Indaba Music: A Cloud Based Music Network

Indaba Music: A Cloud Based Music Network

In my last article, I discussed the remarkable benefits of using Dropbox to produce, record, and share musical ideas. As if that all wasn’t revolutionary enough, Indaba Music has developed a platform, much like that advanced by SoundCloud, that allows for real-time partnership between musicians from anywhere in the world. Uploading, comments, and collaboration all occur within a shared window and are viewable to the public (only if made public, of course). Most commonly used for remixes and interactive direct-to-consumer projects and competitions by major artists and production companies (Linkin Park, Snoop Dogg, Disney, and Universal, to name a few), any producer or musician can also use Indaba to share, swap and collaborate on musical ideas.

Indaba was established in 2007 with the mission to make it as easy as possible for musicians to network and make music together. A Zulu word, indaba “refers to gathering in order to share ideas, do business, and discuss important matters.” This sense of community is “central to the mission of Indaba Music.” I attended the Indaba launch party at CMJ in 2007, and that feeling of togetherness and resource sharing has truly been the crux of the company’s goals from day one.

music cloud

During the five years since then, however, Indaba has become a place that is far more than a social network of musicians noodling with creative ideas. It has evolved into a breeding ground for careers. Artists now have the tools to learn from their peers, promote and distribute their material, and even license work to outside media such as commercials and TV. Partnerships can be forged between technology experts, artists, producers, and others to make the most out of the ever-changing modern web-based music industry.

Perhaps one of the most exciting parts of Indaba’s platform is the potential for collaboration between major artists and virtually unknown hobbyists. For one of Indaba’s current contests, for example, The Darkness offers the opportunity for fans and collaborators to attempt an “epic guitar solo” over a section of their new single. The winner gets $750, a signed Epiphone guitar, and a veritable grab bag of goodies. Last year my band, Freelance Whales, partnered with Indaba to offer remixers of our single a chance to win a trip to Coachella 2011, as well as $500. Beyond offering artists at home the chance to work together, Indaba offers artists a chance for authentic and productive musical interactions with fans. That ability, previously reserved for open jams, has now – like most things – made its way to our fingertips.

By Jacob Hyman

About Jake

Jacob Hyman has been a musician and writer for nearly his entire life. He has spent decades as a drummer, and has written about music for many reputed publications both in print and online. Jacob is a graduate of George Washington Universitiy, where he honed his witty journalistic style and studied psychology and music -- specifically drum performance. He currently resides in Brooklyn, NY and frequently tours the world with the band Freelance Whales.

View All Articles

Sorry, comments are closed for this post.

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…