- Free Essays, Term Papers & Book Notes

Internet Intelectually Piracy

By:   •  Research Paper  •  1,761 Words  •  January 6, 2010  •  615 Views

Page 1 of 8

Join now to read essay Internet Intelectually Piracy

Intellectual Property Piracy

In today=s society technology has made life easier and almost totally automated. You no longer need to go to a teller in a bank to deposit, withdraw, or even cash a check. You can even program a calculator to solve for the c value in an equation in math class. To even top things off you no longer need to be at home or around a computer to go on to the internet with advancements in cellular phone technology. Unfortunately there are drawbacks to the rapidly growing field of technology and computers. The internet is making more and more music, movies, games, and thousands of other software accessible. Most of it is stolen or APIRATED@, and then put up on the internet for anybody to download and use on their PC (personal computer). Along the lines there are even programs that let you find, download, and use what you want at no charge. To be able to do this hurts or even destroys the inventors very own intellectual property and they have the right to make royalties off of their idea, whether it is music, movies, games, or even business/personal software. The loss of these properties are due to four main factors, networking, encryption, few or no precedents, and a fast growth, in the PC field. All of which have led intellectual property on the bleeding edge of the technology world but has not totally eliminated it from the market. Some companies are improving in those area with better programing and encrypting. Also with the help of the United States government in making laws, standards, and agencies totally focused on this area of technology.

The first issue is networking. Whether its on a local level such as an intranet or LAN (local area network) where only a few computers are networked or connected together and have file sharing access or as a world wide factor as the internet or WAN (wide area network). Networking allows multiple use access the same data at the same time. When there is an intranet it is localized to only a small community such as a business or local school. However they tend to be link or connected to the internet allowing incoming and outgoing traffic through the extranet server. The extranet server gives the LAN access to the outside world but also give the outside world access to them. With hundreds of thousands of computers linked to each other gigabytes (approximately one billion bytes) of gigabytes of data are shared. To access this data you need a program that uses a process called FTP (file transfer protocol) or HTTP (hyper text transfer protocol). Many of these programs are free and come with your PC, such as Microsoft 7 Internet Explorer or Netscape 7 Navigator. With these programs allow anybody that has access to the internet to view and even download anything they want. As another way to receive data is through a direct connection contact via FTP. A very common and popular program to do this is used for music and is even under review by the United States federal court system, Napster 7. Napster 7 allows you to log on to a server and browse or look at what other users have on there computer and download anything at once. As of the thirteenth of November year two thousand there are seven thousand, nine hundred and five gigabytes of data and is comprised of 1,907,942 songs being shared at any user=s request (Napster client v2.0beta 7). Some of those songs might be free to share but that is only at the artist consent, but all other songs and artists lose their right to royalties and lose money. However not all artist are against the idea of sharing this way, they just work around it. Some bands are putting secret songs on there albums and not putting them on the list of songs on the album or making the album an interactive album with the help of SONY=s CD EXTRA. These are just a few ways that artist protecting them selves against the internet. Along with networking problems comes encryption and protecting your digital and intellectual property.

Technology is making it easier to compact, mass multiply, and distribute a product. Also with the total fade out of eight track cassette tape and long play record, music has converted over to CDs (compact disc). CDs are in digital format what are composed strictly zeros and ones. Now that CDRW (compact disc re write) drives have been released anybody can copy any CD they wish. Also along the lines of copying CDs there is software that lets anybody convert CD audio into a low space format mat called MP3 (Mpeg 3 layer), and can use the same program to play the song with out the CD. With this capability you can trade, sell, and even just give away the music with out the artist getting one penny of royalty. Some CD manufactures are encrypting their products to protect their data. Another type of

Continue for 7 more pages »  •  Join now to read essay Internet Intelectually Piracy and other term papers or research documents
Download as (for upgraded members)