Feeds

US students, alumni to get legal P2P

The beginning of the end of the file-sharing wars?

Intelligent flash storage arrays

"What we want is for the fan, the punter, in quiet enjoyment of our music. They should not be hassled or fussed with how it got to them. It's incumbent on the indstry to deal with all the income splits, distribution and accounting."

Nice network you've got there. Shame if something happened to it

While Paul Sanders, of legal P2P network PlayLouder MSP welcomed the move to license music, rather sue users, he warned the music business against short-sightedness.

"The positive point is that what Jim's doing is an essential part of a network music service. It doesn't make sense to bundle the service with a network unless you include that waiver on private use."

"And vice-versa. You can't allow some rights owners to pick up the covenant fees and still sue the customers."

However he cautioned that a Covenant must be the start of the process, not the end - or music lovers would be short-changed. Unless the system evolved beyond a simple convenant, he argued, it would be impossible to create a market for cool new music services.

"It's hard to see how anyone could look at the situation, where the network is paying a low basic fee, and want to do anything other than an ancilliary service. No one is going to want to invest in anything coherent. The network provider has no incentive do anything other than minimize costs. Once you've paid your covenant - why spend a penny more?"

And as the music business' focus switches from preventing use to monetizing it, it brings in new challenges.

The public would be rightly confused and aggrieved, he thought, if they owned a Nokia ComesWithMusic phone - but were still liable for infringement on their home network. Then there's the consequences of a historic shift in emphasis that the move implies:

"You can easily see this as a shake-down. The first target of a covenant might a university in the States. Given that there's a limited amount of resources in the RIAA where do you think the resources are going to be targetted? If you're a rights-holder, you stop chasing the biggest infringers, and go after the richest networks."

We'll bring you more reactions as well get them. Mail us yours here. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.