Feeds
70%
Pure

Spotify v. Pure Music

On-line tunesmiths sounded out

  • alert
  • submit to reddit

The Power of One Infographic

Facebook foibles

Spotify also ‘became friends’ with Facebook (i.e. entered a commercial arrangement) in September 2011. It means new users must have a Facebook profile. Previously existing users can link to Facebook and Twitter but they don’t have to. It’s easy to set-up an account, including paid options, and you can stop or restart payments any month without losing stored playlists. Spotify uses a desktop application for Windows, PC and, unofficially, Linux. Premium customers can download a slick phone app with useful offline playback.

Pure Music runs mainly through its website. At the time of testing there’s one sample month but no ongoing free option. It costs £4.99, matching Spotify Unlimited, and you are not compelled to use Facebook. There are non-subscription aspects to the Lounge, which has been around since 2009; you can buy tracks or albums and stream them to compatible Pure radios. Alternatively, some Pure radios feature Pure Tag, a built-in Shazam-based music ID software that enables music purchasing from the device or later from the tagged listing using the website.

Pure Sensia radio

Pure's Sensia includes Pure Tag music identification and purchasing from the device

Pure Music expands on that by streaming from an online catalogue using the browser, a suitable Pure Radio or an Android or iOS mobile. In contrast to Spotify, it doesn’t cost more to access its smartphone version, however, there’s no offline caching so beware of data use. As of February 2012 the apps are free to install, but only for a limited period.

Spotify’s desktop program is generally well laid out and user friendly. Its punchy white text on 70 per cent black is different to the pale, desaturated look of Pure Music, which shows a heavy iTunes influence.

Spotify main application

Spotify main application
Click for a larger image

Later in 2011 Spotify added a selection of free apps within the program, acting as shortcuts to curated playlists from the likes of Pitchfork, Rolling Stone and The Guardian. On top of the subscriber-only Artist Radio feature (recommended tracks using a chosen singer or band as a starting point), it’s a handy way to discover new things. The related artist recommendations are largely accurate and helpful. For example, look up Radiohead and it suggests Jeff Buckley, REM, David Bowie and more.

To buy something, click ‘get’ in the program and verify your password. Individual tracks can be starred for finding later or saved into playlists, which can be shared among the Spotify community. In a controversial move, sharing new playlists and what you’re listening to is now active by default. There’s a private listening mode and more permanent settings in user preferences.

Top three mobile application threats

Next page: Music and movement

More from The Register

next story
NEW Raspberry Pi B+, NOW with - count them - FOUR USB ports
Composite vid socket binned as GPIO sprouts new pins
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.