Is Content Publishing in Bittorrent Altruistic Or Profit-Driven

Total Page:16

File Type:pdf, Size:1020Kb

Is Content Publishing in Bittorrent Altruistic Or Profit-Driven Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Michal Kryczka Angel Cuevas Univ. Carlos III de Madrid Institute IMDEA Networks and Univ. Carlos III de Madrid [email protected] Univ. Carlos III de Madrid [email protected] [email protected] Sebastian Kaune Carmen Guerrero Reza Rejaie TU Darmstadt Univ. Carlos III de Madrid University of Oregon [email protected] [email protected] [email protected] ABSTRACT ity [9, 15, 12] and improving its performance [18, 14]. BitTorrent is the most popular P2P content delivery appli- Moreover, some few papers have analyzed the demo- cation where individual users share various type of content graphics of BitTorrent [21, 11, 19] and also the secu- with tens of thousands of other users. The growing popular- rity [20] and privacy issues [6, 7]. However, the socio- ity of BitTorrent is primarily due to the availability of valu- economic aspects associated to BitTorrent in particular, able content without any cost for the consumers. However, and to other P2P file sharing systems in general, have apart from required resources, publishing (sharing) valuable received little attention despite of the importance that (and often copyrighted) content has serious legal implica- they have to the complete understanding of such kind of tions for user who publish the material (or publishers). This applications. This paper is a first step in this direction. raises a question that whether (at least major) content pub- The availability of free popular (often copyrighted) lishers behave in an altruistic fashion or have other incen- content that is of interest to millions of people (e.g. re- tives such as financial. In this study, we identify the content cent TV Shows episodes, Hollywood movies, etc) is the publishers of more than 55k torrents in 2 major BitTorrent key pillar that makes BitTorrent an extremely success- portals and examine their behavior. We demonstrate that a ful system. In this paper we study content publishing small fraction of publishers are responsible for 66% of pub- in BitTorrent from a technical and more importantly lished content and 75% of the downloads. Our investigations socio-economic point of view. In short, we try to un- reveal that these major publishers respond to two different ravel who publishes content in BitTorrent, and why. profiles. On one hand, antipiracy agencies and malicious For this purpose we rely on real data from a large publishers publish a large amount of fake files to protect scale measurement study performed over two large Bit- copyrighted content and spread malware respectively. On Torrent Portals (Mininova and The Pirate Bay). Our > the other hand, content publishing in BitTorrent is largely dataset ( 300 GB) consits of information on more than driven by companies with financial incentive. Therefore, if 35M IP addresses and more than 55K published con- these companies lose their interest or are unable to publish tents including the content publisher. content, BitTorrent traffic/portals may disappear or at least Using this dataset, we have first looked at the contri- arXiv:1007.2327v2 [cs.NI] 22 Jul 2010 their associated traffic will significantly reduce. bution of the different content publishers and conclude that just few publishers (around 100) are responsible Keywords of uploading 2/3 of the contents that serve 3/4 of the downloads in our major dataset. Furthermore, an im- BitTorrent, content publishing, business model portant part of these major publishers consume few or even no contents, rather they dedicate their resources 1. INTRODUCTION (almost) to only seed the published content. This is un- Peer to Peer (P2P) file-sharing applications, and more usual behavior since standard BitTorrent users typically specifically BitTorrent, are a clear example of killer ap- employ their resources for both seeding and download- plications in the last decade. For instance, BitTorrent ing contents. Therefore, our observation reveals that is currently used by hundreds of millions of users and major BitTorrent publishers present an anomalous be- is responsible for a large portion of the Internet traf- havior. This argument is reinforced after checking that fic share [4]. This has attracted the attention of the many of the files published by these major publish- research community that has mainly focused on under- ers are copyrighted. Then, major publishers not only standing the technical aspects of BitTorrent functional- expend their resources without any apparent benefit, 1 but they also face legal reactions due to the publica- • profit-driven top publishers own fairly profitable tion of copyrighted content [1, 2]. These findings raise web sites. They use major BitTorrent portals such the following questions: are these major publishers good as The Pirate Bay as a platform to advertise their citizenships that allocate a great deal of resources and web site to millions of users. For this purpose they assume legal risk for the good of the community? or publish popular torrents where they attach the contrary, do they have any (still) unknown incentive to URL of their web site in various manners. The behave in this manner? publishers linked to this business model are re- To answer these questions we perform a systematic sponsible of around 30% of content and 40% of study of the aforementioned major publishers. We first downloads. discover the identity of these major publishers by look- The rest of the paper is organized as follows. Section ing at their associated usernames and IPs. This allows 2 describes our measurement methodology. Sections 3 us to classify them into two different groups: fake pub- and 4 are dedicated to the identification of major pub- lishers publish a large number of fake content and top lishers and their main characteristics (i.e. signature) re- publishers publish a large number of proper (often copy- spectively. In Section 5 we study the incentives that righted) content. major publishers have to perform this activity. Section Afterwards we study main characteristics of these 6 presents other players that also benefit from content groups such as the popularity of the content they pub- publishing. In Section 7 we describe our publicly avail- lish and their seeding behavior (i.e. its signature). One able application to monitor content publishing activity one hand, our results reveal that the falseness of the in The Pirate Bay portal. Finally Section 8 discusses content published by fake publishers makes their swarms related work and Section 9 concludes the paper. unpopular and obeys them to seed multiple torrents in . parallel across long sessions. On the other hand, top 2. MEASUREMENT METHODOLOGY publishers are responsible of very popular contents for which they guarantee a proper seeding. This section describes our methodology to identify Finally we exploit the available information related the initial publisher of a file that is distributed through to these publishers (e.g. in the BitTorrent portals) and a BitTorrent swarm. Towards this end, we first briefly conclude that fake publishers are linked to antipiracy describe the required background on how a user joins a agencies and malicious users, whereas half of top pub- BitTorrent swarm. lishers run their own web sites that report them eco- Background: A BitTorrent client takes the following X nomical benefits that are very substantial in some few steps to join the swarm associated with file . First, the cases. client obtains the .torrent file associated to the desired In summary the main contributions of this paper are: swarm. The .torrent file contains contact information for the tracker that manages the swarm and the number • A simple measurement methodology to monitor of pieces of file X, etc. Second, the client connects to the content publishing activity in major BitTor- the tracker and obtains the following information: (i) rent portals. This methodology has been used to the number of seeders and leechers that are currently implement a system that continuously monitors connected to the swarm, and (ii) N (typically 50) ran- the content publishing activity in The Pirate Bay dom IP addresses of participating peers in the swarm. portal. The data gathered is made publicly avail- Furthermore, if the number of neighbors is eventually able through a web interface. lower than a given threshold (typically 20), the client contacts the tracker again to learn about other peers in • The major portion of content publishing activity the swarm. in BitTorrent is concentrated in a relative small To facilitate the bootstrapping process, the .torrent set of publishers (around 100) that are responsi- files are typically indexed at BitTorrent portals. Some ble of 2/3 of the published content and 3/4 of the of the major portals (e.g. The Pirate Bay or Mininova) downloads. This set of publishers can be further index millions of .torrent files [21], classify them into divided into three subsets that we name fake pub- different categories and provide a web page with de- lishers, altruistic top publishers and profit-driven tailed information (content category, publisher’s user- top publishers. name, file size, and file description). These portals also • fake publishers are set up by either anti-piracy offer an RSS feed to announce a newly published file. agencies or malicious users and are responsible of The RSS gives also some extra information such as con- 30% of the content and 25% of downloads. This tent category, content size and username that published means that these publishers sustain a continuous the .torrent file. poisoning-like index attack [16] against BitTorrent Identifying Initial Publisher: In BitTorrent a con- portals that based on our results affects to millions tent publisher is identified by its username [21] and IP of downloaders. address. The objective of our measurement study is to 2 Portal Start End #Torrents #IP addresses rate that is allowed by the tracker (i.e.
Recommended publications
  • Searching for Malware in Bittorrent∗
    Searching for Malware in BitTorrent∗ Andrew D. Berns and Eunjin (EJ) Jung April 24, 2008 Abstract One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many different changing technologies, in- cluding recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTor- rent. This project explored BitTorrent for the presence of malware, and discovered a significant portion of malware in the downloaded file set. Statistics on torrents infected with malware were gathered and analyzed to find patterns that are helpful in creating basic filtering heuristics. While these heuristics may work in simple cases, several easy ways they can be defeated were found. 1 Introduction Recently, peer-to-peer networks have emerged as a popular paradigm for Internet applications. In fact, a study in 2005 estimated that P2P traffic accounted for around 70% of all traffic on the Internet [2]. P2P technology is finding new applications as it grows, including voice-over-IP systems and streaming video delivery. While P2P has found several different uses, perhaps the most widely-known use is for file sharing. One concern with P2P file sharing is that it can be used to distribute malware (malicious software, such as worms, viruses, and rootkits). On the one hand, users have access to huge amounts of data, while on the other hand, this data can easily be tainted with viruses, worms, and other forms of malware. An important consideration, then, is if the concern about malware in P2P networks is warranted, and if it is, are there ways to protect a computer and minimize the risk of malware infection from P2P networks.
    [Show full text]
  • Detecting Pedophile Activity in Bittorrent Networks
    Detecting Pedophile Activity in BitTorrent Networks Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, and Noa Zilberman School of Electrical Engineering, Tel-Aviv University, Israel Abstract. The wide spread of Peer-to-Peer networks makes multime- dia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal material, while keeping the source of the data and the acquiring users anonymous. In this paper we analyze activity measurements in the BitTorrent network and examine child sex abuse activity through the Mininova web portal. We detect and characterize pedophilic material in the network, and also analyze differ- ent aspects of the abusers activity. We hope our results will help law enforcement teams detecting child molesters and tracking them down earlier. 1 Introduction Peer-to-peer networks are being widely used around the world by millions of users for sharing content. The anonymity provided by these networks makes them prone to sharing illegal contents, from simple copyright protected material to highly dangerous material, as will be discussed next. The BitTorrent file sharing network was responsible for 27% to 55% of in- ternet traffic (depending on geographic location) in 2009 [13]. The BitTorrent protocol allows to download large files without loading a single source computer, rather the downloading users join a group of hosts that download and upload from each other, simultaneously. Every BitTorrent file is uniquely defined by a descriptor file called a torrent, which is distributed via email or http websites. This torrent file allows the downloading and uploading users, called leechers and seeders, to share the content file.
    [Show full text]
  • A Torrent of Copyright Infringement? Liability for Bittorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law
    A Torrent of Copyright Infringement? Liability for BitTorrent File-Sharers and File-Sharing Facilitators Under Current and Proposed Canadian Copyright Law Allen Mendelsohn Faculty of Law McGill University Montreal August 2010 A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Master of Laws (LL.M.) © Allen Mendelsohn 2010 ABSTRACT [Le résumé français suit l'anglais.] BitTorrent has become the primary means to share large files (movies, television shows, and music) over the internet. Canadian copyright law and jurisprudence have not kept pace with technology, and as a result there is no definitive pronouncement on the liability for copyright infringement of BitTorrent file- sharers, i.e. users, and file-sharing facilitators, i.e. Internet Service Providers (ISPs) and torrent search engines. Extrapolating from existing law and Canadian and foreign jurisprudence, I conclude that: (i) BitTorrent file-sharers are liable although there may be situations where fair dealing could apply; (ii) it may be possible to show ISPs are liable based on certain findings of fact; and (iii) torrent search engines should not be liable for infringement. There have been three successive attempts to reform copyright law that have addressed internet issues generally and file-sharing in particular. Under the most recent attempt, Bill C-32, file-sharers would be liable under the new ―making available‖ right, and file- sharing facilitators could be liable under the new ―enabling‖ concept of secondary infringement introduced with the bill. RÉSUMÉ BitTorrent est devenu le principal moyen de partager des fichiers volumineux (films, émissions de télévision et musique) sur Internet.
    [Show full text]
  • Bittorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W
    BitTorrent Darknets Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu and Keith W. Ross Woonhak Kang 2010. 11. 04 VLDB Lab. [email protected] Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 2 SKKU VLDB Lab. Introduction • Darknet § 비공개 토런트 사이트(private torrent sites) § 가입자에게만 공개 § 초대(inviatation), 사이트 임시 가입기간에 가입 § 사용자의 upload, download 크기를 기록 - up/down 비율을 통해 사용자의 이용제한 - up/down 비율이 높은 유저에게 혜택 • Motivation § 연구분야에서 큰 주목을 받지 못했다. § 독특한 정책 때문에 공개 토런트와 특성이 다르다. § 토런트 전체 시스템의 이해를 위해서는 공개/비공개 모두를 고려할 필요 가 있다 3 SKKU VLDB Lab. Introduction • Analysis § Macroscopic - 800개 이상의 비공개 토런트 분석 - Sharky list 와 Alexa rank 이용 - 전체 토런트 파일, 유저, 피어(peer) 정보 분석 § Medium-scopic - 4개의 인기 비공개 토런트 분석 - 트랙커(trackers), 피어(peer), 유저, 실제 공유파일 분석 - 공개 사이트와 비공개 사이트간의 상관관계 § Microscopic - HDChina 분석 - 유저의 up/down 기록, 활동시간 조사 4 SKKU VLDB Lab. Contents • Introduction • BitTorrent (Background) § Architecture and Term. § Public and Private torrent sites • Overview of BitTorrent Darknets Operation • Analysis § Macroscopic § Medium-scopic § Microscopic • Conclusion 5 SKKU VLDB Lab. BitTorrent (Background) • Bittorrent is a system for efficient and scalable replication of large amounts of static data § Scalable - the throughput increases with the number of downloaders § Efficient - it utilises a large amount of available network bandwidth • The file to be distributed is split up in pieces and an SHA-1 hash is calculated for each piece 6 SKKU VLDB Lab. BitTorrent (Background) • A metadata file (.torrent) is distributed to all peers § Usually via HTTP • The metadata contains: § The SHA-1 hashes of all pieces § A mapping of the pieces to files § trackers reference 7 SKKU VLDB Lab.
    [Show full text]
  • Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies
    Quantifying the Heterogeneous Effects of Piracy on the Demand for Movies Zhuang Liu∗ University of Western Ontario February 10, 2019 Latest Version: http://publish.uwo.ca/~zliu328/jobmarketpaper.pdf Abstract The debate on digital piracy has attracted significant public attention. An accurate estimate of the loss due to piracy relies crucially on correctly identi- fying the substitution between pirated and paid consumption. Using a novel dataset of weekly piracy downloads collected from the BitTorrent network, I estimate a random-coefficient logit demand model of movies to quantify the effect of movie piracy on movie revenue from two distribution channels: box office and DVD sales. Counterfactual results reveal that digital piracy has het- erogeneous effects on different channels of sales. When all piracy is removed, US box office revenue will only increase by 2.71% ($ 231 million) while US DVD sales will increase by 36% ($ 527 million) over 40 weeks in 2015. In addition, the effects on sales differ substantially by quality of pirated videos. I find strong evidence that one movie's piracy have negative indirect effects on other movie's revenue. Decomposition exercises show that the magnitude of piracy's indirect effects is much larger than the direct effects on its own rev- enue. Lastly, I allow piracy to have potentially positive effects on sales through word of mouth (WOM). The positive WOM effects from all pirated consump- tion have relatively moderate contributions to the industry revenue amounted to $ 68.7 million over 40 weeks in 2015. ∗This paper was previously titled \A Structural Model of Movie Piracy with Word-of-mouth", \Estimating the Effects of fil-sharing on Movie Box office".
    [Show full text]
  • Communications Network Traffic Data : Technical and Legal Aspects
    Communications network traffic data : technical and legal aspects Citation for published version (APA): Fischer, J. C. (2010). Communications network traffic data : technical and legal aspects. Technische Universiteit Eindhoven. https://doi.org/10.6100/IR689860 DOI: 10.6100/IR689860 Document status and date: Published: 01/01/2010 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal.
    [Show full text]
  • Free Riding in Bittorrent Is Cheap
    Free Riding in BitTorrent is Cheap Thomas Locher1, Patrick Moor2, Stefan Schmid1, Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert, schmiste, wattenhofer}@tik.ee.ethz.ch 2 Google Inc., Mountain View, CA 94043, USA [email protected] ABSTRACT while seeders (“altruistic peers”) clearly offer the oppor- tunity to freeload, we are even able to download content While it is well-known that BitTorrent is vulnerable to self- quickly if we ignore seeders and download solely from ish behavior, this paper demonstrates that even entire files other peers that do not possess all pieces of the desired can be downloaded without reciprocating at all in BitTor- content (leechers). This implies that the basic piece ex- rent. To this end, we present BitThief, a free riding client change mechanism does not effectively restrain peers from that never contributes any real data. First, we show that freeloading. simple tricks suffice in order to achieve high download Sharing communities are also investigated in this paper. rates, even in the absence of seeders. We also illustrate By banning users with constantly low sharing ratios or by how peers in a swarm react to various sophisticated at- denying them access to the newest torrents available, such tacks. Moreover, our analysis reveals that sharing com- communities encourage users to upload more than they munities—communities originally intended to offer down- download, i.e., to keep their sharing ratio above 1. We will loads of good quality and to promote cooperation among show that sharing communities are particularly appealing peers—provide many incentives to cheat.
    [Show full text]
  • Ran Category Site Clic S -- ALL Blitz Torrentup 99999 -- ALL Torrent Galoreup
    Ran Category Site Clic s -- ALL BlitzTorrentUP http://www.blitztorrents.com 99999 -- ALL TorrentGaloreUP http://www.torrentgalore.com 99999 -- ALL ToorgleTorrentUP http://www.toorgle.com 99999 -- ALL XpressTorrentsUP http://www.xpresstorrents.com 99999 1 ALL IsoHuntUP http://isohunt.com 31345 2 ALL ThePirateBayUP http://www.thepiratebay.org 27341 3 ALL ExtraTorrentUP http://extratorrent.com 25777 4 ADULT NuTorrentUP http://www.nutorrent.com 19937 5 ADULT SexyBitsUP http://www.sexybits.net 15115 6 ALL TorrentReactorUP http://www.torrentreactor.net 13230 7 ADULT PussyTorrentsUP http://www.pussytorrents.org 12898 8 ALL DemonoidUP http://www.demonoid.com 11522 9 ALL Kic AssTorrentsUP http://www. at.ph 10018 10 ADULT PureTnAUP http://www.puretna.com 9600 11 ADULT PornEVOUP http://www.pornevo.com 9378 12 ADULT EmporniumUP http://empornium.us 7751 13 ALL TorrentDownloads.NetUP http://www.torrentdownloads.net 7656 14 ADULT BootyTapeUP http://www.bootytape.com 6083 15 ALL XpressTorrentsUP http://xpresstorrents.com 5887 16 ADULT NavyTorrentUP http://www.navytorrent.com 5580 17 ALL Torrent.BitUP http://www.torrentbit.net 5339 18 ADULT DeviloidUP http://www.deviloid.net 5100 19 ADULT GirlOnGirlUP http://girlongirltorrents.com 4967 20 ADULT CheggitUP http://cheggit.net 4505 21 ALL Bittorrent.amUP http://www.bittorrent.am 4279 22 ALL BitWi iUP http://www.bitwi i.org 4221 23 ALL iTorrentUP http://itorrent.tv 4200 24 ALL mininovaUP http://www.mininova.org 3638 25 EBOOKS Eboo TorrentLibraryUP http://eboo torrentlibrary.info/index.php 3017 26 ALL TorrentSupremeUP
    [Show full text]
  • Torrentfreak
    TorrentFreak Home Contact About Archives Forum Documentary Filmmaker Supports BitTorrent Uploader Written by enigmax on May 14, 2009 When a filmmaker first discovered that his new movie had leaked to the Internet, he was pretty upset. However, this creator has some hacker friends who persuaded him to feel more relaxed about reaching a whole new audience. Right now, he is embracing file-sharing and even the uploader who released his work via BitTorrent sites. Help a Childrens Cause Join Trident in Being Part of the Solution. Make a Difference Today! TridentGum.com Online Films Watch & Share your passion 4 Movies Press Play on Babelgum: 100% Free! www.Babelgum.com/Films HD Video Productions Superior digital video productions Professional and high quality. www.sparkplughd.com Last week, ‘godcanjudgeme‘, a prolific uploader to Demonoid, The Pirate Bay, Mininova and OneBigTorrent, made another upload to add to his long list of releases, but this one turned out a little differently to all the others. Blue Gold : World Water Wars from director Sam Bozzo is a movie about one of planet earth’s most precious resources – water. It examines the ‘future’ for water and how various corporations are plotting to control its supply, how governments use water for political gain and how the control of this essential liquid could be the source of future military conflicts. Of course, when anyone uploads a movie to the Internet in breach of copyright, there is always the chance of a different type of conflict – one with the entertainment companies and their anti-piracy allies. However, this particular movie is independent and less likely to attract that type of attention.
    [Show full text]
  • Peer-To-Peer Applications: from Bittorrent to Privacy
    Peer-to-Peer Applications : From BitTorrent to Privacy Arnaud Legout To cite this version: Arnaud Legout. Peer-to-Peer Applications : From BitTorrent to Privacy. 3rd cycle. 2010. cel- 00544132v1 HAL Id: cel-00544132 https://cel.archives-ouvertes.fr/cel-00544132v1 Submitted on 7 Dec 2010 (v1), last revised 6 Jan 2012 (v2) HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Peer-to-Peer Applications Arnaud Legout INRIA, Sophia Antipolis, France Projet Planète Email: [email protected] This work is licensed under the Creative Commons version 1 BY-NC-SA License. To view a copy of this license, visit December 2010 http://creativecommons.org/licenses/by-nc-sa/3.0/ Outline Overview . What is a P2P application? . Popularity of P2P applications? Content Replication BitTorrent Security Localization 2 Arnaud Legout © 2010 Definition: Overlay Overlay Network . Network at the application layer (layer 7) 3 Arnaud Legout © 2010 Definition: Overlay Formed by communicating among themselves . Dedicated machines . End-users Types of overlay . General purpose overlay (application-layer multicast) . Application specific overlay (CDN) Overlay construction . Network topology . Network metrics (delay, bandwidth, etc.) 4 Arnaud Legout © 2010 Definition: Overlay Why do we need overlays? .
    [Show full text]
  • Mininova Software Editor Download
    1 / 2 Mininova Software Editor Download Novation presents MiniNova, a powerful and compact synthesizer that ... allows a simple management of the patch library through a special free software plug-in. ... Arpeggiator with the possibility of real-time editing of rhythmic performances ... of the parent company's website from which you can download all the complete .... Looptv.net/ ‪bring you ‬this tutorial and review on Novations new Hardware Synth and Software Editor UltraNova from ProducerTech.com s Rob Jones. Novation .... Tim from the Novation Tech Support team shows you an overview of the UltraNova Software Editor plug-in .... The software works as a plug-in within your DAW and allows full editing of your MiniNova ... MiniNova has a powerful sound engine for a micro synth. ... Download free soundpacks which have been created by artists and sound designers.. Jan 28, 2021 — The Novation MoroderNova, above, is a new version of the MiniNova that is ... You can log into your Novation account here and download the patches ... EQ and our very own gater 'stutter' effect, Editing Software and Patch .... That's why we've created the MiniNova Editor: software that gives you visual access ... Download regular free sound packs created by eminent artists and sound .... Audio Workstation or DAW). Included with the Editor download package, the UltraNova. Librarian is a separate dedicated software application, which provides a .... Dec 12, 2011 · UltraNova firmware update is available to download now. ... The software editor enables detailed visual editing of UltraNova on your Mac or PC. ... Novation MiniNova 37-mini-key Synthesizer/Vocoder Novation MiniNova .... This software package includes the latest Novation USB driver, MiniNova editor and MiniNova librarian.
    [Show full text]
  • Economic Insight 10
    Economic Insight Issue 10 29.07.08 In Rainbows, on Torrents Prepared by Will Page, Radiohead's 'In Rainbows', their seventh Rainbows entered the UK Album Chart, United Chief Economist MCPS-PRS Alliance World Chart and the U.S. Billboard 200 at and Eric Garland, album and first in over four years, CEO Big Champagne marked a paradigm shift for the music number one. industry. Here was an established rock Surprisingly, all the media hysteria surrounded band, free from its recording contract the speculation of the 'average price paid' for In with EMI, delivering content directly to Rainbows, yet this could be viewed as missing the consumer. Commencing on the 10th some of the wider objectives of the project. One of October 2007 with a 'pay what you example can be analysed here: namely, that want' downloadable album, this was InRainbows.com set out to redirect the inevitable followed by a 'made to order' deluxe box torrent traffic that would (have) taken place with set and then concluded with a any high profile album release (back) towards the conventional CD and iTunes release. bands official website. From a management perspective, this could be paraphrased as 'if About Eric Garland Whilst the project has gathered Eric Garland is co-founder and Chief Executive you're not going to pay for the record, then at Officer of BigChampagne Media Measurement, a unprecedented worldwide media privately-held technology and metrics company least give us your email addresses - as this specialising in online media. At present, coverage, with much speculation on provides a 'currency' of its own when planning BigChampagne's available metrics include online what the 'average price paid' might have retailers (iTunes), social networks (MySpace, tours, and other promotional activities'.
    [Show full text]