tag:blogger.com,1999:blog-6850103531860448581.post678872670179441628..comments2024-01-31T09:09:55.123-08:00Comments on Lubor On Tech: Securing Content via TetheringLubor Ptacekhttp://www.blogger.com/profile/08543751955416339809noreply@blogger.comBlogger6125tag:blogger.com,1999:blog-6850103531860448581.post-71580919687497042402011-06-01T18:28:32.643-07:002011-06-01T18:28:32.643-07:00Hello,
Yes, indeed - the end user could still tak...Hello,<br /><br />Yes, indeed - the end user could still take a screenshot or even a photograph of the information. The user could also write down notes or simply memorize the data. Nothing is perfect and the human factor is always the weakest link. But every security measure eliminates a part of the problem.<br /><br />Thanks for commenting.<br />--LuborLubor Ptacekhttps://www.blogger.com/profile/08543751955416339809noreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-7414646338868006322011-06-01T16:08:18.880-07:002011-06-01T16:08:18.880-07:00Taking of screen shots are still a problem with th...Taking of screen shots are still a problem with this approach. Wikileaks was content posted in the Internet. So, if one were to take a screenshot of the new Widget while inside their corporate firewall, they could still post that image on the web if they really wanted to...Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-55507928635553324242011-05-31T22:33:52.077-07:002011-05-31T22:33:52.077-07:00The OpenText Widget Services are a nice and - let&...The OpenText Widget Services are a nice and - let's say - cool way to present content to the users.<br /><br />Working with content should be easy and - and that is also important - should make fun. If it is easy and if it makes fun than the users will use the ECM system.<br /><br />Browsing trough content with the Widget Services is fast and intuitive. If I am able to to flip through the content, I will find the right content faster than going through a list and have to open each document. So such a technology brings efficiency and productivity - and it makes working more funny.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-64782126412975747342011-05-31T16:39:51.879-07:002011-05-31T16:39:51.879-07:00Thank you for your comments, Anonymous. I agree th...Thank you for your comments, Anonymous. I agree that YouTube content can be downloaded using 3rd party software. However, that's primarily because YouTube is a consumer company, not particularly worried about the security of their repository. That's a very different story for an enterprise software company. I used the YouTube example to explain the embedding of the widgets, not as an pinnacle of security.Lubor Ptacekhttps://www.blogger.com/profile/08543751955416339809noreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-9483716637981677182011-05-31T15:08:07.527-07:002011-05-31T15:08:07.527-07:00>> With the widget approach, the YouTube con...>> With the widget approach, the YouTube content can be easily used by any application but - and here is the beauty of this technology - the content never leaves the YouTube repository. The widget displays the content straight from the YouTube repository while YouTube retains complete control and security of the content.<br /><br />That's not true. There are many applications that let you download YouTube content to your desktop. I don't see how the "tethering" (I think you mean embedding) approach introduces any extra security.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6850103531860448581.post-21865696673235791102011-05-31T14:40:15.489-07:002011-05-31T14:40:15.489-07:00Unfortunately it is possible to copy YouTube conte...Unfortunately it is possible to copy YouTube content, disgustingly easy actually. <br />The true problem of securing content is that once it's available for human usage (picture, text, sound) it can be copied with something as simple as a camera. This is of course a significant problem for military worldwide.<br />The DRM that most people hear about is intended to ensure someone doesn't get a good enough copy of something that they would otherwise have to purchase. As with most economic forces, once the price is "too high" people find it easier to steal it than buy it.Anonymousnoreply@blogger.com