Feeds

Failing Web 2.0 stars pray for copyright abolition

Wanted: starving artists to help out web tycoons

The Power of One Infographic

"The winners ... [will] be the companies that throw out everything that’s come before, and build new businesses around the natural behavior of people."

All of which is like telling successful passenger liner operators to get more "Titanic-like". But Arrington does us a great service, albeit unwittingly.

Web 2.0 hypesters who look like old lesbians

He's reminding us that what great internet audiences flock to is copyright material. A web that consists only of User Generated Content might be fun for a while, and even illuminating in places, since "amateurs" are doing much of the work that lazy professionals cannot, or dare not do. But with no income coming in, most will eventually cease to do it. One can only remain a sucker for so long.

And so what Arrington, and other sock puppets for the giant internet companies crave, is really quite simple. They want to the lower the cost of their raw material - preferably to zero.

(That's in keeping with the recent call by anti-copyright activists to be paid for P2P file sharing: in other words, the copyright holders should pay them. But Arrington is a "freetard" through necessity, not by ideological choice.)

Having succeeded in using "people power" to get innocents to contribute labour for nothing, the Web 2.0 deperados now need copyright holders to follow suit.

And they've been pretty successful at it, too. Newspapers are acting like lemmings, in the hope that the "future value" of the web will save the physical businesses they're helping destroy. But it's asking a lot for people to give up a modestly successful business model, for one that's already, demonstrably broken.

The truth is that outside certain lucrative niches, it's impossible to monetize the web from general purpose content. It's a telephone network - with pictures - and the most people will pay for a telephone network (even with pictures) is a buck or two a month.

As it happens, I'm in favour of copyright reform too - but it's predicated on gathering more money for creators, not propping up serial business failures like ... Michael Arrington. So the next time you hear the ritualistic whining about the trouble copyright holders cause plucky internet startups, remember who really needs who.

Sarah Lacy book cover

With exquisite timing, a book that should serve as a tombstone for Web 2.0 plopped out recently. It's called Once You're Lucky - Twice You're Good: The Rebirth of Silicon Valley and the Rise of Web 2.0 , although readers are invited to suggest more suitable titles [click for mailto:]

People who look like their pets (continued): the reporter with sock puppet

People who look like their pets (continued): your reporter treasures his Web 1.0 memorabilia

I'm going to snap up a couple as novelty gifts - and one for myself. It'll go next to my treasured Pets.com puppet.®

Mobile application security vulnerability report

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.