Cloud B-Sides: The End Of The Album

Cloud B-Sides: The End Of The Album

Cloud B-Sides: The End Of The Album

cloud computing music

For most of the history of music, composers wrote long pieces of art, which were then consumed by discerning listeners in the manner in which they were intended…as one long stream of music consciousness. This is a concept that reaches back to Gregorian Chants, through Wagner’s Der Ring das Nibelungen, and as far forward as modern classics such as Radiohead’s OK Computer or Arcade Fire’s The Suburbs. The work of art is the sum of its parts, as a painting is the result of hundreds and thousands of brush strokes or a book is simply a compilation of words on pages.

The album – the piece, the work in its entirety – is nearing its extinction. With the rise of digital music, and the subsequent fall of our attention spans, listeners developed new and previously unprecedented habits: skipping tracks. iTunes libraries are notoriously difficult to keep neat…unless you’re as obsessed as I am with a tidy collection full of only complete albums. The iTunes Store also encourages the purchase of singles, as do record labels, in an interest to cater to the quickest dollar. This is compounded by the fact that commercial radio has maintained its three-decade strangle hold on most of the country’s listening habits, and is still force-feeding single after single down our throats with no regard for decency, either human or musical.

Lo and behold! The end of the album as we know it. The icing on the cake is what has become of the digital music revolution…the “cloud.” Artists and listeners alike have taken to hosting their music on the internet in an effort to satisfy the demands of a public in constant need of instant gratification. The day a single comes out, it is streaming on SoundCloud, where it remains for all to access and listen to ad nauseum free of charge. This easy and unlimited access devalues songs and desensitizes listeners to such a point that the album itself becomes virtually irrelevant. Unless an artist can pump out a dozen songs like “Call Me Maybe” or “We Are Young,” there’s no hope of listeners paying attention long enough to recall the name of the band or song they just listened to. Before they can commit it to memory, they’re on to the next track.

If I sound somewhat cynical and bitter – even nostalgic – about this topic, it’s because I enjoy experiencing entire works of art so much. There is much to be said for the value of a good pop song. But without the challenge of a long, well-crafted album, that pop song just seems to have an unfair advantage in today’s digital world of instant cloud streaming and shortening attention spans.

By Jacob Hyman

About Jake

Jacob Hyman has been a musician and writer for nearly his entire life. He has spent decades as a drummer, and has written about music for many reputed publications both in print and online. Jacob is a graduate of George Washington Universitiy, where he honed his witty journalistic style and studied psychology and music -- specifically drum performance. He currently resides in Brooklyn, NY and frequently tours the world with the band Freelance Whales.

View All Articles

Sorry, comments are closed for this post.

Comics
Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…