Indaba Music: A Cloud Based Music Network

Indaba Music: A Cloud Based Music Network

In my last article, I discussed the remarkable benefits of using Dropbox to produce, record, and share musical ideas. As if that all wasn’t revolutionary enough, Indaba Music has developed a platform, much like that advanced by SoundCloud, that allows for real-time partnership between musicians from anywhere in the world. Uploading, comments, and collaboration all occur within a shared window and are viewable to the public (only if made public, of course). Most commonly used for remixes and interactive direct-to-consumer projects and competitions by major artists and production companies (Linkin Park, Snoop Dogg, Disney, and Universal, to name a few), any producer or musician can also use Indaba to share, swap and collaborate on musical ideas.

Indaba was established in 2007 with the mission to make it as easy as possible for musicians to network and make music together. A Zulu word, indaba “refers to gathering in order to share ideas, do business, and discuss important matters.” This sense of community is “central to the mission of Indaba Music.” I attended the Indaba launch party at CMJ in 2007, and that feeling of togetherness and resource sharing has truly been the crux of the company’s goals from day one.

music cloud

During the five years since then, however, Indaba has become a place that is far more than a social network of musicians noodling with creative ideas. It has evolved into a breeding ground for careers. Artists now have the tools to learn from their peers, promote and distribute their material, and even license work to outside media such as commercials and TV. Partnerships can be forged between technology experts, artists, producers, and others to make the most out of the ever-changing modern web-based music industry.

Perhaps one of the most exciting parts of Indaba’s platform is the potential for collaboration between major artists and virtually unknown hobbyists. For one of Indaba’s current contests, for example, The Darkness offers the opportunity for fans and collaborators to attempt an “epic guitar solo” over a section of their new single. The winner gets $750, a signed Epiphone guitar, and a veritable grab bag of goodies. Last year my band, Freelance Whales, partnered with Indaba to offer remixers of our single a chance to win a trip to Coachella 2011, as well as $500. Beyond offering artists at home the chance to work together, Indaba offers artists a chance for authentic and productive musical interactions with fans. That ability, previously reserved for open jams, has now – like most things – made its way to our fingertips.

By Jacob Hyman

About Jake

Jacob Hyman has been a musician and writer for nearly his entire life. He has spent decades as a drummer, and has written about music for many reputed publications both in print and online. Jacob is a graduate of George Washington Universitiy, where he honed his witty journalistic style and studied psychology and music -- specifically drum performance. He currently resides in Brooklyn, NY and frequently tours the world with the band Freelance Whales.

View All Articles

Sorry, comments are closed for this post.

Comic
How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…