Feeds

Oxford bans Spotify

P2P purge snares Swedes

The Power of One Infographic

Heartless BOFHs at Oxford University have banned students from using Spotify, according to the student paper Cherwell.

Although the IT Dept's rules permit streaming media applications, subject to bandwidth, Spotify is classed as a P2P application.

Students will now have to resort to traditional pastimes of smashing restaurant windows and pushing each other in the river while braying loudly.[*]

It's true that Spotify is a P2P app, but it's also a bit harsh - since the P2P-ness of Spotify was devised to help network operators by saving them money. For example, if 2,000 Oxford students are expressing their individuality by all listening to the same Radiohead track, they will be listening to bits pulled off each other's computers. The network doesn't need to pay transit costs for the file 2,000 times - so while Spotify's P2P-ness may (or may not) increase congestion, it ought to save them a bob or two.

At least, that's the basis of Spotify's business proposition to ISPs. And it has been sufficient for Hutchison Whampoa, owner of the 3 mobile networks, to sign up with investment and partnerships. One must assume Hutch boss Ka-Shing has done the maths. Maybe.

Oxford also faces an opportunity cost in banning Spotify - people may turn to unlicensed services instead. Still, there's clearly some explaining to do for Spotify.

The upside for the Swedish music company is that it saves cash too. Last year it put a tourniquet around its costs by putting a block on new signups. The block is still in place.

For recent exclusive numbers on Spotify's operation, click here. ®

*Bootnote

There's probably an app for that.

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.