2.2 Information Technology and 'Piracy' (Nutshell): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
| Line 2: | Line 2: | ||
{{Body-Left-Nutshell|[[Image:Ipod.jpg|200px]]|With ordinary home computers connected to the Internet, today everybody can easily manipulate, mix and rearrange his own or the data of others and share the creative product with all the world. New distribution mechanisms like peer-to-peer file sharing networks render the record industry with its current business model obsolete. The major record labels therefore react with lawsuits against individuals and use a new technology called DRM to control its customers even more tightly which at the same time prevents others from reusing past culture.}} | {{Body-Left-Nutshell|[[Image:Ipod.jpg|200px]]|With ordinary home computers connected to the Internet, today everybody can easily manipulate, mix and rearrange his own or the data of others and share the creative product with all the world. New distribution mechanisms like peer-to-peer file sharing networks render the record industry with its current business model obsolete. The major record labels therefore react with lawsuits against individuals and use a new technology called DRM to control its customers even more tightly which at the same time prevents others from reusing past culture.}} | ||
[[Category:Intro]] | |||
[[Category:In a Nutshell]] | |||
Latest revision as of 19:12, 1 November 2007
| Navigation - Table of Contents | ||
| ← Previous | 2.2 Information Technology and 'Piracy' (Nutshell) | Next → |
| Read more about this topic | ||