Feeds

Indie fans urged to shop to help Sony-singed labels

Small labels hit hard by Enfield arson

High performance access to file storage

A call has gone out to fans to help revive the UK's indie music scene, devastated by the London riots. Many of Britain's smallest and most inventive labels suffered disproportionately in the Sony warehouse arson on Monday night.

Typically started by music fanatics and musicians themselves, indie labels don't have the global resources of majors, and like any small business cash flow can be problematic. Almost 200 labels have been affected - Muso's Guide blog has a list here and benefit gigs are being arranged via social networking sites.

"SonyDADC have identified a temporary distribution partner and it is envisaged that they will be in a position to pick, pack and ship orders in the course of next week," said PIAS, the largest indie distributor in Europe, which was badly affected.

Meanwhile the indies' trade association AIM has urged fans to download digitally.

"This is a disaster for the music community, but with the fans' help, labels and artists will survive," said Alison Wenham, chairman of AIM. "Music fans can show their support for the independent label community and help them survive this disaster by buying a digital download of an album from any one of the digital retailers in the UK, as well as going to their local record store while stocks last. This way the labels will be able to remanufacture their CDs and vinyl more quickly, to resupply the record shops who are also affected by the riots."

Independent film distributors were also badly affected.

Although independent labels led the way with digital releases - they never thought DRM was a good idea - significant revenues still come from sales of plastic things. Beggars Group chairman Martin Mills told us last year that 70 per cent of sales of his roster's albums (the Group includes Matador, XL, Rough Trade and 4AD) still comes from CDs. Mills described the arson as "horrible, horrible".

Beggars and PIAS have also worked hard in Brussels to block industry mega-mergers, founding Impala, the trade association, in 2000. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.