You are here
Home › Brandon Dimmel › Microsoft's Annual Conference Raided By Protesters in Hazmat SuitsMicrosoft's Annual Conference Raided By Protesters in Hazmat Suits
On May 23, 2006, Bill Gates was giving his speech on the future of Microsoft, when protesters wearing bright yellow Hazmat suits swarmed the entrance of a convention center. Their message to the software developer was, "your product is defective and hazardous to users." (Source: www.fsf.org)
The surprise protest marked the launch of DefectiveByDesign.org, a direct-action campaign that will target Big Media and corporations that market Digital Rights Management (DRM).
DefectiveByDesign.org is a broad-based, anti-DRM campaign that is targeting Big Media, unhelpful manufacturers, and DRM distributors. It aims to make all manufacturers wary about bringing their DRM-enabled products to market. The campaign aims to identify "defective" products for the consumer. (Source: DefectiveByDesign.org)
What Is DRM?
DRM is the term that refers to technologies used to enforce controlled access to digital data (such as software, music, movies) and hardware. DRM handles the description, layering, analysis, valuation, trading, monitoring and enforcement of usage restrictions that accompany a specific instance of a digital work.
DRM has been most frequently used for movies; it is also being used for other media. For example: Apple's iTunes Store uses various DRM schemes in their audio files to limit the number of devices they may be played upon. Many producers of eBooks are using a similar implementation of DRM to limit how many computers a book may be viewed on, and even how many times it may be viewed. Even television producers are requesting DRM of their shows due to the popularity of the TiVo system. (Source: wikipedia.org)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.