Millions of old New Zealand coins still to be handed in

Wednesday, October 25, 2006

On November 1, 2006 the old five, ten, twenty and fifty cent coins will be illegal tender, but the Reserve Bank of New Zealand says there are still at least 100 million still to be returned.

According to the Reserve Bank, most of the old coins have been lost in drains or buried in rubbish. “We think there is still another 100 million sitting around in people’s homes,” Brian Lang, currency manger for the Reserve Bank, said.

Lang said: “So far, just over 280 million coins have been returned, but there are more out there. Since 1967 the Reserve Bank has issued more than a billion of the old ‘silver’ coins. So if you don’t want to be stuck with loads of old coin – there’s never been a better time to empty your coin jars, sweep the car glove box and rummage behind the couch cushions.”

The coins still awaiting to be handed in, by either spending them, taking them to a bank or donating them to charity, are estimated to be worth between NZ$5 million and $50 million.

“A last-minute burst of publicity may convince people to bring the coins in. It’s a bit of a hassle though. Human nature being what it is, people just don’t care,” Lang said.The Karori Wildlife Sanctuary located in Wellington say that they have collected over $9,000 in old coins. Sanctuary spokesman, Alan Dicks said: “The campaign was particularly fitting because the old coins depicted tuataras and kiwis, both of which can be found living at the sanctuary. The money will go towards supporting general ecological restoration of the sanctuary. We want to get over ten grand, but the more the better.”

Lang said: “Though the coins will no longer be legal tender, banks will continue to exchange them until at least the end of the year,” and the Reserve Bank will always exchange them. “We are still getting people coming in with two-dollar notes,” Lang added.

Leave a comment

Information On Parental Monitoring Software

By IPRWire Staff Writer

We have entered the technological age. Parents may find that advances in technology make so many jobs easier. We now have vacuums that operate on their own or GPS systems that ensure one does not get lost. The latest devices in technology improve our lives in a specific way. The one downfall of the technological revolution is the question most parents ask. How is a parent supposed to monitor a child?

Children are now able to view any type of information on the internet. One of the scariest thoughts is that a child is able to talk to people on the internet. This leaves children open for a number of dangerous situations. Parental monitoring software tools enable a parent to monitor the type of web content that their children are viewing on the internet. IPOWER Applications Home Pow Wow is a great website that provides parents with information about this type of tools.

Parental internet monitoring software tools are designed to give parents control of what children view online. A parent is able to see who was online, what websites were visited and and/or used the most. Parental monitoring tools are one of the best ways to protect children while they are online. Every parent wants to protect their children for as long as possible.

[youtube]http://www.youtube.com/watch?v=I-i9hR_JGgQ[/youtube]

SMS text message parental monitoring is another type of software tool that sends duplicate copies of ingoing and outgoing text messages. This type of tool can be installed into any cell phone that is currently on the market. This is a secret way to monitor the messages that children receive and send out to friends. Children seem to always be using their cell phones to communicate constantly with friends. Stay up to date on the information that your child sends and receives.

There are several different kinds of parental internet monitoring software tools that a parent can choose from. We live in the future age in which children are put into contact with inappropriate information or people each day. Make sure that this does not happen by investing in monitoring tools. It seems that each week there is a newspaper article or an announcement about a child who came into contact with the wrong type of person on the internet.

Children are an irreplaceable resource that we must work to protect. Keep your children safe while online. Learn more information about parental monitoring software tools at IPOWER Applications Home Pow Wow. This is a great online resource that explains the different types of monitoring equipment that parents can purchase. Visit

DoYouPowWow.com

to find out more information about protecting children while online or when using cell phones.

About the Author:

doyoupowwow.com

is a leading provider of integrated ON-DEMAND applications for home content security and companies of all sizes. For more information on parental internet monitoring software and child internet monitoring please visit our site.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=188934&ca=Computers+and+Technology

Posted in Scaffolding | Leave a comment

Listening to you at last: EU plans to tap cell phones

Monday, October 19, 2009

A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The €14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate.

INDECT produced the accidentally published report as part of their “Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data” project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission’s Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom.

Indicated in the initial trial’s report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users’ and article subjects’ relations with others, organisations, and in-project movements.

Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a “threat”, it would be the INDECT system’s job to predict it.

Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.

Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK’s Daily Telegraph, Liberty’s director, Shami Chakrabarti, described a possible future implementation of INDECT as a “sinister step” with “positively chilling” repercussions Europe-wide.

“It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,” Suresh Manandhar, leader of the University of York researchers involved in the “Work Package 4” INDECT component, responded to Wikinews. “However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.”

HAVE YOUR SAY
Should the EU carry out this research without a wider public debate?
Add or view comments

Although Wikinews attempted to contact Professor Helen Petrie of York University, the local member of Project INDECT’s Ethics board, no response was forthcoming. The professor’s area of expertise is universal access, and she has authored a variety of papers on web-accessibility for blind and disabled users. A full list of the Ethics board members is unavailable, making their suitability unassessable and distancing them from public accountability.

One potential application of Project INDECT would be implementation and enforcement of the U.K.’s “MoD Manual of Security“. The 2,389-page 2001 version passed to Wikileaks this month — commonly known as JSP-440, and marked “RESTRICTED” — goes into considerable detail on how, as a serious threat, investigative journalists should be monitored, and effectively thwarted; just the scenario the Project INDECT video could be portraying.

When approached by Wikinews about the implications of using INDECT, a representative of the U.K.’s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded.

Wikinews’ Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too — having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon — The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute. The report raises serious questions about the heavy involvement of defence and IT companies in “security research”.

On the record, Katz answered a few questions for Wikinews.

((WN)) Is this illegal? Is this an invasion of privacy? Spying on citizens?

Eddan Katz When the European Parliament issued the September 5, 2001 report on the American ECHELON system they knew such an infrastructure is in violation of data protection law, undermines the values of privacy and is the first step towards a totalitarian surveillance information society.

((WN)) Who is making the decisions based on this information, about what?

E.K. What’s concerning to such a large extent is the fact that the projects seem to be agnostic to that question. These are the searching systems and those people that are working on it in these research labs do search technology anyway. […] but its inclusion in a database and its availability to law enforcement and its simultaneity of application that’s so concerning, […] because the people who built it aren’t thinking about those questions, and the social questions, and the political questions, and all this kind of stuff. [… It] seems like it’s intransparent, unaccountable.

The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center. In their analysis of the never-officially-recognised U.S. Echelon spy system it states, “[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.” On privacy and data-protection legislation enacted at E.U. level it comments, “[such does] not apply to ‘the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'”.

Part of the remit in their analysis of Echelon was rumours of ‘commercial abuse’ of intelligence; “[i]f a Member State were to promote the use of an interception system, which was also used for industrial espionage, by allowing its own intelligence service to operate such a system or by giving foreign intelligence services access to its territory for this purpose, it would undoubtedly constitute a breach of EC law […] activities of this kind would be fundamentally at odds with the concept of a common market underpinning the EC Treaty, as it would amount to a distortion of competition”.

Ben Hayes’ NeoConoptiocon report, in a concluding section, “Following the money“, states, “[w]hat is happening in practice is that multinational corporations are using the ESRP [European Seventh Research Programme] to promote their own profit-driven agendas, while the EU is using the programme to further its own security and defence policy objectives. As suggested from the outset of this report, the kind of security described above represents a marriage of unchecked police powers and unbridled capitalism, at the expense of the democratic system.”

Leave a comment

Toothpaste fills cavities without drilling

Thursday, February 24, 2005

A paste containing synthetic tooth enamel can seal small cavities without drilling. Kazue Yamagishi and colleagues at the FAP Dental Institute in Tokyo say that the paste can repair small cavities in 15 minutes.

Currently, fillers don’t stick to such small cavities so dentists must drill bigger holes. Hydroxyapatite crystals, of which natural enamel is made, bond with teeth to repair tiny areas of damage.

Yamagishi and colleagues have tested their paste on a lower premolar tooth that showed early signs of decay. They found that the synthetic enamel merged with the natural enamel. The synthetic enamel also appears to make teeth stronger which will improve resistance to future decay. As with drilling, however, there is still the potential for pain: The paste is strongly acidic to encourage crystal growth and causes inflammation if it touches the gums.

The paste is reported in the journal Nature.

Leave a comment

Feminist gathering in Tehran dispersed by police

Tuesday, June 13, 2006

Police dispersed a group of activists who had gathered at the Haft-e Tir square in Tehran on Monday, reportedly using pepper spray and beating up some of the protestors. The group was staging a demonstration calling for equal treatment for women under the Iranian law and better protection of their rights. The Iranian Justice minister Jamal Karimirad later said that 70 people were detained in connection with the event, of whom 42 were women.

He also said that the reports of police beating up the protestors were being reviewed.

The activists were protesting against gender discrimination in Iranian law, which is partly based on the Islamic Sharia law. Women have had the right to vote and be elected to the Majlis (parliament) since 1963, but under the prevailing laws, they are excluded from constitutional posts such as Judge and President and their testimony in court is only worth half of that of a man. Similarly, “Blood Money” or compensation paid to the family of a murdered woman is only half of that for a man. The protestors were calling for equal divorce and custody rights for women, reform of inheritance laws, as well as a ban on polygamy.

Leave a comment

Work Injury Prevention The Basic Concept Of Worker’s Protection Part 1

Submitted by: Stell Guino

Understanding Protection.

Protection here, is a protection system in the form of compensation that is not in the form of monetary or cash, either directly or indirectly, employed by companies to workers. This protection by providing a sense of security, both in the financial, health, and physical safety as workers, so workers can move quietly and can contribute positively to the enhancement value of the company. the protection of workers is a necessity for companies that are required by the government through rules and laws. In implementing protection programs, many employers are working with insurance companies that provide cover to possible health problems, financial or other problems encountered or experienced by workers and his families in the future. Practically, the granting of this protection is not the same quality for each worker, depending on each position and their work’s responsibility.

Factors That Determine Protection Provision of protection between each employee is influenced by various factors namely:

Responsibility

The higher the position an employee in a company, the greater the responsibility upon him. A CEO, a top leader in the enterprise, carry the greatest responsibility to the viability of business enterprises. The higher the responsibility carried by one, the higher the insurance coverage provided by the company. For example, a Manager of Treasury or the Branch Manager of the Bank have a higher responsibility than the Dealer who served in the Dealing Room. Therefore, the degree of protection provided by the company to the Manager of Treasury or the Branch Manager is higher than the Dealer, for example of the quality of health benefits.

[youtube]http://www.youtube.com/watch?v=zEjXSNLzzWE[/youtube]

Skill (Expertise)

For enterprise business continuity, companies need employees who have special expertise. for example, in the field of information technology, the company hire the information technology experts who mastered computer technology. Their expertise is very specific, so as to maintain to keep them working at the company, the company implemented a program worthy of protection and even sometimes above – average that what can be given by competitors. Protection’s program applied to workers who have specialized skills will be higher compared with workers that do not require special expertise, such as clerical workers

Mental Effort (l Brain / Mental)

Employees who rely on the ability of the brain work better. such as analysts, programmers, marketers, or accountant. The working class is often called the “White Collar” worker class is usually obtain a higher degree of protection compared with the working class who rely more on physical strength (Blue Collar)

Physical condition or effort

Employees who rely more on physical strength (Blue Collar), such as security guards (guard), janitors or construction workers. Usually the protection given by the company to them more focused in the form of protection for safety.

Work Conditions

The working conditions are expected by the worker to a single industry sector is often different. For example, working conditions for workers in the field of petroleum, which works in offshore will vary with the working conditions on the ground. The more heavy working conditions faced by workers, the higher the protection programs are implemented.

Government (Government Regulation)

Government as a regulator usually make regulations requiring employers or companies to provide adequate protection for workers. For example, the government oblige companies provide protection for workers through insurance.. Through insurance, the workers laid off, workers who experience accidents during work, will get proper compensation from the insurance. In addition, the government also requires companies to grant leave for worker’s physical and mental refreshment.

Next in part 2, I will explain more about compensation as a worker’s protection

About the Author: copyright(C) stell g tamvoe 2010 For more information about worker’s compensation, work’s injury and work accident compensation claim, visit our blog

injuryatwork.blogspot.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=673177&ca=Finances

Posted in It Services | Leave a comment

New Zealand Tsunami heroes to receive Special Service Medal

Monday, December 26, 2005

A new medal has been created for New Zealanders who helped in recovery efforts after the Boxing Day Tsunami.

Called the New Zealand Special Service Medal (Asian Tsunami) it recognises the work of New Zealanders who went to the region after the tsunami; locating the missing, identifying the dead, and assisting those left behind. Defence Minister Phil Goff says New Zealanders who served in the devastated areas in the first two months after the tsunami, are to receive the medal.

In a provisional list; which was released today; 163 New Zealanders are honoured in which 37 are non-military or police personnel (including aid workers).

Also, forty-seven police officers will receive the honour for their work identifying bodies in Thailand.

Prime Minister Helen Clark said the medal recognised “the special service of those New Zealanders who undertook often harrowing tasks in dangerous conditions”.

Leave a comment

Bangladesh security tightened following Pilkhana massacre and Bashundhara City fire

Friday, March 20, 2009

Following the Pilkhana massacre which occurred February 25 and 26 leaving 74 dead and the inferno at the Bashundhara City shopping mall complex March 13 leaving seven dead, Prime Minister Sheikh Hasina said security measures are being tightened countrywide across Bangladesh.

Fire drills will be enacted at all key-point installations (KPI). Fire fighting systems will be examined by the fire brigade and the public works department (PWD) to ensure functionality. Security measures will be enhanced supplementing areas under private security such as at the Bashundhara City Complex.

The Fire Service and Civil Defence Department requires modernization and needs new equipment to fight fires past the sixth floor of buildings. The Fire Brigade says it needs turntable ladders, snorkels, foam-tenders, lighting units, emergency tenders, fireproof uniforms, and rescue ropes for fire fighting and rescue operations. Transportation to fires is also an issue due to narrow roads, low electrical wires and congestion.

The Bangladesh National Building Code requires fire fighting equipment installed in buildings over seven floors. This code is to be monitored by authorities to ensure compliance with the new guidelines and to make sure buildings are being maintained.

The Bashundhara City Complex opened Monday for shoppers two days after Friday’s blaze. A probe is underway to determine the cause of the fire and to assess structural damage.

Loss of life was minimized as the blaze broke out on a Friday, the beginning of the weekend in Bangladesh, so offices in the upper floors were empty. The lower eight floors are used for shopping and the upper floors are all Bashundhara Group offices.

The mall is valued at Tk 7.0 billion (US$100 million). It is not known if the complex is covered by fire insurance.

It is estimated that it will take over two years to rebuild the area damaged by flames which were burned down to a skeleton. Bashundhara City’s technical advisor, Latifur Rahman, estimated damages at Tk 2.0 billion (US$29m).

Only one television cameraman has been allowed in to film the burnt area. None of the 2,500 shops, cinemas or cafes were burnt by the inferno. The seventh and eighth floors still experience smoke damage, and there was water damage to merchandise.

A three member committee is currently investigating the cause of the fire which will consist of Iqbal Khan Chowdhury, joint secretary of the ministry, representatives of the police, IGP Noor Muhammad, and fire brigade, Director General Abu Nayeem Md Shahidullah. The committee is required to report within the week with their findings. The forensics department is also sifting through the burnt remains.

The Dhaka Chamber of Commerce and Industries has also formed a committee which has begun interviewing witnesses and recording their testimony alongside the government committee.

It has been discovered that 150 closed circuit cameras were not being used when the fire started. Another mystery is why the mall fire fighting system has been found unused.

Why the fire burnt so fiercely is a matter to think….These matters seem to be mysterious

“In the shopping mall there is an ultra-technology elevator which runs even without electricity but we have found that locked,” Iqbal Khan Chowdhury, joint secretary (Police) of the home ministry, said. “Why the fire burnt so fiercely is a matter to think. We have to see if there was any incendiary substance there. These matters seem to be mysterious.”

Mall management has been asked to submit substances and items which would have been in the upper floors when the fire started. The fire erupted on the 17th floor and spread quickly to the two floors above and engulfed the three floors below. The aerial ladders belonging to the Fire Service and Civil Defence reached as high as the 13th floor of the 21-storey building.

Videos have been sent to the United States (US) for examination to assist in determining the cause of the fire and to help in the damage assessment. Experts from the US are expected to arrive soon.

Firefighters were brought to the rooftop of the 20-storey tower by helicopter. The only fatality in this operation was Baki Billa, a firefighter of Bashundhara City firefighting department, who fell when climbing down a rope from a helicopter to the roof of the building. Three other firefighters made the transition safely. At this same time, the chief security officer was safely rescued by the Bangladesh Air Force helicopter, a Bell 212. Six security officers of the complex also lost their lives.

Leave a comment

Benefits Of Social Media Marketing In Los Angeles

byAlma Abell

It is true that if you want your business to succeed you will need to use social media in some way. However, most people in Los Angeles have no idea about social marketing techniques or what to do and they believe they will see results quickly. In most cases, this doesn’t happen or it won’t overnight. It does take time to build up your social media platforms and sometimes it can be hard to see the benefits.

Brand Recognition

Social media is a great brand-building tool. You can potentially position your business and tell people what you want them to know. This can definitely help you build a reputation around your brand and company’s benefits, advantages and values.

Community

Having followers join your community is a great feeling. This means that you have access to them and can find out more about what they want from you and others. This also means you have the potential to reach more people, if your followers share and like your posts.

Exposure

There is an old saying that people must see your product six or eight times before they will decide to purchase it. With social media marketing in Los Angeles, you will definitely be able to give repeat exposure to your brand or service, though you shouldn’t over-expose yourself, either.

Authority

You want people to think of your brand when they think of a question or something specific. For example, if you own a cleaning business, you want people to think of you when they have dirty carpets. If you answer questions, give great content and serve the audience, then you will ultimately build a loyalty base.

Influence

When your audience grows, your influence will also grow. More and more people will want to see what your brand is about and they will visit your page on social media sites, go to your website and more.

Website Traffic

If you share blog posts and videos, along with other content from your website, you can interest the audience into clicking through the post and visiting your site. Once at your website, the potential customer can sign up for your newsletter, purchase an item, or give your company a call. It would be helpful to install traffic monitoring services to see just how much traffic you generate because of social media marketing, as it will help you understand the great benefit you have.

It can be tough to handle your own social media marketing in Los Angeles, but it doesn’t have to be. Visit Top Tier Media today to learn more about them.

Posted in Copywriting | Leave a comment

“Successor to mp3”; MusicDNA founder interviewed

Thursday, February 11, 2010

At the end of January, Bach Technology announced their new music file format, MusicDNA, which was developed as an intended replacement for the mp3 format, which has been the dominant format in music since its inception. MusicDNA uses similar compression methods to mp3, but then also adds an xml file which defines other content that can be included. Wikinews reporter Tristan Thomas caught up with Bach Technology CEO Stefan Kohlmeyer to find out more.

((Wikinews)) Thank you for agreeing to answer our questions.

((WN)) Can you briefly explain what MusicDNA is?

((Stefan Kohlmeyer)) We believe that MusicDNA is the successor to the MP3, the MusicDNA media extension enables music fans to access from one application the wide range of music-related content they want alongside the music itself – from lyrics, artwork and tour dates to blog posts, videos and twitter feeds.

In addition to all this extra content, MusicDNA files are also intelligent, and include extensive audio analysis information for each single track. This means that search and recommendation tools or automatic playlist generators will be much more sophisticated and provide much better results.

((WN)) How long has it been in development and what role has Karlheinz Brandenburg, the man credited with inventing mp3, played in that?

((SK)) In essence MusicDNA in its current context has been in development since the start of the company in 2007. Bach has an important strategic partnership with Fraunhofer IDMT with its CEO Karlheinz Brandenburg who is an important person for us in all research projects and visionary discussions about the development of the music market.

((WN)) Is this just going to be another consumer hurting format war with iTunes LP? What makes MusicDNA better than iTunes LP?

((SK)) Unlike iTunes LP, MusicDNA files have been built on open standards and are completely platform agnostic, which means that, unlike iTunes LP, you’re not tied to one device or media player. So it’s about the opposite of format wars really.

Whilst LP goes some way to adding value to digital music, it is still essentially a static file with some extra content bolted on. MusicDNA not only gives back all the things we lost when we switched to digital formats, lyrics, liner notes, artwork, but crucially it goes beyond that allowing fans to access everything from Twitter feeds and videos through to concert tickets, this will all dynamically update whenever you’re online, so music fans always have the latest information to hand.

Importantly with MusicDNA you can customise single tracks, you’re not restricted to purchasing complete albums as you are with LP.

And because all the additional rich media is integrated into the file (unlike iTunes LP), that content can be easily transferred from one device to another.

Mark Mulligan, vice president and research director of industry analysts Forrester Research recently put it well to the UK’s Telegraph newspaper “innovations like the iTunes LP need to go further. People should pay just once to get everything that artist does over the next year in one file that is regularly updated.”

((WN)) Is this really what listeners want-more clutter to distract from the music itself? What’s wrong with mp3?

We developed MusicDNA based on how people interact with their favourite music and musicians today.

((SK)) A lot of people, especially those who grew up buying music on vinyl and CD, miss the packaging, the liner notes, all the things that went hand in hand with albums, so for them that ‘clutter’ is an important part of the experience. We developed MusicDNA based on how people interact with their favourite music and musicians today, so we’re just following the public’s lead in many ways. MusicDNA enables fans to stay constantly connected with the worlds of their favourite artists in a really convenient way. Importantly, MusicDNA files can be customised so that they contain as little or much extra content as the listener wants.

You have to remember the MP3 was developed over twenty years ago, think of how much has changed in that time. It has had a profound effect on the music industry, but beyond portability it doesn’t actually add anything to the experience, the opposite in fact.

((WN)) Will MusicDNA be any less susceptible to piracy than other formats?

HAVE YOUR SAY
Do you think MusicDNA has a future? Will it replace mp3?
Add or view comments

((SK)) As only paid for files will dynamically update MusicDNA should be an incentive for people to purchase legitimate files rather than downloading them from p2p networks.

Over the last decade a lot of effort has gone into trying to stop piracy through sanctions and enforcement, and, well, the results speak for themselves. We believe in a carrot approach, giving the public what they actually want and a great incentive to go the legit route.

((WN)) Many people argue that music is moving away from being owned and more towards models like Spotify; free, streamed music. Is MusicDNA not too late to the party if this is so?

((SK)) Like many in the industry Bach are of the view that there is no one silver bullet to suit all types of consumer, rather a variety of services will serve different fans with different needs.

There are many occasions when a download is preferable to a stream, and MusicDNA files have the advantage of customised, at your fingertips, rich media available on- and offline. And that is before considering the impact of streaming on growing bandwidth and energy requirements.

((WN)) So when will we start to see MusicDNA and where?

((SK)) Rollout will be staggered over 2010, with the first beta versions available around Easter and the full commercial rollout expected over summer.

((WN)) And finally, your favourite artist at the moment to be released on MusicDNA this year?

((SK)) It’s too early to say, but we’re in talks with some very exciting artists. I would love to see all my old heroes on MusicDNA, starting with Led Zeppelin and The Clash.

((WN)) Thank you again for your time. Good luck with the launch.

Leave a comment