Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:16 PM
Terry Sweeney
Terry Sweeney
Connect Directly

That Didn't Take Long

And mercifully so -- the battle over the next-gen DVD came to a close as Toshiba threw in the high-def towel today. But as quickly as data and media formats are evolving, does it really matter?

And mercifully so -- the battle over the next-gen DVD came to a close as Toshiba threw in the high-def towel today. But as quickly as data and media formats are evolving, does it really matter?Sony can do its victory dance that the high-definition DVD war, which unlike its Betamax experience, wasn't decided by what the major porn studios went with (oh, you thought Disney was a big VHS supporter?). Instead, Sony smartly struck support deals with the major mainstream studios, then started adding big-box retailers as allies. A shame this couldn't have been settled before we all finished last year's Christmas shopping, but Sony's win here may be academic anyway.

Here's why. Witness the unmistakable momentum of downloaded media -- movies, television shows, YouTube clips, and regular old audio files. The shape-shifting hard drive shows up as an iPhone, a notebook computer, a TiVo recorder. It would seem to render moot the issue of how your rented, physical media is recorded, or played back.

Are Netflix and Blockbuster going to look like the equivalent of payphone operators in 2013? If I threw a Magic 8-Ball in the air, I bet I'd get a decidedly low-def reply: "Definitely. Maybe sooner."

Jan Saxton, VP of analyst firm Adams Media Research, is less convinced of any quick migration. "Eventually we will probably move to an all-download world, but as of year-end 2007, total consumer spending on Internet video purchases was 1% of total video purchase spending," Saxton wrote in an e-mail today. "So it isn't going to happen any time soon."

There are obviously lots of variables in this equation:

-- How fast the studios wake up to the power of downloading while still retaining control and profitability

-- What happens with holographic storage -- even though it's being developed more for enterprise applications, why couldn't it cross over to consumers? Conversely, what's to keep Blu-ray from making holographic storage redundant or needless?

-- How many more hard drives will enter our lives in unexpected applications or shapes? Think automobiles, kitchens, or the inevitable Rent-A-Petabyte services that are bound to pop up to keep all our personal and professional content safe and secure

That's a picture that will take some time to come into clear, sharp focus.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-21
Multiple cross-site scripting (XSS) vulnerabilities in Chyrp before 2.1.2 and before 2.5 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the (1) content parameter to includes/ajax.php or (2) body parameter to includes/error.php.
PUBLISHED: 2019-11-21
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
PUBLISHED: 2019-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies SynaMan before 3.5 Build 1451, Syncrify before 3.7 Build 856, and SynTail before 1.5 Build 567
PUBLISHED: 2019-11-21
rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
PUBLISHED: 2019-11-21
An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.