Feeds

Napster launches XM tie-in software

Hear a song on the Net then buy it

Beginner's guide to SSL certificates

Napster and satellite radio company XM today provided the first glimpse of the results of their strategic alliance, announced in July.

XM's 5m US subscribers can now grab a public beta release of the XM+Napster software that connects Internet-streamed radio broadcasts to digital music downloads.

The application tunes into and plays over 80 XM Radio Online-hosted music channels and allows listeners to buy songs from Napster that they've just heard on the radio. XM subscribers can pay a monthly subscription fee for unlimited-but-tethered downloads or they can purchase individual songs on a one-off basis.

How often XM listeners will purchase recently heard songs remains to be seen. With so many music channels available, we're sure XM listeners may quickly find that they're downloading less and less stuff once the novelty wears off. After all, music is about listening, not possession - something too many P2P advocates appear to forget - and with a decent channel to tune in to - Radio Paradise is our personal favourite - it's surprising easy to find yourself spending less time listening to albums.

And that means spending less money on them, which may not be the result Napster is looking for. ®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.