Feeds

The music biz's digital flops - a short history

Beware of The Next Big Thing

The Power of One Infographic

Since the record industry first noticed that some of the kids were using the internet in the mid-90s, it's flopped from one puddle to the next. Despite a desperate need to evolve - guys, the pond is drying up, do try to breathe - recording industry strategy has flopped from one muddy puddle to the next, and a muddy puddle is quite a good metaphor for the latest survival strategy: advertising supported music which 'feels like free' to the consumer.

Flop, flop, flop. So let's take a quick tour of the puddles, in rough chronological order.

The first muddy puddle was all about marketing the album and adding value to the CD. These were heady days for web developers when a label could be persuaded to part with upwards of £50,000 for a website with a few bits of repurposed server-side code or client side Flash. Alongside this were the first experiments in enhanced CDs and brave but foolish 'multimedia' projects. The multimedia arms race - you can get a flavour of it from this announcement by EMI in 1995 - took a few years to prove itself expensive and largely pointless. Music CD-ROMs couldn't compete with games, and were subject to the explosive and expansive egos of artists as budgets ballooned and projects failed to be delivered. Websites got heavier and more 'creative', again to stroke egos rather than feed fans.

And the upshot was that by the late 90s, record labels were paying out more than the price of a CD to reach each and every person who had already bought the CD anyway. Which led some of the more commercially driven execs to start to think of the net as a sales and distribution channel.

Diamond Rio MP3 Player

Diamond Rio MP3 Player

And just for context, the MP3 format had hopped off alt.binaries and Hotline and onto the web in 1998 gaining sufficient popularity for Diamond Multimedia to risk marketing a hardware player, the Rio, which played MP3s. Which the RIAA failed to kill at birth, as an instrument of infringement.

SDMI

So into the next puddle we flop, and this one is inhabited by SDMI and friends. The lesson is that cake is not a dual-use foodstuff. The central idea that motivated the participants was to produce a kind of technical environment that would allow consumers to access only approved music, and would allow record labels to decide even post-distribution what could be done with it.

They thought big.

SDMI at its peak was a consortium of around 200 member companies and churned out technical documents under the fervent leadership of Leonardo Chiariglione, an MPEG expert and in 1999 number 19 on Time's top 50 digital movers and shapers list. Fellow travellers included EMMS, from IBM, otherwise known as the Madison Project, and bluematter, a proprietary multimedia packaging format from Universal Music Group.

UMG's Bluematter format

Anyone remember Universal's Bluematter?

It was in these cauldrons that 'Digital Rights Management' principles and techniques first flavoured the music retail stew, and companies such as Macrovision started punting around CD copy-protection malware.

IBM's Madison Project

IBM's ambitious Madison project

But they were all predicated on Napster being shut down and nothing taking its place, which with hindsight looks a little over-optimistic. The blowtorch of decentralised P2P, the continuing popularity of the plain old CD (it's rippable), and consumer indifference to the massive and clumsy software they were being told they would have to use if they wanted music, all contributed to drying up the puddle. Needing to follow the consumer, technology industries en masse adopted MP3 as the standard format. SDMI fell apart, Madison was shelved.

Mobile application security vulnerability report

Next page: Label-owned stories

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.