Feeds

DRM-hating eMusic chief quits

Farewell David Pakman

High performance access to file storage

David Pakman, CEO of eMusic, will leave the subscription service at the end of the year. Pakman explained his departure on Monday, and yesterday disclosed that his next destination would be VC firm Venrock.

Pakman championed DRM-free music, viewing the measures as anti-consumer. This has been a phenomenon, along with his commitment to editorial investment - a stark contrast to Apple's iTunes music store which one reader after launch called "an airport kiosk without the cigarettes and chewing gum." Pakman grew the eMusic subscriber base from 10,000 to 400,000 in his four years as boss, turning it into the second largest music retailer.

The cost was the refusal of the major four labels to participate. This handed eMusic ammunition for a serious antitrust challenge against the big four labels - but Pakman hesitated to pull the trigger.

Pakman and his backers deserve more credit than anyone for the major labels' decision to drop DRM restrictions. Steve Jobs became a born-again opponent of DRM belatedly last year, but iTunes still wraps his music in locks and keys - even when the labels don't want it.

eMusic was founded in 1998 as GoodNoise by Gene Hoffman and Bob Kohn, a former Borland and PGP counsel and music licensing guru. The following year it went public, reaching a first-day market capitalisation of over $500m. Following the dot com blow out, Vivendi Universal acquired the company for around $25m, but it lay fallow until private equity company Dimensional (part of JDS Capital) acquired the business in 2003, giving Pakman the job of "super-serving the over-25 age group".

Today, eMusic isn't perfect. The lack of major label catalogues leaves music lovers short, and subscribers don't have the offer of being "super-served" songs in a lossless format. But it has been a rare digital music success - a viable business that's committed to giving a great experience for customers, while rewarding the creators.

Whereas with most digital music ventures over the past ten years, it's typically been "pick any none from three". ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.