a very unique gathering that brings together industry participants ranging from C-Level mobile executives to end-user consumers passionate about mobile.
Industry of Things World Europe — September 19th-20th in Berlin, Germany. IoT business models, new IoT markets and strategies, product lifecycle management, next generation data handling and value assessment, IoT organizational impacts, and IoT security issues.
Government Video Expo — December 6th-8th in Washington, DC. GVE is the East Coast’s largest technology event for broadcast and video professionals, featuring a full exhibit floor, numerous training options, free seminars, keynotes, panel discussions, networking opportunities, and more.