Cloud B-Sides: The End Of The Album

Cloud B-Sides: The End Of The Album

Cloud B-Sides: The End Of The Album

cloud computing music

For most of the history of music, composers wrote long pieces of art, which were then consumed by discerning listeners in the manner in which they were intended…as one long stream of music consciousness. This is a concept that reaches back to Gregorian Chants, through Wagner’s Der Ring das Nibelungen, and as far forward as modern classics such as Radiohead’s OK Computer or Arcade Fire’s The Suburbs. The work of art is the sum of its parts, as a painting is the result of hundreds and thousands of brush strokes or a book is simply a compilation of words on pages.

The album – the piece, the work in its entirety – is nearing its extinction. With the rise of digital music, and the subsequent fall of our attention spans, listeners developed new and previously unprecedented habits: skipping tracks. iTunes libraries are notoriously difficult to keep neat…unless you’re as obsessed as I am with a tidy collection full of only complete albums. The iTunes Store also encourages the purchase of singles, as do record labels, in an interest to cater to the quickest dollar. This is compounded by the fact that commercial radio has maintained its three-decade strangle hold on most of the country’s listening habits, and is still force-feeding single after single down our throats with no regard for decency, either human or musical.

Lo and behold! The end of the album as we know it. The icing on the cake is what has become of the digital music revolution…the “cloud.” Artists and listeners alike have taken to hosting their music on the internet in an effort to satisfy the demands of a public in constant need of instant gratification. The day a single comes out, it is streaming on SoundCloud, where it remains for all to access and listen to ad nauseum free of charge. This easy and unlimited access devalues songs and desensitizes listeners to such a point that the album itself becomes virtually irrelevant. Unless an artist can pump out a dozen songs like “Call Me Maybe” or “We Are Young,” there’s no hope of listeners paying attention long enough to recall the name of the band or song they just listened to. Before they can commit it to memory, they’re on to the next track.

If I sound somewhat cynical and bitter – even nostalgic – about this topic, it’s because I enjoy experiencing entire works of art so much. There is much to be said for the value of a good pop song. But without the challenge of a long, well-crafted album, that pop song just seems to have an unfair advantage in today’s digital world of instant cloud streaming and shortening attention spans.

By Jacob Hyman

About Jake

Jacob Hyman has been a musician and writer for nearly his entire life. He has spent decades as a drummer, and has written about music for many reputed publications both in print and online. Jacob is a graduate of George Washington Universitiy, where he honed his witty journalistic style and studied psychology and music -- specifically drum performance. He currently resides in Brooklyn, NY and frequently tours the world with the band Freelance Whales.

View All Articles

Sorry, comments are closed for this post.

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…