Feeds

ICA's Reg-freetard smackdown: Low bodycount

Where were the targets?

High performance access to file storage

One member of the audience had achieved modest success in Asia in a band but found there were hardly any record sales to go with it. He challenged the notion that simply because P2P was popular, it should be legalized. Knife crime was popular too - but that was still theft. Did he want that to be legalized, to?

Matt objected to the comparison, but sidestepped the question. One solution was to adopt his own business strategy, and "play live".

"We're not really a live band," was the reply.

That argument had also been advanced for authors. Personally, I don't think the book is under any threat from electronic media, because paper remains such a good technology. But maybe authors like Martin Amis could "play live" and give their books away for free too, a questioner asked?

Well that's JD Salinger and Thomas Pynchon stuffed, then. Dance for Mr Burns, you performing monkeys!

(This questioner turned out to come from Matt's publisher, by the way.)

I probably should have mentioned, but didn't, that when you have a consultancy business aimed at brand advertisers then the books you write to plug the business will tend to be promotional material - that gives the ad agency and brand people what they want to hear. But, er... I didn't.

Apart from that, there was really only one outbreak of the self-delusions that you get with "Freetardism". One member of the audience said she downloaded stuff but it didn't mean the record companies lost any money. Eh? There is a discovery element to P2P - so did she mean was she spending more or less overall on recordings then? Less, she said. So that's less money going into the sound recording business, then. If the money that would have gone on a CD or iTunes purchase has gone on a video game, or a night down the pub, then that's money spent elsewhere - but she insisted otherwise. Must be a quantum thing. You get some very clever people at the ICA.

I did blank one question, because I couldn't think of anything clever or insightful to say. James Harkin quoted a porn producer who had predicted that half of the professionals in the industry would be out of work in a year. Were there any lessons to be drawn there?

What I should have said is that when there's a 'crisis' in the media - and when there isn't - someone will write a book. This one could be called The Wanker's Dilemma.

Thanks to everyone who came. ®

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.