Startup 1 The Life and Death of a Silicon Valley Startup Company Mark Stamp Department of Computer Science San Jose State University.

Slides:



Advertisements
Similar presentations
Institute for Cyber Security (ICS) Prof. Ravi Sandhu Executive Director and Lutcher Brown Endowed Chair
Advertisements

PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
D E P A R T M E N T O F COMPUTER SCIENCE AND SYSTEMS ANALYSIS SCHOOL OF ENGINEERING & APPLIED SCIENCE O X F O R D O H I O MIAMI UNIVERSITY D E P A R T.
Chapter 12: Project Management and Strategic Planning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Adoption of Electronic Healthcare Records
System Security & Patient Confidentiality General Lesson 1.
Office of Communications create your futurewww.utdallas.edu DEPARTMENT OF MATHEMATICS create your futurewww.utdallas.edu.
Digital Rights Management: The Technology behind the Hype Mark Stamp Department of Computer Science San Jose State University.
halFILE CountyCashier ™ Integrated Document Filing for County Clerk’s offices and halFILE ™ Document Manager.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
29-1 The Technological Revolution. ENIAC Electronic Numerical Integrator and Computer World’s first electronic digital computer Weighed 30 tons,
CS 185C: The History of Computing October 17 Class Meeting Department of Computer Science San Jose State University Fall 2011 Instructor: Ron Mak
The MediaSnap ® Digital Rights Management System Priti Sabadra and Mark Stamp Department of Computer Science San Jose State University.
 KEY IDEAS  TOOLS  CONTACT INFORMATION  PUBLISHER INFORMATION.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CIS700: Hardware Support for Security Professor Milo Martin
Software Uniqueness: How and Why? Puneet Mishra Dr. Mark Stamp Department of Computer Science San José State University, San José, California.
DIGITAL RIGHT MANAGEMENT Bùi Thành Đ ạ t Nguy ễ n Hoàng Nh ậ t Đông Nguy ễ n Duy C ườ ng
ELECTRONIC COMMUNICATION ACT 2000 Raashida & Sangeetha.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
How a Ph.D. in Physics Can Prepare Students for an Industrial Career Shirley Chiang Professor and Chair Department of Physics University of California,
DRM 1 Digital Rights Management the Good, the Bad and the Ugly Mark Stamp Department of Computer Science San Jose State University DRM.
Plan of the day OPERATIONS CONTROL.  Introductions/Background Info  Syllabus  Course background  Noppa  Assignments & Groups  First topic: Systems.
Computers Are Your Future Tenth Edition Spotlight 2: E-Commerce Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Careers and Certification
Is there life after HEP - The Myths and the Reality of Working in Industry Kathy O’Shaughnessy, PhD R2 Technology, Inc.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Invitation to Computer Science 5th Edition
Computer Uses and Children Presenter: Lauren Aguilera.
Lecture 30 Chapter 07 Cash Task Force Image Gallery clip art included in this electronic presentation is used with the permission of NVTech Inc.
Delta Data Software, Inc. About Us. ▲ Headquartered in Columbus, GA ▲ Company was started in 1985 ▲ Clients are major financial services firms with over.
ECE Lecture 1 Security Services.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
Turning technology into cash What’s Hot and What’s Not in Global Start-up Trends Mike Holt
Cybernetica Ahto Buldas Chief researcher. Cybernetica A State hold R&D company in Estonia Stock Capital: EUR 1.15M Founded 1997 as a derivative of the.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
Benefit Laws 3-5 Mitch Jason and Isaiah. Unemployment Insurance Laws ● Welfare ● Social Security ● Qualification ● Give out unemployment funds ● Money.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Chapter 12: Project Management and Strategic Planning Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Trends & Lessons from Silicon Valley: For Startups December 2013.
Department of Computer Science and Automation Indian Institute of Science, Bangalore, India. CSA Research Areas Theoretical Computer Science.
Welcome to CA. Copyright ©2006 CA. All rights reserved. All trademarks, trade names, services marks and logos referenced herein belong to their respective.
Jeopardy Q$100 Q$200 Q$300 Q$400 Q$500 Q$100 Q$200 Q$300 Q$400 Q$500 5 Q$100 Q$200 Q$300.
CS/COE 1501 Recitation Extended Euclidean Algorithm + Digital Signatures.
Università degli Studi di Verona Department of Computer Science.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
Integrating Social Media into IS/IT Courses: A Success Story to Report.
Learning Objectives © 2015 Cengage Learning. All Rights Reserved. LO4Journalize the payment of a payroll. LO5Journalize the payment of payroll taxes. LESSON3-2.
UNIVERSITY OF JYVÄSKYLÄ FACULTY OF INFORMATION TECHNOLOGY IT with a human touch 2010.
Università degli Studi di Verona Department of Computer Science.
T. Trimpe Science Scramble “I” Words T. Trimpe
E-voting …and why it’s good..
Project 2 Rachel Richman Gatcombe Section /17/2018 3:02 AM.
Information Security at Florida State University
Information Security at Florida State University
O.
X-STANDARD MATHEMATICS ONE MARK QUESTIONS
Information Security at Florida State University
The Most In-Demand Skills for Cloud Computing.
offers for junior researchers in its research teams
Presentation transcript:

Startup 1 The Life and Death of a Silicon Valley Startup Company Mark Stamp Department of Computer Science San Jose State University

Startup 2 Who Am I?  1992: PhD, Texas Tech  : WPI  : NSA  : MediaSnap, Inc.  2002-Present: SJSU

Startup 3 What was MediaSnap?  Silicon Valley startup company o Founded June 2000 o I joined in December 2000  Maximum of 15 employees  Not a dot-com  Funded by In-Q-Tel (CIA)  Digital rights management (DRM)

Startup 4 Why MediaSnap?  Three reasons 1. Money 2. Money 3. Money

Startup 5 What is DRM?  Digital book example  “Persistent protection” o Crypto is not the answer o Security by obscurity?

Startup 6 MediaSnap  DRM for pdf documents  For use within enterprise o Medical records o Insurance documents

Startup 7 Mathematics?  Cryptography  Obscurity o Our own “scrambling” algorithms o Key management/caching o Tamper resistance o Software uniqueness

Startup 8 Non-mathematics  Dotcom meltdown  9/11/2001  Management  In-Q-Tel  Other

Startup 9 More info  M. Stamp, Digital rights management: The technology behind the hype, to appear in Journal of Electronic Commerce Research,  M. Stamp, Risks of digital rights management, Communications of the ACM,  M. Stamp, Digital rights management: For better or for worse?, ExtremeTech,  M. Stamp, Risks of monoculture, to appear in Communications of the ACM