Sony Music Entertainment Japan Bows Copy-Protection System

December 2002
Billboard;12/7/2002, Vol. 114 Issue 49, p80
Trade Publication
Reports on the introduction of a copy-protection technology by Sony Music Entertainment Japan on November 20, 2002, that will enable music files to be copied onto personal computer hard drives in a way that the label can control. Features of the technology; Company to handle the logistics and fulfillment for the system.


Related Articles

  • The year in Japan. McClure // Billboard;12/25/99-01/01/2000, Vol. 111/112 Issue 52/1, pYE-34 

    Highlights significant events in the sound recording industry in Japan in the year 1999. Continued contraction of the market during the year; Popularity of rhythm-and-blues-influenced female vocalists; Sony Music Entertainment Japan Inc.'s disclosure of a plan to become the first major label in...

  • I've mistakenly disconnected my drives. Handby, Simon // Computer Shopper;Apr2014, Issue 314, p142 

    The article provides an answer to a question on how to designate the hard disk drive as permanent and stop them appearing in the safely remove hardware list, so real damage can be prevented.

  • DIGITAL DISASTER: A CAUTIONARY TALE. Hoyle, Joe // Journal of the American Dental Association (JADA);Nov2003, Vol. 134 Issue 11, p1452 

    Focuses on the importance of having backup files just in case the computer hard disk fails. Rebuilding of files from paper records.

  • IIPA Calls For Increase In Malaysian Anti-Piracy Action. Patrick, Steve // Billboard;3/9/2002, Vol. 114 Issue 10, p43 

    Reports that, according to an International Intellectual Property Alliance (IIPA) report, the Malaysian music industry is on the brink of collapse. The increase in music piracy in the territory as a result of a lack of sustained enforcement; The commendation of Malaysia's Optical Disc Act which...

  • Privacy in a Very Small Package. Brandt, Andrew // PC World;Feb2003, Vol. 21 Issue 2, p53 

    Focuses on the use of USB drives to enhance computer privacy. Installation of e-mail applications on USB drives; Use of privacy enhancing software installed on USB drives.

  • Lost and Found. Wolfe, Daniel // American Banker;12/22/2006, Vol. 171 Issue 245, p5 

    The article reports on discarded computers resurfacing in Nigeria with their stored data intact. The data recovered from these machines includes financial information that could be used for identity theft. In Nigeria, a used hard drive can cost as much as a new one if it comes loaded with...

  • Hard Drives Tell All. Swartz, Nikki // Information Management Journal;May/Jun2003, Vol. 37 Issue 3, p12 

    Focuses on privacy and identity theft concerns from the sale of used hard drives in the U.S. as of 2003. Concern about the retrievability of files from common operating systems; Results of a study by Massachusetts Institute of Technology graduate students illustrating the problem; Cases...

  • Drivers need patching too. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Apr2007, p21 

    The author explains the importance of hard drive patching. He notes that driver vulnerabilities operate at a low level and network card drivers operate at low level to be able to bypass firewall protection when compromised through a vulnerability, potentially giving the hacker access to the...

  • Cold comfort. Barron, Nick // SC Magazine: For IT Security Professionals (UK Edition);Apr2008, p15 

    The author comments on a study on the use of the technique of cold boot to break into encrypted hard drives. The technique is to force the target machine to cold boot, bypassing the normal secure shutdown processes that unmount the disk and scrub the keys from memory. He believes that to prevent...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics