Feeds

Napster: Ex RIAA boss rues lost opportunity

Where legals daren't

High performance access to file storage

It's the tenth anniversary of Shawn Fanning's Napster - and former RIAA chief Hilary Rosen has again regretted not being able to legitimise the service.

"I've been quoted as saying the record companies should have jumped off the cliff and signed a deal. I thought it at the time. It was well documented that I privately urged that," Rosen told Billboard.

Within a year of its release, Napster had tens of millions of users, and people who'd never used a PC were buying one to acquire music. That's a distribution channel, Rosen acknowledges, but the industry wouldn't legitimise it. She explains:

"But it would have been jumping off a cliff, and people have to understand that. The artists were against it. The publishers were against it. Nobody knew how they were going to get paid."

Instead, the RIAA's litigation helped drive P2P underground - where it became entrenched, and harder to monetise.

Rosen also criticised a lack of action and "too much attention on security and not enough on interoperability".

In 2003, the RIAA started to sue individual downloaders. But this only made downloading more attractive, she now notes. "Ripping off the man created some extra joy, not just a convenience factor."

After Napster closed its doors, music labels signed up in the hope of converting it into a paying subscription service, but the concept still couldn't gain industry-wide traction. The Napster brand name was sold to Roxio, and used for a DRM subscription service.

The file-sharing aspect of the original Napster terrified some major label executives - and still does. Shawn Fanning went on to build an infrastructure for legal file sharing with Snocap - but met the same resistance, and left before the company's assets were sold recently.

You can read the interview at Billboard - and a short history of the music business's home-grown flops, here. Chris Castle, a lawyer for Napster at the time, shared some insights with us recently here. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.