Pottering about on copyright and Calcutta

I had to read this a second time, just to make sure somebody wasn’t pulling my leg:

The group is accused of erecting a massive structure in the shape of Hogwarts School of Witchcraft and Wizardry for the Hindu festival of the Goddess Durga, which celebrates her killing a demon and the victory of good over evil.

A statue of the 10-armed goddess sitting on a lion, stabbing a demon emerging from a buffalo, dominates the set, and organizers are planning to also include lifesized models of the bespectacled Potter and his companions.

“We had no clue that we had to seek permission from the author,” Santanu Biswas, secretary of FD Block Puja Committee of Salt Lake, the community group which designed and paid for artists to make the tent.

“Our lawyer in Delhi will appear before the court tomorrow to explain our stand.”

[Mr Biswas, there will always be a house for you wherever I live.]

That was yesterday. Today I see that reason has prevailed:

The community group building the model is said to be delighted with the ruling.

The wood and papier mache model, based on Hogwarts School of Witchcraft and Wizardry, can now be used until 26 October when the Hindu festival celebrating the goddess Durga ends.

Whatever next? Descendants of Guy Fawkes claiming their dues on 5th November? Puh-leeze.

Normal service is not resumed

You may have noticed that I’ve been pretty quiet of late. In terms of posts per day, this is the quietest month I’ve had since I started blogging. Now when you consider the fact that I had a major heart attack last December and still managed to blog pretty regularly, the emptiness of June 2007 takes some explaining. So here goes.

As with many things, it started with something apparently unconnected. Reason One was that I moved home. And it took me a while to get everything sorted out in my new home; for the first time in many years, I had a taste of what it felt like to be Without The Net. It felt strange, very strange.

Which brings me to Reason Two. My wife and I had had many discussions over the years, about the way computers could intrude into family life, in fact actually damage family life, if care was not taken. We’d learnt how to deal with television, to deal with time shifted TV, with video games, and even with computers…. or so we thought. Or so I thought, anyway. My wife disagreed with me. And guess what?

I was wrong. As laptops with wireless connections became the norm rather than the exception, and as social networking sites blossomed, our home lives had begun to change, albeit subtly. I realised that my wife had been right all along, we had been risking something precious in our family life, and it was time to take action.

There was a third reason: since my moving home had “enforced” a layoff from being online for all of us at home, for once I had the opportunity to observe what my children did as a result, and to continue learning from them. Seeing what they asked me to do for them online while connected at work; seeing what they went to friends’ houses to do online; seeing what they didn’t care about;  seeing what displacement activities came up, how they spent their time as a result.  If anything, everything I’d observed endorsed the call to action.

So.

The action I’ve taken is to spend less time online, to encourage my family to reduce their time as well, and to do other things together as a result; naturally, this means I will post less often. I hope to make up for the deficiency in quantity by raising the quality of my posts. I haven’t stopped thinking, or reading, or talking to people.

Apologies for the lack of warning; it was one of those things that just happened as I thought about things, something I am wont to do every now and then.

Look what they’ve done to my song, ma

[With thanks to Ms Safka, and to Malcolm for alerting me to this story via his post here.]

[An aside: Would you believe Melanie turned 60 earlier this week? Happy belated birthday.]

In a HotNews post earlier today, Steve Jobs opened up (pun intended) with his views on DRM. Well worth a read. For me, the most telling quote was this:

Why would the big four music companies agree to let Apple and others distribute their music without using DRM systems to protect it? The simplest answer is because DRMs haven’t worked, and may never work, to halt music piracy. Though the big four music companies require that all their music sold online be protected with DRMs, these same music companies continue to sell billions of CDs a year which contain completely unprotected music. That’s right! No DRM system was ever developed for the CD, so all the music distributed on CDs can be easily uploaded to the Internet, then (illegally) downloaded and played on any computer or player.

I am aware that there have been attempts to develop DRM systems for CDs, as discussed here. But they were (thankfully!) catastrophic failures.

This whole DRM thing, when put in the context of what Steve says, now reminds me of something else tangentially Apple-related.
Soon after iPods came out, we had this flurry of activity from some information security professionals saying things like “iPods should be banned from trading floors”. My natural counter at the time was “OK, provided we check every person in and out of the building, look into their briefcases or whatever passed for briefcases, scan and analyse their cellphones and PDAs, and so on.”

I likened it then to being asked to shut the attic window while the front door was not just wide open but barn-sized. I would not ban the iPods unless they “shut the barn door”.

And I guess that’s the way DRM now feels in the context of music. Shutting attic windows while barn doors  flap forlornly open.
Critics of Jobs may argue that CD sales are eroding fast and being replaced by digital downloads, and that stopping the illegal reproduction of digital tracks was therefore imperative. My answer?  No cigar. Not even close.

The damage done by poorly implemented DRM is damage that is being done to all and sundry. Damage that affects everyday people carrying out everyday activities. Damage that affects business and leisure, creativity and pleasure. Damage that extends way beyond music. Legitimate software doesn’t run. Legitimate subscribers can’t get access to digital things they’ve paid for. There are too many examples for me to continue to cite them here.

It’s been no secret that the drive for DRM has come from “content owners”. Even Bill Gates, someone who doesn’t automatically conjure up images of being the Godfather of Open, said so here a couple of months ago.

Take a look at Steve’s penultimate paragraph:

If anything, the technical expertise and overhead required to create, operate and update a DRM system has limited the number of participants selling DRM protected music. If such requirements were removed, the music industry might experience an influx of new companies willing to invest in innovative new stores and players. This can only be seen as a positive by the music companies.

It’s a classic Because Effect situation. We have numerous examples of publishers saying they’ve sold more books once they opened up to Google Search or Amazon Look Inside This Book or similar; numerous examples of musicians and bands being successful selling DRM-free downloads; I could go on but won’t.

The whole concept of an e-book failed, as far as I am concerned, for three reasons:

  • The hardware was too heavy.
  • The process was too unwieldy.
  • Reading a book was no longer a pleasure.

We appear to live in very strange times. Times when people in the hardware, software, media and entertainment industries spend enormous sums of money on making their products and services more “user-friendly”, more user-centred, simpler to use, more convenient. They know all the buzzphrases, so do their consultants. And vast sums get spent.

And then what do they do? They put poorly thought out DRM all over the place. Go figure.

Folks, this is not sustainable. We need new ways of paying for creative value. So go read Terry Fisher, go watch Larry Lessig, go surf Cory Doctorow, go pore over Rishab Aiyer Ghosh, go study the opensource movement. Go write to your local DJ. Go burn a disk.
Go do something.

Because the walls are coming down. They’re coming down.

Four Pillars: The Power of Context

checkershadow illusionHave you ever seen Adelson’s Illusion?

The squares marked A and B are the same shade of grey.

I won’t spoil it for you by giving you the proof here. Instead, why don’t you go visit the original site and see for yourself? There are a number of really worthwhile illusions there. I first saw it maybe ten years ago. Like you, I’ve seen many such illusions in my time, but none of them has had the same impact as this one had. Some of you may not have seen it, so I thought I’d share it with you while musing about context.

I think context is the key differentiator for Web 2.0; whether you look at it from the viewpoint of Four Pillars: Publishing, Search, Fulfilment and Conversation, whether you’re one of those people really into the Semantic Web, whether you’re more of a Mashups person using GPS or other location-sensitive tools, whether you’re into deep dialogues and arguments about microformats or identity… it’s all about context.

Hold that thought for a minute and come for a tangential wander.

In the past, I’ve had my rants about e-mail, about spreadsheets and about presentation tools. Like with most other things, these have good uses and bad uses. For some reason, the bad uses seemed to proliferate. I like working with you so much that I’m going to copy your boss in to this conversation. I like working with you so much that I’m going to copy your boss in to this conversation and not tell you I’m doing it. I like spreadsheets and presentations so much I insist on reading them on my BlackBerry. I trust everyone so much that I’m going to keep online and offline copies of every version of every spreadsheet and presentation I’ve ever come near. I like you so much I’m going to show you a draft of something and then use something completely different at the meeting a day later. Recognise any of these?

Enterprise collaboration tools are by themselves fairly useless unless people actually want to collaborate, unless people want to share, unless people want to work together. E-mail and spreadsheets and presentation tools are by themselves not evil, but can be subverted into bad uses.

For many years I wondered why people did this, why people misused the tools. And I’ve only been able to come up with one logical explanation, one that fits with my belief that people are intrinsically good. You see, many of these tools came out during the 1970s and 1980s; during that time, many of the basic tenets of enterprise employment were being turned upside down; security of tenure went flying through the window; downsizing and rightsizing and wrongsizing were all the vogue; outsourcing and offshoring were being discovered; the war for talent had not yet begun.

Now the primary and secondary sectors had already been through all this, but not the tertiary sector. And within the tertiary sector, the term “knowledge worker” was just beginning to emerge. Maybe, just maybe, it was all a question of timing. Insecure people were learning that knowledge had power, while being presented with tools to protect, fortify, even submerge, that knowledge. Are they to be blamed for using the tools selfishly?

Okay, back to the context argument. Tools like e-mail and spreadsheets and presentations, because they were so individual and stand-alone, could be manipulated. And could be misinterpreted.

They did not come with context.

What we are seeing with Four Pillars tools, with Web 2.0 tools in general, is the very opposite:

  • The way that conversations persist allows context to be captured and shared, whether in IM or wikis or blogs
  • Modern tools for archival and retrieval, via the use of tags and non-hierarchical processes, allows context to be enriched
  • The availability of location specific information, of tags and microformats, of semantic web concepts, all coupled with better identity and authentication and permissioning, allows the enriched context to be made more relevant and timely

Context. Captured and shareable. Enriched and made available. At the right time, in the right place, to the right person.

I wish it were all that simple. Whenever I see the sheer power of the tools today, I also see the stupidities. Stupidities in the context of DRM and IPR and The Series Of Tubes and and and, which have the capacity to kill this goose before any golden eggs are laid.

Tell me what you come here for, boy

Sean’s having trouble finding vendors that try to Keep the Customer Satisfied; in fact he seems to be doing better at finding Deputy Sheriffs, according to his recent post.

Deputy Sheriff said to me
Tell me what you come here for, boy.
You better get your bags and flee.
You’re in trouble boy,
And now you’re heading into more.

Sean’s example of CNBC.com and its archives policy made me wonder about something. Why would anyone do something like that? Why would anyone take something that was already made available for multiple devices and then pay to reduce the market opportunity?

Three possibilities:

  • One, incompetence. They didn’t know they were doing the restricting.
  • Two, greed. They were paid to use a walled garden.
  • Three, line-of-least-resistance. They could not find a way of implementing their DRM without restricting choice further.

Even the optimist in me thinks it is possibility 3. After all, we live in a world where people can come up with rank stupidities such as Region Coding.