Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >   Copyright  >  


RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A forensic watermark, also called a digital watermark, is a sequence of characters or code embedded in a digital document, image, video or computer program to uniquely identify its originator and authorized user. Forensic watermarks can be repeated at random locations within the content to make them difficult to detect and remove.The main purpose of forensic watermarking is to protect the interests  … 
Definition continues below.
DRM Multimedia (View All Report Types)
Business Information University: A CIO's Guide to Launching a Big Data Analytics Strategy
sponsored by
VIRTUAL ENVIRONMENT: This classroom addresses the challenges enterprises face as they attempt to centralize the BI strategy and the tools and methodologies that are addressing these challenges.
Posted: 25 Apr 2013 | Premiered: 16 Mar 2013

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009


Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013


Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Sharing Enterprise Content Beyond the Firewall
sponsored by IntraLinks, Inc
WEBCAST: Regardless of industry or business process, nearly everything now involves the sharing of content with external business partners. Access this webinar to learn how to ensure secure inter-enterprise collaboration, explore the security and cost challenges of sharing beyond your firewall, and more.
Posted: 06 Oct 2016 | Premiered: Oct 6, 2016

IntraLinks, Inc

Debunking the Top 5 Misconceptions about Data Protection
sponsored by Lumension
PODCAST: Check out this white paper to learn about the top 5 misconceptions about data protection and how your company can effectively address them to increase the security of its information assets.
Posted: 28 Apr 2008 | Premiered: Apr 28, 2008


Open Flexible Cloud Orchestration
sponsored by Citrix
WEBCAST: This brief webcast takes a look at the flexibility and compatibility offered by platforms based on Apache's OpenStack architecture for designing an open source, customized cloud infrastructure.
Posted: 07 Nov 2013 | Premiered: Sep 19, 2013


Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

DRM DEFINITION (continued): …  of content creators against illegal use and distribution of copyrighted digital works. While forensic watermarks cannot prevent such activity altogether, they can make it easier for copyright holders to detect it and to identify people who engage in it. A forensic watermark can alert honest users when they have received illegitimate documents or programs.The main limitation of forensic watermarking technology is the occasional occurrence of false positives, in which legal copies of a document, image, video or program are tagged as unauthorized. This can happen when a used computer is traded and … 
DRM definition sponsored by, powered by an online computer dictionary
Browse by Report Type:
DRM White Papers | DRM Multimedia | DRM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement