IDEA Consulting Inc. Announces Speakers, Details of Landmark 2012 EuraMedia Summit, Dedicated to Russian, Eurasian Media and Technology Market

(PRWEB) December 19, 2011

The first ever EuraMedia Summit, to take place in Boston, MA, in May, 2012, is being designed as a forum for Western companies to interact with their counterparts in the very hot Russian and Eurasian Internet and technology sector in order to facilitate market entry in both directions, develop new media sales agreements and arrangements based on the changing landscape introduced by social media, broadcast mediums, and technologies, and encourage modernization and entrepeurship in Russia and the countries of the former USSR by connecting investors and innovators.

Day one of the conference will focus on on-line retail and application development, day two on social media and content sales, and day three on new companies and media-related and investment. The summit will also include a gala awards dinner for pioneers in the field, the first meeting of the IDEA Eurasian Entrepeneurs and Inventors Association, and an exhibition of the hottest new regional sites, applications and technologies, chosen via a series of contests that are to take place over the next few months.

IDEA, which is promoting the event with Harvard University, Columbia University, The New England Russian Chamber of Commerce, the US-Russia Business Council, and a wide array of US and international media outlets, including BBC, Wired Magazine, CNN, and many others, announced today that the list of speakers, which is currently being confirmed, will include a wide variety of players, ranging from local online luxury retailers like Chanel’s and mass-market retailers like to Russian media come social media giants like CTC, to international mammoths, like Apple, ABC, Samsung, Google, Twitter, and Ebay, Yelp and Vimpelcom to smaller up and coming players like Affinnova, Blockdot, ZocDoc, Velti, and Apigee, to large investment banks like JP Morgan and smaller firms including Triana Venture Partners, to attorneys and specialists from copyright and intellectual property pioneer Marc Jacobson and larger firms including Baker McKenzie and Marks and Sokolev, to off-line retailers from Best Buy to Russia’s Victoria group plus cellular operators, marketeers, branding specialists, GPS and location-based technology developers, local social media portals, on-line payment systems, local application developers, bankers, and experts 3Dtv, Internet TV, augmented reality, and anti-piracy and instant data capture, among other new platforms and technologies. IDEA says that the list already includes Founders, CEOs, and top executives from the companies listed above and roughly 50 others, who will speak individually or as part of panels.

Likewise, the race is on in the former Soviet Union for young digital entrepeneurs, inventors, and application developers, who will go through two rounds of local contests before being selected as part of the elite 100 invited to attend EuraMedia.

When asked why it decided to host such a large, high-profile (500-600 guests expected) event, dedicated to the Russian and Eurasian media and tech markets, in Boston, MA, IDEA Founder Matthew Goldstein replied, “The Russian Internet and social media markets are already so hot, with investment already moving in both directions, and technology development and marketing is just beginning to be adequately explored. Russians spend 100 percent more time on the Internet than any other nation in the world, and smartphone penetration is around 90 percent. But yet the market is still, in many ways, wide open, as application development is at a nascent stage, seed money is just recently becoming available, and Internet penetration still only around 50 percent. There is a lot that can be done here, and, if we really focus on these industries and create a forum that allows the many Western companies who are still scared of the barriers of entry into the region to get rid of their fears and more investors to become involved, we might be able to help the region develop an economy that might truly be able to supplement its natural resources industry, the fragility of which continues to cause massive local and international political issues.”

Goldstein added that he was inspired also by the Skolkovo initiative launched between the Russian government and M.I.T. , which envisions the creation, in the near future, of a massive new university outside of Moscow as well as the conference hosted by Viacom and Russia’s Channel One on Russian social media at this year’s MIP.COM. “If Russia is important enough to command its own conference on the French Riviera covering social media alone, then the country and its neighbors certainly warrant their own world-class summit, in a city where educational facilities and VCs abound, that will cover all facets of the industry.”

EuraMedia will only sell 200 out of 600 tickets, with the rests going to invited guests. These tickets will go on sale in mid-January, 2012. In the meantime, if you would like to learn more about the conference, visit, where, beginning next week, an official list of speakers, speeches, media partners, and award winners will be posted.

# # #

Related Copyrighted Piracy Press Releases


A New Approach to Content and Digital Rights Management.

(PRWEB) November 9, 2001

One of the world’s leading Digital Rights Management Company Reciprocal has ceased trading on the 7th November 2001 without warning. Reciprocal ( aimed to bring new-economy models to replace the widespread piracy of digital material such as music, software and films on the Internet but was thwarted by high overheads, intrusive complex technology and the free availability of material already pirated and passed from hand to hand on the Internet.

The failure is an important signpost to those who hope to commercialize Internet content and a warning that consumers will not struggle with technically complex solutions to protect the intellectual property of content owners.

The problem that digital rights management addresses is that unprotected digital files, whether they hold audio, video, text, can be spread almost instantly around the Internet and multiply uncontrollably much to the dismay of copyright owners and others with a stake in distribution. There are currently a handful of complex technologies that lock media files in a ‘digital safes’ where those who own the content can keep them until you rent the key but generally these require significant input from consumers to set up and often require content owners to risk new dot com inspired business models such a voluntary payment schemes.

Nevertheless, the pull-through market demand for easy to access content on demand is significant – consumers want to have more choice and get content quickly and cheaply. Customers have no objection to pay-per-use or hiring content – they do object to having to download and install special software just to pay for and protect to content they buy.

The push through, from music companies, movie studios and print publishers wishing to monetize vast back catalogues, and raise margins on new content by minimizing storage and distribution demands is also present. So what happened? Why were the solutions offered rejected by the mass markets?

Perhaps its time for the last of the dot coms to try not to foist new business models on their customers or intrusive technology and get back to the basics of simplicity and ease of use while expanding consumer choice.

Dr Mark R Baker. Is a Technology Consultant with Perimele Ltd in Oxford, England.

Comments (1)

Arxan Announces Key Hiding and Protection Capabilities with TransformIT

Bethesda, MD (PRWEB) August 4, 2008

Arxan Technologies, a leading provider of application hardening solutions designed to protect software from tampering and piracy, today announced the launch of its new patent-pending cryptographic key protection technology, TransformIT. Today cryptography and PKI form the cornerstones of information security. The effectiveness of these cryptographic routines in turn depends on the secrecy and integrity of keys. TransformIT enhances software security by preventing tampering and hacking attacks that target keys used within software applications — thereby preventing content, data and revenue loss.

Secret keys are used across many industries for various purposes including encryption, authentication and node-locking. In the digital media market, loss of first-level keys allows piracy of software or media titles. As deeper-level, system-critical keys are exploited, entire platforms become susceptible to widespread piracy allowing hackers to instantaneously rip media libraries or unlock subsidized devices. Similarly, public and private keys are used to protect enterprise applications and any related data. In addition to unauthorized access, malware insertion, data leakage and system level exploits can result in entire platforms becoming vulnerable – allowing hackers to instantaneously snoop on enterprise-wide systems such as mobile and e-banking transactions or VoIP communications.

“Encryption is widely used to prevent unauthorized access to data and information systems, and digital IP, against piracy and theft,” said Diana Kelley, Partner at SecurityCurve. “However, one critical point of failure in such systems is the instance at which the key is revealed and used. This point is identifiable through signature patterns and cryptographic routines. Once found, they direct an attacker straight to where the keys will typically be constructed in memory. Subsequently, fatal exploits can be created and used.”

Arxan’s TransformIT product ensures that private keys are never revealed statically or in run-time memory. It also ensures that public keys cannot be tampered with, thereby preventing a wide range of phishing, spoofing and code tampering attacks.

“We’re pleased to bring the latest in key hiding and protection technology to the market with TransformIT in response to market demand for stronger information security,” said Mike Dager, CEO of Arxan. “In conjunction with our GuardIT family of products, TransformIT enhances our proven ability to protect and harden applications against the growing range of attack vectors. Arxan security solutions now provide protection against key exploits that can result in system-wide compromise and data leakage.”

Key Features of TransformIT include:

White-Box Cryptography Key Representation – Algorithmically strong, this patent-pending approach is fundamentally secure and resistant to break-once-run-everywhere (BORE) attacks.
Effective Key Hiding – By preventing keys from ever showing their face, TransformIT thwarts memory dump and memory remnant attacks.
Tunable – Modifications to the depth and breadth of a key graph allow users to define their level of security. Moreover, a simple API allows TransformIT to easily integrate with other applications.
Intricately Hookable – Machine constants, hardware IDs and similar node-locking anchors can be tied into product calculations. The result is that the software cannot be separated from hardware, nor copied.

Arxan’s GuardIT family of software protection products can be seamlessly deployed with TransformIT for comprehensive key transformation and protection. This suite is comprised of GuardIT for Windows, GuardIT for Linux, and GuardIT for .NET. Each product features automated, easy to use, yet customizable protection across desktop, embedded and server software applications.

About Arxan Technologies

Arxan Technologies Inc. is a leading provider of application hardening solutions designed to protect software applications from tampering to minimize risk and maximize profitability. Our advanced software protection solutions secure enterprises, ISVs and digital media providers against unauthorized use, malware insertion, piracy, and reverse engineering of intellectual property. Our products defend, detect and react to attacks through a threat-based, customizable approach that is proven, easy to use and non-disruptive. Arxan supports a full range of application protection needs, from commercial software to military grade assurance. The government relies on Arxan Defense Systems, Inc., a subsidiary of Arxan Technologies, to deliver a best-of-breed anti-tamper platform to protect critical program information. Founded in 2001, Arxan Technologies has offices in Bethesda, San Francisco, London, New York, Dallas, Boston, Chicago and West Lafayette, Ind. For more information, please visit


Related Anti Software Piracy Press Releases

Comments (3)

Ghost Ship Haunts the Seas: Modern Technology Could Be the Answer

Cambridge, MA (PRWEB) January 28, 2014

A Russian cruise ship, the Lyubov Orlova, adrift on the Atlantic Ocean since last year, is a haunting reminder of the present dangers that can afflict our shores. The 328-ft, 1,565-ton cruise liner was being towed down to the Dominican Republic to be sold for scrap metal from Canada when a storm caused the line to break, sending the floating catastrophe on an unplanned, perilous journey into the unknown waters.

The Lyubov Orlova, it is believed now by Western European authorities to have sunk to the bottom of the Atlantic, but earlier last week reports surfaced that this boat was on a crash course to the British Isles with cannibalistic, diseased rats on board. This spooky phenomenon is hardly the first account of a Ghost Ship being reported. Over history, there have been numerous reports of these abandoned and unmanned ships drifting hopelessly at sea, at times with disastrous endings. Perhaps the most famous of these being the Mary Celeste, which when found in 1872 was completely intact and under sail but devoid of all crew, a mystery still to this day.

After sending the Lyubov Orlova into international waters, Transport Canada said it was satisfied the ship no longer poses a threat to the safety of [Canadian] offshore oil installations, their personnel, or the marine environment.

In the last 10 years, technology companies have come up with innovative solutions to tackle some of the dangers associated with open water, such as piracy or risks of collision. One of them is the Spynel camera system, manufactured by HGH Infrared Systems; Spynel is a rotating, panoramic infrared thermal imaging camera that provides continuous monitoring of ultra-wide areas in real-time. Its high resolution image coupled with automatic detection and tracking of targets on 360 degrees ensures that no event is missed, even in total darkness or fog. In Maritime applications, Spynel can successfully operate on very rough seas thanks to an autonomous gyro-stabilized platform and come with sea-specific image processing algorithms. This built-in image processing allows for minimal false alarm rate and effective differentiation between distant small boats and waves. The Spynel systems are currently used by the French Navy for anti-piracy purposes in the Gulf of Yemen.

Ghost ships and other collision risks in ports and open water can be intercepted effectively with the assistance of military grade equipment used today by private entities and security companies over the world.


Founded in 1982, HGH designs, develops, assembles and sells complete high end optronics systems for security, industrial and civil applications. HGHs team of highly qualified engineers is comprised of experts in optics, software, mechanics and electronics and operates in the US, out of Boston, MA. HGH strives to provide advanced and innovative infrared equipment to protect their clients all around the world, while keeping the agility and dedication of a small and passionate team. Speed, flexibility, technical excellence and innovation constitute their core values. HGH has established itself as an international reference for infrared technology innovation through the development of multiple advanced thermal sensors, among which its award-winning real-time 360 degree thermal camera, the Spynel-C – 2008 Product of the Year from Photonics Tech Briefs, 2010 Innovation Prize from the EuroNaval Committee, 2011 Kummerman Award from the French Academy of Marine, 2012 GovSec Platinum Award, and 2012 Govies Homeland Security Award.

POC: Katie Shea, Marketing Associate


Comments (1)

Video Rating: 0 / 5


APAC software piracy rate climbs to 62 percent

APAC software piracy rate climbs to 62 percent
Software piracy in the Asia-Pacific region has climbed to 62 percent as employees remain oblivious about what is installed in their systems, according to Business Software Alliance (BSA). The region's 2013 piracy rate was the highest among other …
Read more on ZDNet

Popcorn Time's movie piracy app works on iOS without tricks, for now
Popcorn Time tells The Next Web that it fully expects the folks in Cupertino to block the software, and that its installer team is "ready for any obstacle" — the crew went so far as to post a 1-year anniversary video (below) that thumbs its nose at …
Read more on Engadget

Western cracks down on piracy
“It could be because they have peer to peer software that's running on their machine, and they don't realize it, and we'll work with them. We'll try to figure out what's going on.” Another concern the student had surrounded the concept of privacy. “Who …
Read more on Western Courier (subscription)


Say no to software piracy

Video Rating: 3 / 5

Comments (1)

Latest Software Piracy News

The Android Dilemma: 10 problems that need fixing
What this means is that there are so many different kinds of Android devices out there with varied screen sizes and types, hardware, software versions, interfaces and features that it becomes difficult for Google or Android developers to efficiently …
Read more on Digit

Automakers Say You Don't Really Own Your Car
They say no one should be allowed to even look at the code without the manufacturer's permission because letting the public learn how cars work could help malicious hackers, “third-party software developers” (the horror!), and competitors. John Deere …
Read more on EFF


Cliffs of Dover (live cover)

I’m playing Cliffs of Dover in a local talent show. It was pretty fun. Cliffs of Dover is a great song by Eric Johnson, a great guitarist. Guitar-Epiphone Les Paul Ultra-2 (with modifications!)…
Video Rating: 4 / 5

Comments (6)

Bass Extremes A Chick from Corea by Nefta Lopez/Cesar Huesca

Originally from “Bass Extremes”,A Chick from Corea is a composition by bass players Victor Wooten and Steve Bailey…(my heroes!!!) It’s a honor to me perform with my good friend and incredible…

Comments (25)

« Previous entries Next Page »