Matérialité Et Travail Institutionnel Des Consommateurs. Le Cas De L’Industrie De La Musique Enregistrée Face À La ”Dématérialisation” (1994-2014) Anne Vancaelemont

Total Page:16

File Type:pdf, Size:1020Kb

Matérialité Et Travail Institutionnel Des Consommateurs. Le Cas De L’Industrie De La Musique Enregistrée Face À La ”Dématérialisation” (1994-2014) Anne Vancaelemont Matérialité et travail institutionnel des consommateurs. Le cas de l’industrie de la musique enregistrée face à la ”dématérialisation” (1994-2014) Anne Vancaelemont To cite this version: Anne Vancaelemont. Matérialité et travail institutionnel des consommateurs. Le cas de l’industrie de la musique enregistrée face à la ”dématérialisation” (1994-2014). Gestion et management. Université Paris sciences et lettres, 2016. Français. NNT : 2016PSLED039. tel-01526687 HAL Id: tel-01526687 https://tel.archives-ouvertes.fr/tel-01526687 Submitted on 23 May 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’Université Paris-Dauphine Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) École Doctorale de Dauphine — ED 543 Spécialité Sciences de gestion COMPOSITION DU JURY : Isabelle HUAULT Professeure, Université Paris Dauphine Directrice de thèse François-Xavier de VAUJANY Professeur, Université Paris Dauphine Président du jury Eva BOXENBAUM Professeure, Ecole des Mines Paristech Rapporteure Philippe MONIN Professeur, EM Lyon Rapporteur Soutenue le 5 déc. 2016 Gazi ISLAM par Anne VANCAELEMONT Professeur associé, Grenoble EM Membre du jury Dirigée par Isabelle HUAULT L’Université n’entend donner aucune approbation ni improbation aux opinions émises dans les thèses : ces opinions doivent être considérées comme propres à leurs auteurs. 1 2 Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) Anne Vancaelemont Sous la Direction de Isabelle Huault REMERCIEMENTS …………………………………………………………………………..…. 5 TABLE DES MATIERES …………………………………………………………………………. 8 INTRODUCTION ……………………………………………………………………..……….. 17 PREMIERE PARTIE : CADRE CONCEPTUEL CHAPITRE 1 : APPREHENDER L'ACTION DU CONSOMMATEUR ……………………………….. 31 CHAPITRE 2 : PRENDRE EN CONSIDERATION LA MATERIALITE ……………………..………… 55 CHAPITRE 3 : PROBLEMATISATION ET PROBLEMATIQUE ………………………………….…. 71 DEUXIEME PARTIE : CONTEXTE EMPIRIQUE ET METHODE CHAPITRE 4 : L'INDUSTRIE DE LA MUSIQUE ENREGISTREE EN FRANCE (1994-2014) …….…. 87 CHAPITRE 5 : METHODOLOGIE …………………………………………………………….. 147 TROISIEME PARTIE : RESULTATS ET DISCUSSION CHAPITRE 6 : RESULTATS (1/3) – LE TEMPS DU MAINTIEN DES VENTES DE CD (1994-2001) - QUAND SE MANIFESTENT ET SONT POINTES DU DOIGT LES PREMIERS CONSOMMATEURS PIRATES ……………………………………………………………………………. 179 CHAPITRE 7 : RESULTATS (2/3) – LE TEMPS DE LA « PIRATERIE » MP3 (2002-2010) - QUAND LES PRATIQUES « PIRATES » DES CONSOMMATEURS SE DIFFUSENT …….…. 209 CHAPITRE 8 : RESULTATS (3/3) – LE TEMPS DE L’INSTITUTIONNALISATION (2011-…) - QUAND LES PRODUCTEURS S’APPROPRIENT LES NOUVELLES PRATIQUES DE CONSOMMATION ………………………………………………………...…………. 257 CHAPITRE 9 : DISCUSSION, CONCLUSION, LIMITES ET VOIES DE RECHERCHE ……………… 289 3 LISTE DES TABLEAUX ET FIGURES ………………………………………………………….. 307 BIBLIOGRAPHIE …………………………………………………………………………….. 309 TABLE DES ANNEXES ……………………………………………………………….……... 327 4 Remerciements En préambule à l’exposé de mon travail de thèse, je tiens à remercier toutes les personnes qui m’ont accompagnée, soutenue, conseillée, ont répondu à mes questions ou tout simplement écoutée tout au long de mes années de Doctorat. Tout d’abord, ma reconnaissance inconditionnelle s’adresse à ma directrice de thèse, le Professeur Isabelle Huault qui a su me guider en posant de judicieux jalons tout en me laissant une grande liberté d’action. Sa grande disponibilité et son écoute attentive furent toujours bienvenues. Je remercie les Professeurs Eva Boxenbaum et Philippe Monin d’avoir accepté d’appartenir à mon jury de thèse et de me faire l’honneur d’en être les rapporteurs. Je remercie également les Professeurs Gazi Islam et François-Xavier de Vaujany d’avoir bien voulu participer à l’évaluation de ce travail. Je saisis l’occasion de ces remerciements pour saluer l’ensemble des Professeurs qui ont inspiré ma décision de m’engager dans le Doctorat : Carole Donada, Marie- Laure Djélic, Marie-Léandre Gomez, Pierre Desmet, Ashok Som, Raymond-Alain Thiétard et Radu Vranceanu. J’exprime aussi ma profonde gratitude aux responsables des équipes d’enseignement qui m’ont permis d’enseigner en tant que Doctorante contractuelle puis A.T.E.R. : Eva Delacroix, Florence Benoît-Moreau et Béatrice Parguel pour les Fondamentaux du Marketing, Stéphane Debenedetti pour les Etudes et Recherches en Marketing et Management, Stéphanie Dameron, Lionel Garreau et Emilie Canet pour le Management Stratégique II. Je tiens à saluer particulièrement le Professeur Véronique Perret pour son soutien, notamment via l’animation des ateliers doctoraux de l’équipe de recherche MOST. Elle a en effet su y insuffler une atmosphère de collaboration bienveillante plus que 5 motivante dans l’apprentissage du métier de chercheur. A ce titre, je tiens à remercier également tous les membres passés et présents de l’équipe MOST qui m’ont permis d’avancer, et en particulier : Antoine Blanc, Vivien Blanchet, Mélissa Boudes, Marie-Aline de Rocquigny, Fabien Geledan, Stéphane Jaumier, Margot Leclair, Delphine Minchella, Julia Parigot, Hélène Peton, Emilie Reinhold et Benjamin Taupin. Je souhaite également associer à ces remerciements mes collègues Hélène Lambrix et Sylvain Colombero. Ils m’ont par exemple permis de côtoyer d’autres équipes et séminaires de recherche où les Professeurs Eva Boxenbaum et François-Xavier de Vaujany m’ont occasionnellement accueillie. Qu’ils en soient également remerciés. A ce titre je souhaite également faire part de ma gratitude à mes hôtes de la Cardiff Business School, en particulier les Professeurs Tim Edwards et Hugh Willmott, lors du séminaire doctoral animé autour du Professeur Roger Friedland. Je veux également dire l’amitié que je porte à celles et ceux qui m’ont entourée en dehors du domaine académique, en particulier Jérôme qui m’a permis de tester ma motivation avant de me lancer dans cette aventure, Raphaël qui a suscité ma curiosité pour l’industrie de la musique mais aussi Emmanuelle et Olivier chez qui j’ai pu trouver toute la complicité des anciens thésards. Merci également à toutes et tous pour avoir supporté mes « absences rédactionnelles » : Christine, Corinne, David, Etienne, Eve, Fabien, Fabrice, Florence, Gil, Mélanie, Pascal, Patricia, Philippe, Sama, Sandra, Thuy … Enfin, je tiens à remercier ma famille et en particuliers mes parents qui ont fait preuve d’un soutien indéfectible tout au long de cette aventure du Doctorat. Mes pensées vont également vers mes sœurs et frères, à Véronique et Caroline qui se sont bien adaptées à mon mode de vie de thésarde et à Hervé qui s’est orienté tout récemment vers l’Education Nationale. Une petite pensée finale pour Hioko, petite Boston Terrier de maintenant 4 ans, comme ma thèse, dont l’enthousiasme débordant fut un soutien quotidien. 6 7 Table des matières INTRODUCTION Les consommateurs au pouvoir ? .......................................................................... 20 Le travail institutionnel des consommateurs .......................................................... 21 Le travail institutionnel par les pratiques matérielles ............................................. 22 Une approche inductive ......................................................................................... 24 Présentation des chapitres .................................................................................... 24 PREMIERE PARTIE : CADRE CONCEPTUEL CHAPITRE 1 : APPREHENDER L'ACTION DU CONSOMMATEUR Introduction ..................................................................................................................... 33 1.1 L’institution, l’acteur du changement, le consommateur et ses pratiques ................... 35 1.1.1 Qu’est-ce qu’une institution ? .......................................................................... 35 Le pilier régulateur ................................................................................................. 36 Le pilier normatif .................................................................................................... 37 Le pilier culturo-cognitif ......................................................................................... 38 1.2.2 Le changement institutionnel et l’acteur du changement ................................ 38 1.1.3 Le consommateur dans le champ institutionnel .............................................. 39 1.1.4 Le renouveau de la TNI : l’attention aux pratiques et aux acteurs ................... 40 1.2 Que sont la ou les pratiques ? ..................................................................................... 41 1.2.1 L’héritage des sciences sociales ..................................................................... 41 Les grands penseurs de la pratique ....................................................................... 41 La théorie des pratiques .......................................................................................
Recommended publications
  • Software to Download from File Sharing Sites 10 Best File Sharing Software for Peer to Peer File Sharing
    software to download from file sharing sites 10 Best File Sharing Software for Peer to Peer File Sharing. Sharing files online isn’t that much easy as it should be, especially, if you have large files with size in GBs. Thankfully, we can use P2P (peer-to- peer) file sharing software to easily share files with anyone online of no matter what size. You can easily upload or download TBs of data without any restrictions. P2P file sharing software can be quite handy, but at the same time, they also have some negative points. These p2p file sharing software also host illegal downloads so that it may lead to any action against you. Furthermore, these peer to peer file sharing software are also known to spread viruses and malware; you will have to be careful about downloading too. Top 10 Best File Sharing Software for Peer to Peer File Sharing. There are dozens of P2P file sharing software to choose from, but it is essential to choose the best P2P file sharing software that is safe and features rich. To help you find the best file sharing software for your needs, we have compiled a list of best file sharing software. You can just select the one that seems right for your needs. 1. uTorrent. Even after being acquired by BitTorrent.inc and becoming closed-sourced with ads, uTorrent is still the leader when it comes to P2P file sharing software. Although you need to subscribe for a premium membership to take full advantage of the client, even its free version offers all the required features to upload and download files without limitations.
    [Show full text]
  • Smart Regulation in the Age of Disruptive Technologies
    SMART REGULATION IN THE AGE OF DISRUPTIVE TECHNOLOGIES Andrea Renda CEPS, Duke, College of Europe 13 March 2018 A New Wave of Regulatory Governance? • First wave: structural reforms (1970s-1980s) • Privatizations, liberalizations • Second wave: regulatory reform (1980s-1990s) • Ex ante filters + “Less is more” • Third wave: regulatory governance/management (2000s) • Policy cycle concept + importance of oversight • Better is more? Alternatives to regulation, nudges, etc. • Fourth wave: coping with disruptive technologies? (2010s) Competition Collusion Access Discrimination Digital Technology as “enabler” Jobs Unemployment Enforcement Infringement Key emerging challenges • From national/EU to global governance • From ex post to ex ante/continuous market monitoring (a new approach to the regulatory governance cycle) • Need for new forms of structured scientific input (a new approach to the innovation principle, and to innovation deals) • From regulation “of” technology to regulation “by” technology • A whole new set of alternative policy options • Away from neoclassical economic analysis, towards multi-criteria analysis and enhance risk assessment/management/evaluation Alternative options & Problem definition Regulatory cycle Impact Analysis Risk assessment, Risk management Evaluation dose-response Emerging, disruptive Policy strategy and Learning technology experimentation • Scientific input and forecast • Mission-oriented options • Ongoing evaluation • Mission-led assessment • Pilots, sprints, sandboxes, tech- • Pathway updates • Long-term
    [Show full text]
  • Coopviz: Real Time Visualization of Bittorrent Swarm Dynamics
    CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Stefano Barbieri CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics Master’s Thesis in Computer Engineering Parallel and Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Stefano Barbieri 3rd September 2009 Author Stefano Barbieri 1397052 [email protected] Title CoopViz: Real Time Visualization of BitTorrent Swarm Dynamics MSc presentation September 09, 2009 Graduation Committee dr. ir. D.H.J. Epema (chair) Faculty EEMCS, Delft University of Technology dr. ir. J. Pouwelse (University Supervisor) Faculty EEMCS, Delft University of Technology dr. ir. G. Gaydadjiev (Committee Member:) Faculty EEMCS, Delft University of Technology Abstract Peer to peer networks are only successful when a significant amount of users is willing to share their resources. In order to have highly efficient file sharing sys- tems, each user should upload to the other peers a number of bytes at least equal to the number of bytes he has downloaded from the community. Unfortunately many users show a selfish behavior, refusing to offer their upload bandwidth to other peers, thus limiting the efficiency of the networks. P2P clients implement different mechanisms in order to mitigate this misbehavior and improve cooperation; often, though, these policies are not enough to enforce altruism in peer-to-peer communi- ties. This thesis explores a new mean to stimulate users to give their fair contribu- tion to the P2P community; the final scope is to generate an emergent self-policing system where users take active part in determining the bandwidth allocation poli- cies. This is achieved by means of a graphical interface, CoopViz, that provides users with up-to-date insights into cooperative behavior of peers and allows the latter to vote on each other, showing their appreciation or disapproval.
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • Tackling the Illegal Trade in the Digital World
    Cyber-laundering: dirty money digitally laundered- Tackling the illegal trade in the Digital world Graham Butler Special Presentation to the Academy of European Law Budapest – March 2016 Co-funded by the Justice Programme of the European Union 2014-2020 Graham Butler – Chairman Bitek Group of Companies © 2016 Tackling the illegal trade in the Digital world Supporting the Cyber-Security agenda ERA (Academy of European Law) – Lisbon / Trier / Sofia / Brussels Address: Threats to Financial Systems – VoIP, lawful intercept, money laundering CTO (Commonwealth Telecommunications Organisation) London Address: Working group on strategic development for 2016-2020 ITU High level Experts Group – Cybersecurity Agenda – Geneva (United Nations) Address: VoIP and P2P Security – Lawful Intercept ENFSC (European Network Forensic and Security Conference) - Maastricht Address: Risks of P2P in Corporate Networks CTITF (Counter Terrorism Implementation Taskforce) - Seattle Address: Terrorist use of encrypted VoIP/P2P protocols - Skype Norwegian Police Investigation Section - Oslo Address: Next Generation Networks – VoIP Security (fixed and mobile networks) IGF (Internet Governance Forum) – Sharm El Sheikh, Egypt Address: Threats to Carrier Revenues and Government Taxes – VoIP bypass EastWest Institute Working Group on Cybercrime - Brussels / London Working Groups: Global Treaty on Cybersecurity / Combating Online Child Abuse CANTO (Caribbean Association of National Telecoms Org) – Belize / Barbados Address: Reversing Declines in Telecommunications Revenue ICLN (International Criminal Law Network) - The Hague Address: Cybercrime Threats to Financial Systems CIRCAMP (Interpol / Europol) - Brussels Working Groups: Online Child Abuse – The Fight Against illegal Content Graham Butler – President and CEO Bitek © 2013 1 Tackling the illegal trade in the Digital world The evolution of interception - circuit switched networks 1. Threat to National Security 3.
    [Show full text]
  • GAO-05-634 File Sharing Programs: the Use of Peer-To-Peer Networks
    United States Government Accountability Office GAO Report to Congressional Requesters May 2005 FILE SHARING PROGRAMS The Use of Peer-to-Peer Networks to Access Pornography a GAO-05-634 May 2005 FILE SHARING PROGRAMS Accountability Integrity Reliability Highlights The Use of Peer-to-Peer Networks to Highlights of GAO-05-634, a report to Access Pornography congressional requesters Why GAO Did This Study What GAO Found Peer-to-peer (P2P) file sharing According to three popular file sharing Web sites, 134 P2P programs are programs represent a major change available to the public. Of those programs, Warez, Kazaa, and Morpheus in the way Internet users find and were among the most popular, as of February 2005. exchange information. The increasingly popular P2P programs Pornographic images are easily shared and accessed on the three P2P allow direct communication between computer users who can programs we tested—Warez, Kazaa, and Morpheus. Juveniles continue to be access and share digital music, at risk of inadvertent exposure to pornographic images when using P2P images, and video files. These programs. programs are known for having the functionality to share copyrighted Two of the three P2P programs—Kazaa and Morpheus—provided filters digital music and movies, and they intended to block access to objectionable material, but the effectiveness of are also a conduit for sharing the filters varied. Warez did not provide a filter. The filters provided by pornographic images and videos. Kazaa and Morpheus functioned differently: Kazaa filtered words found in Regarding these uses of P2P titles or metadata (data associated with the files that contain descriptive programs, GAO was asked to, information), while Morpheus required the user to enter the specific words among other things to be filtered.
    [Show full text]
  • Web 2.0 Enabled Classroom
    7/16/2010 Agenda Market Evolution and Trends Where to Begin Web Questions?2.0 Enabled Introduction to Unified Performance Management Case Studies Classroom © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 1 7/16/2010 Exinda at a Glance Founded in 2002 Melbourne based Leading provider of WAN optimization solutions Privately held with venture capital financing Market Evolution Over 3,000 customers Questions? Several thousand appliances deployed in 40+ countries & Trends Worldwide distribution © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 2 7/16/2010 Market Evolution & Trends Market Evolution & Trends Top five bandwidth heavy websites were: 1. YouTube – 10% of all bandwidth used 2. Facebook – 4.5% 3. Windows Update – 3.3% “On average, 37% of network capacity has 4. Yimg (Yahoo!'s image server) – 2.7% been occupied by traffic that is not business- 5. Google – 2.5% critical.” - Aberdeen Group, “Application Performance Management: When 250 IT managers were asked about their biggest Getting IT on the C-Level Agenda”, March 2009 security concerns, the top answer was "employees using applications on social networks" while at work. Source: Network Box, 20th April, 2010 © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 3 7/16/2010 Market Evolution & Trends Market Evolution & Trends The Council of Australian University Directors Australia Is Social Networking Capital Of The World of Information Technology (CAUDIT) have TELEGRAPH.CO.UK - Mar 3 - According to Nielsen, indicated that traffic is typically doubling Australia's web users are at the forefront of the social networking craze, posting, poking and every nine months (250 per cent a year).
    [Show full text]
  • Limewire Case Study
    MARYLAND STATE POLICE COMPUTER FORENSICS LABORATORY MDSP-CFL2006 DIGITAL MEDIA ANALYSIS OF GNUTELLA PEER-TO-PEER NETWORKS LIMEWIRE CASE STUDY David B. Heslep Detective Sergeant DO NOT DISSEMINATE WITHOUT THE EXPRESS PERMISSION OF THE AUTHOR Copyright © 2006, David B. Heslep, All Rights Reserved MDSP-CFL 2006 Gnutella Peer-to-Peer Networks: Limewire D/Sgt. David Heslep 2 of 32 6/13/2006 Contents TITLE - Digital Media Analysis – Gnutella Peer-to-Peer Networks: Limewire................................3 Introduction.........................................................................................................................................3 Intended Audience..............................................................................................................................3 Goals and Objectives .........................................................................................................................3 The Gnutella Protocol.........................................................................................................................4 Gnutella Descriptors ...............................................................................................................4 Handshaking .....................................................................................................................................5 Gnutella Handshake ...............................................................................................................5 Ultrapeer Handshaking......................................................................................................................6
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for October 1, 2018. Protocol / Client Client Version Group Classification Supported from Application Release ABSCBN ABSCBN 7.1.2 Streaming Streaming-video ADC Plugin (Android) 2.28.990 Unclassified ABSCBN (iOS) 10.3.3 ABSCBN (Web) — Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release Smashcast Smashcast 1.0.13 Streaming
    [Show full text]
  • These Vancaelemont 2016 Anonyme
    THÈSE DE DOCTORAT de l’Université de recherche Paris Sciences et Lettres PSL Research University Préparée à l’Université Paris-Dauphine Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) École Doctorale de Dauphine — ED 543 Spécialité Sciences de gestion COMPOSITION DU JURY : Isabelle HUAULT Professeure, Université Paris Dauphine Directrice de thèse François-Xavier de VAUJANY Professeur, Université Paris Dauphine Président du jury Eva BOXENBAUM Professeure, Ecole des Mines Paristech Rapporteure Philippe MONIN Professeur, EM Lyon Rapporteur Soutenue le 5 déc. 2016 Gazi ISLAM par Anne VANCAELEMONT Professeur associé, Grenoble EM Membre du jury Dirigée par Isabelle HUAULT L’Université n’entend donner aucune approbation ni improbation aux opinions émises dans les thèses : ces opinions doivent être considérées comme propres à leurs auteurs. 1 2 Matérialité et travail institutionnel des consommateurs Le cas de l’industrie de la musique enregistrée en France face à la « dématérialisation » (1994-2014) Anne Vancaelemont Sous la Direction de Isabelle Huault REMERCIEMENTS …………………………………………………………………………..…. 5 TABLE DES MATIERES …………………………………………………………………………. 8 INTRODUCTION ……………………………………………………………………..……….. 17 PREMIERE PARTIE : CADRE CONCEPTUEL CHAPITRE 1 : APPREHENDER L'ACTION DU CONSOMMATEUR ……………………………….. 31 CHAPITRE 2 : PRENDRE EN CONSIDERATION LA MATERIALITE ……………………..………… 55 CHAPITRE 3 : PROBLEMATISATION ET PROBLEMATIQUE ………………………………….….
    [Show full text]
  • World Wide Web 18 Web 2.0 24 Wikipedia 27
    Teoria e Tecnica dei Nuovi Media - Prof.Pescatore a/a 2010-2011 PDF generato attraverso il toolkit opensource ''mwlib''. Per maggiori informazioni, vedi [[http://code.pediapress.com/ http://code.pediapress.com/]]. PDF generated at: Wed, 03 Nov 2010 19:55:26 UTC Indice Voci Storia 1 ARPANET 1 Internet 2 Digitalizzazione 10 World Wide Web 18 Web 2.0 24 Wikipedia 27 Cultura 43 Multimedialità 43 Ipertesto 44 Convergenza (multimedialità) 47 Intelligenza collettiva 48 Social media 52 Contenuto generato dagli utenti 56 Comunità virtuale 58 Wiki 62 Realtà aumentata 70 Alternate reality game 72 Open source 73 Software libero 79 Tecnologia 86 Portale:Informatica/Telematica 86 Protocollo di rete 92 Suite di protocolli Internet 96 Indirizzo IP 98 File Transfer Protocol 102 Hypertext Transfer Protocol 106 Uniform Resource Locator 110 Browser 111 File sharing 116 Peer-to-peer 124 IPTV 135 Web TV 138 Streaming 140 Forum (Internet) 142 Note Fonti e autori delle voci 145 Fonti, licenze e autori delle immagini 147 Licenze della voce Licenza 149 1 Storia ARPANET ARPANET (acronimo di "Advanced Research Projects Agency NETwork", in italiano "rete dell'agenzia dei progetti di ricerca avanzata"), anche scritto ARPAnet o Arpanet, venne studiata e realizzata nel 1969 dal DARPA, l'agenzia del Dipartimento della Difesa degli Stati Uniti responsabile per lo sviluppo di nuove tecnologie ad uso militare. Si tratta della forma per così dire embrionale dalla quale poi nel 1983 nascerà Internet. Arpanet fu pensata per scopi militari statunitensi durante la Guerra Fredda, ma paradossalmente ne nascerà uno dei più grandi progetti civili: una rete globale che collegherà tutta la Terra.
    [Show full text]