Feeds

Bundled music newbie Boinc aims for year-end launch

Remains to be seen if Beyond Oblivion actually is

High performance access to file storage

The disaster that was Nokia's Comes With Music hasn't deterred entrepreneurs from having another go at bundling music access with hardware. Beyond Oblivion has raised a huge amount of cash to do much the same thing – and told the FT it will launch by the year end. The service will be called Boinc, continuing the tradition of misspelled names. (cf: Rdio).

Earlier this year Beyond Oblivion told us it expects the cost to be around $50 to $70 per device.

Like Comes With Music, the licence grants access to a large music library for the "lifetime" of a device. And like the doomed Nokia service, it relies on DRM. But unlike Comes With Music, Beyond Oblivion will bundle the offering with any kind of participating device, as long as someone in the retail chain is willing to sign up, and also offer it as a standalone subscription service via an iOS Android or Windows Phone app, or a client for Mac or Windows. It is also happy to leave branding to retailers or device manufacturers.

Boinc explained.

The FT has some interesting figures. As is the customary practice, large record labels have demanded (and received) large up-front payments: 40 per cent, apparently. The labels have also secured a minimum 70 per cent of total annual revenue in royalties. Boinc has secured a royalty ceiling of 92 per cent. That doesn't leave a lot to market and operate the service. Or, more importantly, much of an incentive for other investors to think, "What a brilliant idea, maybe we could do this even better."

BO says most of the $77m it received from Rupert Murdoch's News Corporation went straight to the major record labels. This money-go-round is not new. In recent times labels have asked for over 100 per cent of a startup's equity.

We're still waiting for the "private beta" phase, expected in June but now slated for October. The company says it is on course for a end-of-2011 launch. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.