Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >   Copyright  >  

DRM

RSS Feed   
DEFINITION: A forensic watermark, also called a digital watermark, is a sequence of characters or code embedded in a digital document, image, video or computer program to uniquely identify its originator and authorized user. Forensic watermarks can be repeated at random locations within the content to make them difficult to detect and remove.The main purpose of forensic watermarking is to protect the interests  … 

DRM definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
DRM Reports
 
UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

The insider threat – solved with DRM
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Bernt Østergaard look at the challenges faced by organisations when it comes to the insider threat and the protection of sensitive information.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

ComputerWeekly.com

Broadcast Delivery of Multimedia Content to Mobile Users
sponsored by QUALCOMM Incorporated
WHITE PAPER: Discover how a broadcast delivery can help you overcome the issues with the currently used HTTP delivery method. Avoid bottlenecks and improve user-experience, all in a cost-effective manner.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

QUALCOMM Incorporated

Exchange Insider E-Zine: Volume 8
sponsored by Symantec Corporation
EZINE: In this issue of Exchange Insider, we'll cover topics on how to prep for the BlackBerry Enterprise Server for Exchange 2010 SP1, find out if the Exchange 2010 Storage revamp is for the better, and look at the information rights management protection in Exchange 2010.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Symantec Corporation

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 19 Jul 2019 | Published: 23 Jul 2019

ComputerWeekly.com

Beyond Nine to Five
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Ade McCormack offers guidance to enable you to move forward in your career with the minimum of anxiety as digital technology fundamentally changes the nature of work.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

ComputerWeekly.com

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

The gender pay gap
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

ComputerWeekly.com

IT Transformation Consulting Services: Align your technology direction
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.
Posted: 09 Oct 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Solitarie Interglobal: Tracked, Hacked and Attacked
sponsored by IBM.
WHITE PAPER: Access this resource for a deep dive analysis of the business differentiators among x86, UNIX, and System z virtualization technologies to help you determine the right path for your data center.
Posted: 21 May 2013 | Published: 22 May 2012

IBM.
 
Browse by Report Type:
DRM White Papers | DRM Multimedia | DRM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info