How to Choose the Best DRM Software For Your Mobile Application
|
|
- Rosalind McCarthy
- 3 years ago
- Views:
Transcription
1 Maximizing the Value of Your DRM Software: A DRM Selection Guide
2 Table of contents Introduction... 3 Defining your needs... 4 Business considerations... 4 Technical considerations... 4 Examining your options... 5 Requirements analysis... 5 Studio approval... 6 App store approval... 6 Support for multiple business models... 6 License management persistent backup... 7 Customization and application integration... 7 Complete streaming and playback support... 7 Up-to-date support for Microsoft PlayReady Compliance and Robustness Rules... 8 Android and ios device compatibility support... 8 Hardware acceleration... 8 Multi-screen streaming capabilities... 9 Implementation and delivery support... 9 Advanced security and anti-hacking capabilities... 9 Trusted Execution Environment (TEE) support Forensic watermarking support Features checklist Critical strategic questions to ask about vendors Pricing and cost of ownership considerations Conclusion
3 Introduction When you are planning to deploy a premium content offering that includes the delivery of studio and high-value content to mobile and stationary PCs, set-top-boxes, gaming platforms and media extenders, it becomes necessary to secure the files to prevent theft and enforce content licensing requirements and business models. This requires a Digital Rights Management (DRM) solution that meets the established content security requirements while supporting the broadest possible access to the media content from the widest number of devices. Choosing a video security solution encompassing stream protection and DRM capabilities can be a difficult maze for many organizations to navigate. A transition away from proprietary technologies, such as Adobe Flash Player, has created a landscape of options. To be able to provide consistent, secure, and high-quality content to an ever-increasing number of device types and still be open and flexible enough to accommodate changing consumer preferences are significant challenges in overthe-top (OTT) video delivery. Finding the right DRM solution to meet your needs is key to a fast launch and hassle-free deployment of a highly scalable media offering with low-support requirements. The perfect software solution for your organization should fit your business model, get you to market quickly, save you hundreds of man-hours and thousands of dollars, and make all of your customers happy. These factors are critical to the success of your project, but it also has to come in under budget too, right? Finding the right DRM software can definitely be a daunting task and there are many points to consider: it needs to meet both your business and technical requirements and address a wide variety of challenges in a constantly changing environment. Even if you do manage to find the right software, there are still plenty of pitfalls you will need to avoid. Implementation may take longer than expected. Costs may be higher than anticipated. Consumers may be unhappy with the usability of the solution. In many cases, companies simply settle for the easiest choice because it comes standard with a DRM license or content management platform without doing the necessary research to find the best solution and then pay the price for their bad decision. The purpose of this DRM software selection guide is to help you define the path that will lead to the right software and a successful implementation. If you are currently searching for a DRM solution, the next 15 minutes of reading will save you weeks of work, prepare you to choose the right solution, and ensure you get the maximum value from the DRM software you purchase. Many OTT mobile video application projects can be large, complicated and expensive, which makes choosing the right DRM software an imperative for deployment success. This guide provides an overview of DRM concepts and technology as well as expert advice on choosing DRM software that 3
4 meet your organization s security and business requirements. For discussion purposes, we will consider a mobile video application to be any application that can be downloaded and played on a device ranging from a mobile phone or tablet to smart TV or a set-top-box. This paper will walk you through the key steps to buying DRM software. This guide and the associated checklists include product selection, implementation, service, and business requirements all of which will impact the benefits you receive and the total cost of ownership (TCO) of your DRM solution and ultimately your application. Defining your needs Business considerations When implementing a DRM solution for your mobile application, you need to consider its ability to support your business model and its flexibility to change as necessary. Key questions to ask include: Does it support the delivery of content anytime, anywhere to any device? Will it work across a range of content providers, OEMs, service and network providers to deliver the features and functionality for a variety of premium entertainment scenarios? Does it support flexible business models and enable a range of user scenarios including subscription services, advertising, rentals and single purchases? Will your application meet distributor requirements and quickly pass submission requirements for app stores such as Apple itunes and Google Play? Will the DRM meet the security requirements set by content owners? Will the protection be approved for both offline download and play as well as streaming content? Will it be global-ready with subtitles, closed captions and multi-audio features? Technical considerations There are numerous technical considerations based on the diverse number and type of devices and the number of operating system versions. For example, consider backward compatibility and support for the increasing number of Apple ios and Android operating systems. Will it provide optimum security to protect against jail-breaking and rooting of devices? Will it support multi-screen viewing schemes such as Airplay and Miracast? 4
5 Will it support emerging protection platforms such as Trusted Execution Environment (TEE) deployments? Will it support a variety of media players and content delivery mechanisms? Can it handle the large variety of streaming formats and codecs? And most notably, does it have guaranteed compliance with Microsoft PlayReady Compliance and Robustness Rules? And last but not least, how difficult will it be to integrate? Examining your options There are two principal options to consider which ultimately affect the level of effort, required resources, robustness, user experience and time-to-market of your video application: Your first option is to use a light, minimalist Software Development Kit (SDK) with no (or a basic) media player included, no security features and no media format awareness. The benefit of this option is that it is completely customizable. However, at the same time, this approach requires expertise in video technology and security to properly implement DRM, adding to the time and effort of application development. Your second option is to use a rich SDK including a full-featured media player with full media format awareness, complete security measures, robustness and compliance, plus extra features such as offline playback, multiple subtitles, output protection, etc. For most application developers, this is the preferred approach since it requires less expertise in security integration and generally meets compliance requirements while significantly reducing the level of effort and the time-to-market. In this quickly changing environment, the best approach is to choose a DRM that supports industry standards to avoid getting locked into a single proprietary approach which could add to your costs down the road and limit your flexibility to deliver the optimum consumer experience. The rich SDK approach generally meets the needs of most organizations and, given its broader applicability and ease of use, is the recommended approach. This paper will provide the essential must-haves and considerations for purchasing a rich SDK option. Requirements analysis A video application needs to satisfy numerous requirements to support a scalable media service. It needs to be approved by content owners, network operators, and app store owners. It also has to deliver a seamless high-quality experience to the consumer end-user across a number of different devices and platforms. The following is a list of critical business and technical requirements that should be considered for any client application. 5
6 Studio approval A good measure of the quality of the solution is whether the major Hollywood film and TV studios have approved it. At their core, DRM technologies help video publishers secure their content by providing control over functions such as payment terms, approved devices, and copy and sharing permissions. This provides safeguards against unauthorized use, piracy and other terms of use violations, allowing publishers to reinforce their business models and distribution agreements. In general, application developers should be seeking a studio-approved form of DRM, providing a high level of video security for online delivery. To obtain this approval, video assets are individually encrypted and packaged with unique individual encryption keys at the origination point to provide proper security. Any solution without studio approvals and recommendations should be eliminated from consideration. App store approval Most video applications are downloaded via app stores such as Google Play and Apples itunes App Store. These app store providers are exerting more control over the applications they make available to protect consumers against rogue and malicious applications. Apples App Store is among the most stringent and maintains rigid requirements to approve an application for distribution. An application could be rejected for a variety of reasons. To ensure that the application does not get rejected, you should make sure that there are no components of the SDK or client application that violate these policies. Some DRM applications have not been designed with this need in mind and do not properly implement control over personal and device information. Some typical problems include making use of a Unique Device Identifier (UDID) and other personally identifiable information, which violates store policies. To avoid these issues and potential costly delays you should look for a vendor who is approved and recommended by app store owners and has a number of applications using their DRM in these stores. Support for multiple business models There are a variety of different business and revenue models that are being used to accommodate consumer preferences for viewing and paying for content. Consumption models range from in-home to on-the-go, switching viewing from large screen to small screen, which can encompass both offline and online experience, and a variety of services like OTT, Video-on-Demand (VoD), and Live TV with Catch-Up. These could be offered with multiple payments and monetization options including subscription services, advertising-supported viewing, rentals and pay-per-view fees for single purchases. Being able to deliver any or all of these options is vital to the success of any content delivery service. Consequently, DRM software must support all these options and provide features such as license pre-delivery and silent license delivery for subscription services. 6
7 License management persistent backup Device transferability and backup are important to consumers. A consumer-friendly application must be able to properly access and retrieve license keys to deliver a seamless end-user experience. If consumers need to wait to download and install license keys they will be frustrated and possibly lose access to previously purchased content. For Apple ios devices, backup and restore of licenses and keys should be included in the ios backup and restore process. This means that restoration of a backup to a clean device will include any previously downloaded licenses. Otherwise, all required licenses must be downloaded again. Your application (and DRM software) must take this into account in case stored licenses are lost or need to be transferred to a new device. Customization and application integration You want your application to have your own look, feel and branding but that does not mean you need to write custom code for the whole application. A complete DRM software application should allow you to extend your brand with a minimal amount of effort: It should be able to seamlessly integrate with existing applications and Graphical User Interfaces (GUIs) to deliver branded services to all types of connected mobile devices with a very short time-to-market. It needs to provide easy-to-use and well documented functions allowing quick integration with your application, ensuring unified branding and user experience across platforms. It also needs to support enhanced offerings with specific content such as subtitles, multichannel audio or closed captioning. The DRM application should provide an easy-to-use software library for application integration, and the functions need to cover all the different DRM technologies supported. A key feature to expect is the ability to design functionality prior to executable code generation. This feature will save time on integration as it is done only once and the actual deployed DRM schemes can be chosen at code generation. Complete streaming and playback support Consumers expect to be able to view their content online or offline with the highest quality, regardless of screen size, or streaming method. DRM software must not degrade the viewing experience and must be robust enough to support a number of viewing conditions. Consequently, the DRM software must support various adaptive streaming protocols for both live and VoD: Apple HTTP Live Streaming (HLS), Microsoft Smooth Streaming, and MPEG-DASH. It must also support progressive downloads and local playback with Common File Format (CFF - UltraViolet) and Protected Interoperable File Format (PIFF). It must also support closed captions and subtitles, and have audio capabilities for multiple tracks or languages. 7
8 Up-to-date support for Microsoft PlayReady Compliance and Robustness Rules Microsoft PlayReady is one of the most widely used DRM schemes and any client-side DRM application needs to meet the latest Compliance and Robustness Rules. These rules specify the required behaviors of the Microsoft PlayReady implementations and of the software accessing these implementations. Compliance Rules describe how content may be accessed and passed using specific policy rules, and cover the allowable external outputs for Audio-Video contents. For example: what is allowable for uncompressed digital video (e.g., HDMI/HDCP), what is allowable for analog outputs such as CGMS/A, configuration of wireless outputs such as AirPlay and Miracast and many other configurations. Robustness Rules specify different Microsoft PlayReady assets and the levels of robustness required to protect each asset type. Maintaining adherence to these rules is a massive undertaking, especially given the enormous fragmentation of Android devices. Vendors are forced to extend a lot of effort to ensure Compliance Rules adherence on a wide variety of devices on the market. Failure to comply with these rules can result in costly delays to any service using the Microsoft PlayReady DRM scheme. Android and ios device compatibility support Ensuring a consistent user experience with proper content protection is extremely challenging across both Android and ios devices. There are over 18,000 different Android device models on the market running different versions and implementations of the Android OS. Furthermore, both Google and Apple release new OS versions multiple times a year. As a result, it is imperative that the DRM software is backward compatible and that the DRM software has been tested on the wide variety of OS versions and devices. It is important to ensure that a vendor has a strong track record of platform experience, has done extensive testing on devices, and is capable of providing swift and guaranteed support for frequent new OS versions as they are released. Hardware acceleration A DRM scheme involves the use of cryptography, which is resource intensive, and can affect the user experience if not properly managed. To provide a high quality of service and a premium user experience, DRM software should not contribute to degradation of the service due to the execution of security functions and, in fact, should incorporate hardware acceleration into its design to improve performance. DRM software should also integrate with video players on platforms with their own hardware acceleration, and then leverage it for optimum media playback. As an alternative, it should be possible to deploy the DRM software application with a third-party media player (for example, in cases where the native player does not have codec support) without performance consequences. This option excludes the hardware acceleration for media playback and relies on hardware acceleration capabilities for the DRM software. 8
9 Multi-screen streaming capabilities To accommodate the growing trend of anytime-anywhere intermittent viewing that can transition from mobile small screen to large screen displays, DRM content protection must support technologies such as AirPlay and Miracast wherever they are deployed. With many consumers receiving content on mobile devices, the ability to project to large screens has become expected. Miracast is a peer-to-peer wireless screencasting standard formed via Wi-Fi Direct connections in a manner similar to Bluetooth. It enables wireless delivery of audio and video to or from desktops, tablets, mobile phones, and other devices. It allows users to, for example, echo display from a phone or tablet onto a TV, or watch live programs from a home cable box on a tablet. To take advantage of these technologies requires that DRM be properly implemented to support it. Both the sending and receiving devices must support Miracast for the technology to work. Airplay works in a similar manner on Apple devices and carries the same expectations. With consumer expectations for multi-screen viewing at an all-time high, Airplay and Miracast support should be included in any selection criteria for DRM software. Implementation and delivery support Providing the software is not where the DRM vendor s responsibilities stop. To ensure rapid implementation the software vendor should provide detailed documentation including release notes, integration guides, building instructions and software library help files. Proper implementation will also require access to extended test suites containing a full range of protected content and licenses. You should look to ensure that the test suite is available to customers and related third-party vendors throughout the implementation. Advanced security and anti-hacking capabilities Protection from professional pirates looking to profit from illegal sale of content, and from highly skilled amateurs looking to gain illegal access for personal use and distribution, requires an understanding of a variety of threats and of vulnerabilities on both the software and hardware. It also requires a deep security expertise to build in protections that are not often found in standard DRM software. To achieve the necessary level of protection, all components of the DRM software client need to be protected with security components such as secure storage, encryption functions, sensitive code and data 9
10 obfuscation, and code integrity checks. These technologies allow the service provider to disable the application and revoke all content licenses in case of abuse or hacking. Critical security features must include: anti-hacking, a security and robustness shield, device rooting and jailbreaking detection as well as output protection level control. Further hardware security features of the platform, such as the Trusted Execution Environment (TEE), the Secure Content Path (SCP) and Side-Channel-Attack-resistant cryptography blocks will be used and properly managed to enhance the protection and match the latest studios security requirements for premium content distribution. Trusted Execution Environment (TEE) support Future proofing your application is highly recommended and will save you time and expenses as the market moves forward. The emergence of TEE is a main component of this approach. A TEE is an isolated, secured Operating System (OS) that can be programmed into hardware and is partitioned from the main OS (aka Rich OS), for example Android. Security can be maintained as an inherent feature of the device, without degrading system performance, thus enabling applications, such as DRM or mobile payment, to run as protected applications. The TEE only runs approved applications and is not vulnerable to threats such as malware and viruses that could affect the Rich OS. Mobile video applications are one of the major use cases TEE was designed for. They can be delivered as downloadable applications that are restricted to run in the TEE, providing even greater protection of the content and licensing. To take full advantage of TEE security, DRM software must be designed specifically to support a TEE. Moreover, in order to offer the right protection level requested by studios for Ultra HD/4K content (MovieLabs Specification for Enhanced Content Protection V1.1), this TEE should be complemented by a Secure Content Path (SCP), a secure Root-Of-Trust, and should guarantee a full resistance to complex hardware attacks. The SCP is the secure means to protect the content during all the processes happening after its decryption and until its display on a screen. The secure Root-Of-Trust guarantees that the application cannot be altered by malicious software. Forensic watermarking support Video watermarking is a technology to deter end-users from illegally leaking content. To do so, an invisible forensic watermark is embedded within the content to uniquely identify the device or the recipient to whom it has been delivered. This technology is robust protection against standard and advanced attacks, including screencasting and recording by camcorder. With the benefits of forensic watermarking and secure DRM in one single package, premium content distribution is protected and pirates can be easily identified. This complementary bundle also guarantees full compliance with the studios security requirements (MovieLabs Specification for Enhanced Content Protection Version 1.1). 10
11 Features checklist The following is a list of specific minimum features and functionalities that should be included in DRM software applications. This list takes into account backward compatibility and near-term emerging technology requirements. Content delivery Online and Offline HLS streaming Online and Offline Smooth Streaming Online and Offline MPEG-DASH streaming Live TV Multiple audio tracks streaming with Smooth Streaming Multiple audio tracks streaming with MPEG-DASH Multiple audio tracks streaming with HLS Media codecs H.264 VC-1 HE-AAC v1 and v2 AAC-LC DTS Security Integrity checks Ant-debugger checks Code obfuscation Jailbreak/rooting detection TEE integration (optional if needed) OS and device support Android 2.3 and later ios 7 and later iphone 6 Plus iphone 6 iphone 5S iphone 5C 11
12 iphone 5 iphone 4S iphone 4 ipod Touch 5th and 6th generation ipad Air 1 and 2 ipad 2 and 3 ipad Mini 1 to 3 Microsoft PlayReady support Microsoft PlayReady 2.5 and 3.0 Persistent license (offline content playback) Non-persistent license Output Protection Levels with HDMI/HDCP control Microsoft PlayReady license pre and post-delivery Domain support Offline secure certificate provisioning Key Rotation (Live TV only) Scalable License Chaining (Live TV only) Multi-screen support AirPlay AirPlay Mirroring Subtitle delivery to AirPlay Miracast Other Standard License Chaining Local file playback Mediaroom support Player controls (Play, Pause, Seek and Stop) Player re-skin and customization Subtitles / Closed captions / Timed Text Markup Language 1 (TTML 1) (External and Embedded) Ultraviolet 2.1 Forensic watermarking 12
13 Critical strategic questions to ask about vendors DRM is a unique area requiring understanding of mobile platforms, content delivery and protection, and advanced security. So, in addition to making sure the above features match your requirements, you want to make sure the vendor has the experience and expertise to deliver now and in the future. The following list covers the strategic and qualitative considerations that form a solid vendor relationship: 1. How well does the solution satisfy your most important requirements? 2. How user-friendly is the solution? 3. How compelling are the vendor s references? 4. How easy/complex is the implementation? 5. How customizable is the solution? 6. Does the vendor offer excellent support and speedy service? 7. Does the vendor have customers similar to you? 8. Does the vendor have deep experience in mobile? 9. What are the vendor s security qualifications? 10. How innovative is the solution, compared to others on the market? Pricing and cost of ownership considerations When evaluating vendors be sure the complete pricing model is well understood and that all features are included upfront. Rights to all features should be included for one price as opposed to being made available as add-on pieces, which can become costly and reduce flexibility. For example, some vendors charge extra for different functionality such as streaming modes, offline downloads and other features. When making a selection it's important to consider this list of essential features and be sure that there s no hidden pricing for these critical components. Total cost of ownership is a function of the pricing for the feature-set in addition to how well the software is designed, documented and supported. While some vendors may offer the client software for free as part of a larger DRM or content management system, there could be high hidden costs for software that lacks in features, isn t well tested on multiple platforms, is difficult to integrate, does not receive frequent updates and doesn t have a company with experienced and available support staff. 13
14 Conclusion In conclusion, if your goal is to deliver an application that provides a premium consumer experience while minimizing the cost and time-to-market, selecting the right DRM client software is essential. Downloadable DRM client applications offer many advantages and can reduce DRM implementation costs and time-to-market dramatically by eliminating the dependencies on device manufacturers for embedded DRM solutions. You should only consider downloadable DRM applications that are based on industry standard content protection, that provide a clear and easy-to-use software library for mobile application developers, and allow for the rapid creation of branded secure mobile video applications across all tablets and smartphones. Selecting software with demonstrable success under real-world conditions, and that enables distribution of protected high-value content in a single uniform and secure way across all supported platforms and devices, is paramount to success. If you consider all the above-mentioned criteria and select software that is designed to operate with any standard DRM server, you can deliver a premium product quickly and cost effectively along with the ability to provide end-to-end content protection that enables immediate deployment. About INSIDE Secure s Content Protection Solutions INSIDE Secure provides the most comprehensive portfolio of security technologies, hardware, software and IP based solutions to meet current and future security requirements for even the most demanding markets. It provides a hybrid hardware and software solution to meet the stringent HD/UHD premium content distribution requirements. Based on expertise acquired over 25 years in the security industry, INSIDE Secure helps its customers choose the right content monetization and asset protection strategy without sacrificing the ability to access content from any platform, whenever and wherever. More than 80 companies including major studios, broadcasters, telecom operators, and multimedia compatible device manufacturers already trust INSIDE Secure s content protection solutions to deliver services to more than 100 million active users. More information? Contact 14
15 15
Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2
Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace
More informationContent Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
More informationFragmented MPEG-4 Technology Overview
Fragmented MPEG-4 Technology Overview www.mobitv.com 6425 Christie Ave., 5 th Floor Emeryville, CA 94607 510.GET.MOBI HIGHLIGHTS Mobile video traffic is increasing exponentially. Video-capable tablets
More informationProtecting Premium Live TV Services with PlayReady
Protecting Premium Live TV Services with PlayReady April 2015 Abstract Microsoft PlayReady is the premier platform for the protection and distribution of digital content. This white paper discusses PlayReady
More informationDeveloping PlayReady Clients
April 2015 Abstract Microsoft PlayReady is the premier platform for protection and distribution of digital content. This white paper provides an overview of the PlayReady product suite and discusses PlayReady
More informationWowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events.
Deciding what event you want to stream live that s the easy part. Figuring out how to stream it? That s a different question, one with as many answers as there are options. Cameras? Encoders? Origin and
More informationTowards Secure Multi-network Video Services. Steve Oetegenn, President
Towards Secure Multi-network Video Services Steve Oetegenn, President Contents Market Dynamics Multi-network Solutions Evolution of Security 2 Copyright 2015 Verimatrix, Inc. CONFIDENTIAL OTT Market Dynamics
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationStreaming and content sharing on Philips TVs
Streaming and content sharing on Philips TVs To support a wide selection of second-screen usage scenarios, the Philips TVs support various state-ofthe-art streaming applications. Philips MyRemote app featuring
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationThe New Frontier: DRM, Consumer Choice and New Business Models. Dean Marks
The New Frontier: DRM, Consumer Choice and New Business Models x Dean Marks Select one: Why DRM? Digital rights management allows for secure differentiation between offerings that consumers might choose
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationObjective. Page 1 Xcontrol Mobile Entertainment Content Protection
Xcontrol Mobile Entertainment Content Protection Objective The mobile entertainment solution distributes written content, video and audio over a wireless infrastructure. The targeted devices are brought
More informationTulix. Sponsored Content
Tulix Sponsored Content The market for over-the-top set-top boxes has grown considerably in recent years as many consumers have looked towards devices like Roku, Google TV, and Apple TV to either replace
More informationProtecting Online Video Distribution with Adobe Flash Media Technology
White Paper Protecting Online Video Distribution with Adobe Flash Media Technology Table of contents 1 Introduction 1 Overview of Adobe video distribution solutions 2 Best practices for effective content
More informationDLNA for Streaming Subscription TV Content in the Home
DLNA for Streaming Subscription TV Content in the Home Whitepaper Digital Living Network Alliance March 2014 Table of Contents Introduction... 2 1 The Problem -- Why VIDIPATH is needed.... 2 2 Solving
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationBuild at Your Own Risk: Why Managed Services for Multiscreen Video Make Sense
Build at Your Own Risk: Why Managed Services for Multiscreen Video Make Sense The trend of consumers watching TV and videos on their mobile devices is gaining momentum. Research firm IDC predicts that
More informationEnabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
More informationMovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
More informationbbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
More informationModule 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
More informationwww.wipro.com CONNECTED HOMES Enabling Anytime, Anywhere Media Alan Young Manoj Barara
www.wipro.com CONNECTED HOMES Enabling Anytime, Anywhere Media Alan Young Manoj Barara Table of Contents 1. Introduction... 03 2. The Current Home Entertainment Landscape... 03 3. The Connected Home Entertainment
More informationOver the Top (OTT) Content Delivery
Over the Top (OTT) Content Delivery Secured Internet TV Deployment with Envivio 4Caster C4 2 and Verimatrix VCAS September 2010 www.envivio.com Contents 1. TELEVISION TRANSFORMED... 3 1.1 Introduction...3
More informationEspial IPTV Middleware. Evo Solution Whitepaper. <Title> Delivering Interactive, Personalized 3-Screen Services
Espial IPTV Middleware Evo Solution Whitepaper Delivering Interactive, Personalized 3-Screen Services April 2010 Espial Group 1997-2010. All rights reserved The 3-Screen Challenge Differentiate
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationMOBILE VIDEO MONETIZATION: Advice for Content Owners on Decisions and Best Practices
MOBILE VIDEO MONETIZATION: Advice for Content Owners on Decisions and Best Practices CHRONICLING THE SHIFT IN VIEWING TOWARDS MOBILE Consumers are watching increasing amounts of video content on their
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationMobile Application Testing
Mobile Application Testing Whitepaper Author: Scott Aziz Date: June 1, 2012 This whitepaper outlines the critical areas of testing needed to certify mobile enterprise applications Best practices from UST
More informationSecuring Cloud-Based Workflows for Premium Content:
AKAMAI WHITE PAPER Securing Cloud-Based Workflows for Premium Content: Introducing Akamai s secure, MPAA- assessed workflow for transcoding, storing and delivering protected content in the cloud Securing
More informationPackeTV Mobile. http://www.vsicam.com. http://www.linkedin.com/company/visionary- solutions- inc. http://www.facebook.com/vsiptv
PackeTV Mobile Delivering HLS Video to Mobile Devices White Paper Created by Visionary Solutions, Inc. July, 2013 http://www.vsicam.com http://www.linkedin.com/company/visionary- solutions- inc. http://www.facebook.com/vsiptv
More informationNative ipad Apps? Why should I care?
June 2012 Native ipad Apps? Why should I care? What makes the ipad (and its sibling the iphone) so special? Why do users seem to love working on the device? The overwhelming reaction to both of these questions
More informationAlcatel-Lucent 5920 Multimedia Content Manager. Complete system for launching and monetizing multiscreen, multimedia content services
Alcatel-Lucent 5920 Multimedia Content Manager Complete system for launching and monetizing multiscreen, multimedia content services The Alcatel-Lucent 5920 Multimedia Content Manager (MCM) is the one
More informationMoving Beyond the Basics: Key Considerations for Successful Adoption of a Mobile Platform
By Jorge García, TEC Research Analyst Executive Brief Technology Evaluation Centers Why a Corporate Mobile Approach? Organizations worldwide have come to rely on mobile devices, such as smartphones, tablets,
More informationesarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
More informationWowza Streaming Cloud TM Overview
Wowza Streaming Cloud TM Overview Wowza Media Systems, LLC February 2015 This document is for informational purposes only and in no way shall be interpreted or construed to create any warranties of any
More informationAccenture Video Solution attracts more than 1 million users for Italy s leading broadcaster s Premium Play OTT-TV service
Accenture helps Mediaset launch Premium Play a groundbreaking, multi-device, Over-the-Top TV service and maintain high performance with ongoing innovative offerings Accenture Video Solution attracts more
More informationMulti-Screen Video: A Requirement in Today s Digital World
WhitePaper Multi-Screen Video: A Requirement in Today s Digital World Part 1: Today s Digital Content Value Chain and Its Opportunities video. personal. everywhere. White Paper In today s continually evolving
More informationSky Deutschland Casestudy
Sky Deutschland Casestudy Sky Deutschland casestudy overview Sky Deutschland AG is the leading pay TV company in Germany and Austria, with more than three million subscribers. Sky offers over 70 channels
More informationDIRECTV Set Top Box and Content Protection Description
DIRECTV Set Top Box and Content Protection Description DIRECTV Set Top Boxes There are tens of millions of active DIRECTV set-top boxes (STBs). All DIRECTV STBs receive 100% digital input signals. The
More informationTHE SIX GOTCHAS: COMMON MISCONCEPTIONS IN MOBILE APPLICATION DEVELOPMENT WHITE PAPER AUGUST 2010. Kony Solutions
WHITE PAPER AUGUST 2010 THE SIX GOTCHAS: COMMON MISCONCEPTIONS IN MOBILE APPLICATION DEVELOPMENT White Paper The 6 Gotchas: Common Misconceptions in Mobile Application Development Overview Companies recognize
More informationWe Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery
We Deliver the Future of Television The benefits of off-the-shelf hardware and virtualization for OTT video delivery istockphoto.com Introduction Over the last few years, the television world has gone
More informationService Providers and WebRTC
Whitepaper Service Providers and WebRTC New Product Opportunities Over- the- Top (OTT) services are those that deliver communications features to customers but are apps running on the data network rather
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationBacking up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
More informationIrdeto Piracy and Cybercrime Management
Last modification: 01-09-2015 / 06:09 AM GMT+01:00 Solution Overview Revenue Assurance Irdeto Piracy and Cybercrime Management An end-to-end suite of services for brand and revenue protection Online piracy
More informationProMedia Suite Optimized Multiscreen Production and Delivery Workflows
HIGHLIGHTS Complete family of multiscreen processing and delivery applications Provides the best possible picture quality at the lowest possible bitrates Independent nodes scale to support a growing number
More informationconnecting lives connecting worlds
adbglobal.com connecting lives connecting worlds personal TV Solution briefing Personal TV Solution Briefing Personal TV is an innovative and feature rich endto-end solution that enables operators and
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationQiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
More informationProduct Brochure. www.clickstreamtv.com
Overview is a Do-It-Yourself open source video platform designed for Small to Medium businesses. The system delivers video to any desktop or mobile device. Stream On Demand, Live, Pay-Per-View and Subscription,
More informationQuick. Spec. Expand. SeaChange Adrenalin. Entertain. Engage. Multiscreen Television Platform
Quick Spec Entertain Expand SeaChange Adrenalin Engage Multiscreen Television Platform Getting to market fast with multiscreen video is a challenge for operators. More and more subscribers are demanding
More informationAdaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite. We Deliver the Future of Television
Adaptive Bitrate Multicast: Enabling the Delivery of Live Video Streams Via Satellite We Deliver the Future of Television Satellites provide a great infrastructure for broadcasting live content to large
More informationSERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure of audiovisual services Communication procedures
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Technical Paper (11 July 2014) SERIES H: AUDIOVISUAL AND MULTIMEDIA SYSTEMS Infrastructure
More informationSticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased
More informationVIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationhttp://ubiqmobile.com
Mobile Development Made Easy! http://ubiqmobile.com Ubiq Mobile Serves Businesses, Developers and Wireless Service Providers Businesses Be among the first to enter the mobile market! - Low development
More informationWhat is Digital Rights Management (DRM) for Documents?
WhitePaper What is Digital Rights Management (DRM) for Documents? What is a Document? It used to be a piece of paper. In the digital world, when we speak of documents, we mean information that starts out
More informationMobile Checklist: Preparing for Building an Enterprise App
Mobile Checklist: Preparing for Building an Enterprise App Unlike fleeting consumer apps, enterprise mobile applications for a business are transformative. Forward-thinking organizations are eager to take
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationTRANSCODING CHOICES FOR A MULTISCREEN WORLD
TRANSCODING CHOICES FOR A MULTISCREEN WORLD JONATHAN RUFF, GLOBAL TECHNICAL MARKETING LEAD SANTHANA CHARI, VP ENGINEERING DIGITAL VIDEO SYSTEMS MARK DEPIETRO, VP CORPORATE STRATEGY & BUSINESS DEVELOPMENT
More informationVIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
More informationMAXPRO. Series IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform
MAXPRO Series IP Video Solutions LEARN ONE, KNOW THEM ALL Open, Flexible and Scalable Video Surveillance Platform LEARN ONE, KNOW THEM ALL Are you looking for... systems that are interoperable with a wide
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationDIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationThe Mobile Data Management Platform. Reach Relevant Audiences Across Devices and Channels with High Impact Ad Targeting
The Mobile Data Management Platform Reach Relevant Audiences Across Devices and Channels with High Impact Ad Targeting 1 Introduction As users spend more time engaging with media on mobile devices, brands
More informationSolving sync. Synchronized Live OTT. Solution Paper
Solving sync Synchronized Live OTT Solution Paper Live is what you make it With millions of free videos online, audiences are spoiled for choice. But the more content viewers have to choose from, the less
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationMobile application testing for the enterprise
Mobile application testing for the enterprise Accenture brings together deep knowledge of the enterprise, expertise in mobile technologies and strong end-to-end testing practices to help all enterprises
More informationConquering the Connected Home
WhitePaper Conquering the Connected Home INNOVATIONS REVITALIZING THE SUBSCRIBER VIEWING EXPERIENCE video. personal. everywhere. White Paper executive summary This white paper discusses: The emergence
More informationEtanova Enterprise Solutions
Etanova Enterprise Solutions Mobile Development» 2016-07-01 http://www.etanova.com/technologies/mobile-development Contents ios iphone and ipad... 6 Objective-C Programming Language... 6 Swift Programming
More informationSMALL BUSINESS. the basics. in telecommunications solutions
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
More information7 Things You Need to Know about Virtual Mobile Infrastructure
7 Things You Need to Know about Virtual Mobile Infrastructure Executive Summary Employees are bringing their phones and tablets to work in droves. This tidal wave of unmanaged devices has forced IT departments
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationRingCentral Office Product Overview UK. Learn what a cloud phone system can do for your business.
RingCentral Office Product Overview UK Learn what a cloud phone system can do for your business. RingCentral Office Product Overview Cloud Business Phone Systems RingCentral is the market leader in cloud
More informationUser Manual. Ver 1.0. Solutions for the Digital Life
Model #: User Manual Ver 1.0 Solutions for the Digital Life Table of Contents Getting Started 3 Introduction 3 Package Contents 3 System Requirements 3 Installing the Receiver 5 Connecting the Receiver
More informationSpecial Report. Choosing the right mobile device platform for your business
Special Report Choosing the right mobile device platform for your business About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation
More informationOpalum FLOW series Opalum STREAM series Wireless setup guide. Wireless setup guide
The Control Hub of the Opalum FLOW and STEAM series speaker systems is sold in two versions, with and without wireless LAN (WLAN) support. This guide applies to WLAN enabled units only. Connecting the
More informationWhat s New in Analytics: Fall 2015
Adobe Analytics What s New in Analytics: Fall 2015 Adobe Analytics powers customer intelligence across the enterprise, facilitating self-service data discovery for users of all skill levels. The latest
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationMARKETMIX FOR MEDIA. Taking your business over-the-top to deliver personalized and engaging direct-to-consumer experiences.
MARKETMIX FOR MEDIA Taking your business over-the-top to deliver personalized and engaging direct-to-consumer experiences for Media Solution Benefits Fast Cost Effective Scalable MARKETMIX FOR MEDIA MarketMix
More informationIntroduction. BeoLink Concept as presented in 1985
White Paper July 2015 Introduction Since 1982, the BeoLink concept has made it possible for Bang & Olufsen products to be used in multiple rooms at once. Already then, Bang & Olufsen enabled use cases
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationDEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper
DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY An Olenick & Associates White Paper July 2013 Contents Executive Summary... 1 Mobile Vision... 3 QA Methodology and Process... 4 Deployment
More informationSUSE Linux Enterprise Desktop 11
FAQ www.novell.com SUSE Linux Enterprise Desktop 11 Frequently Asked Questions March 2009 What is Novell announcing? Novell is announcing the general availability of SUSE Linux Enterprise 11 the most interoperable
More informationTechnology Services...Ahead of Times. Enterprise Application on ipad
Technology Services...Ahead of Times Enterprise Application on ipad Diaspark, 60/2 Babu Labhchand Chhajlani Marg, Indore M.P. (India) 452009 Overview This white paper talks about the capabilities of ipad
More informationEnabling the New World of Pay-TV
Enabling the New World of Pay-TV The Service Provider s Guide to 3-Dimensional Content Security Securing Content, Enhancing Entertainment Page 2 Enabling the New World of Pay-TV The Service Provider s
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationAdobe Access April 2014. Version 4.0. Overview
Adobe Access April 2014 Version 4.0 Overview Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law, furnished for informational use only, is subject
More informationWOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief
DDN Solution Brief Personal Storage for the Enterprise WOS Cloud Secure, Shared Drop-in File Access for Enterprise Users, Anytime and Anywhere 2011 DataDirect Networks. All Rights Reserved DDN WOS Cloud
More informationHIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
More informationWHITE PAPER BUILDING AND OPTIMIZING MULTI-CHANNEL WEB EXPERIENCES
BUILDING AND OPTIMIZING MULTI-CHANNEL WEB EXPERIENCES PUBLISHED MAY 2013 WHITE PAPER Leading enterprises strive to achieve higher levels of customer engagement through online channels, and this means they
More information