Universidad Complutense De Madrid

Total Page:16

File Type:pdf, Size:1020Kb

Universidad Complutense De Madrid UNIVERSIDAD COMPLUTENSE DE MADRID FACULTAD DE CIENCIAS DE LA INFORMACIÓN Departamento de Periodismo II LOS SISTEMAS DE INTERCAMBIO DE USUARIO A USUARIO (P2P) EN INTERNET. ANÁLISIS DE UNA LÓGICA DE DISTRIBUCIÓN, INTERCAMBIO Y REPRODUCCIÓN DE PRODUCTOS CULTURALES MEMORIA PARA OPTAR AL GRADO DE DOCTOR PRESENTADA POR Juan C. Calvi Bajo la dirección del doctor Agustín García Matilla Madrid, 2004 ISBN: 84-669-2697-6 TESIS DOCTORAL Los sistemas de intercambio de usuario a usuario (P2P) en Internet. Análisis de una lógica de distribución, intercambio y reproducción de productos culturales. Juan C. Calvi Director: Agustín García Matilla Universidad Complutense de Madrid Facultad de Ciencias de la Información Departamento de Periodismo II Madrid 2004 2 Agradecimientos Históricamente se ha demostrado que el conocimiento científico sólo puede desarrollarse dentro de unas condiciones materiales, políticas e institucionales que garanticen el intercambio colaborativo de ideas e información, y en este sentido, el presente trabajo no hubiera sido posible sin ese necesario ejercicio intelectual. Hasta tal punto esto es cierto, que la mayor parte de las ideas aquí desarrolladas no proceden del autor del mismo, sino del intercambio colaborativo entre personas cuyo vínculo más importante es estar dispuestas a compartir abiertamente lo que saben. De este modo, debo agradecer en primer término a mis colegas más cercanos, Jimena García Alonso y Luis A. Albornoz, ambos profesores de la Universidad Carlos III de Madrid, el haber compartido conmigo sus ideas sobre muchas de las cuestiones aquí tratadas. También debo agradecer especialmente al director de esta tesis, el profesor Agustín García Matilla, de la Universidad Carlos III, y al profesor Enrique Bustamante, de la Universidad Complutense de Madrid, por la lectura atenta y las múltiples correcciones sugeridas a mi trabajo, sin las cuales no hubiera podido avanzar. Asimismo, otros profesores han contribuido sustancialmente al desarrollo del presente trabajo, entre ellos, el profesor Nicholas Garnham, de la Universidad de Westminster (Londres), quién accedió a discutir muchos de los argumentos aquí tratados, al igual que los profesores Richard Barbrook y Paddy Scannell, de la misma universidad. Los profesores Giuseppe Richeri, de la Universidad Svizzera de Lugano (Italia), y Armand Mattelart, de la Universidad París VIII (Francia), en distintas ocasiones me han brindado sus sabias opiniones sobre el tema de mi tesis. Quiero reconocer además los aportes de otros colegas, amigos y amigas, de las facultades de comunicación de la Universidad de Rosario (Argentina) y de la Universidad de Bolonia (Italia), con quienes he aprendido a leer y a discutir, y a los compañeros de la Universidad Pontificia de Salamanca, con quienes he compartido el ejercicio de la docencia. Por último, quisiera agradecer al personal docente y administrativo del Departamento de Periodismo II de la Facultad de Ciencias de la Información de la U.C.M., por su generosidad y paciencia. 3 4 ÍNDICE 1. INTRODUCCIÓN .......................................................7 1.1 OBJETO DE ESTUDIO .....................................................14 1.2 MARCO TEÓRICO ........................................................16 1.2.1 LAS INDUSTRIAS CULTURALES ..........................................18 1.2.2 LAS LÓGICAS FUNDAMENTALES DE LAS INDUSTRIAS CULTURALES...................21 1.2.3 LOS PRODUCTOS CULTURALES EN INTERNET .................................24 1.3 METODOLOGÍA ..........................................................28 1.4 HIPÓTESIS............................................................33 1.5 OBJETIVOS............................................................34 1.6 ESQUEMA GENERAL.......................................................35 2. LOS SISTEMAS P2P A TRAVÉS DE LA HISTORIA DE INTERNET .....................37 2.1 LAS PRIMERAS REDES INFORMÁTICAS: DE ARPANET A INTERNET ......................39 2.1.1 LOS COMIENZOS DEL INTERCAMBIO DE INFORMACIÓN DE USUARIO A USUARIO (P2P) ....51 2.1.2 LA LÓGICA DEL INTERCAMBIO COLABORATIVO ................................57 2.1.3 LOS USOS SOCIALES DE LOS SISTEMAS DE INFORMACIÓN ........................61 2.2 LAS REDES DE TELECOMUNICACIONES E INTERNET ................................67 2.2.1 LA ESTRUCTURA DE LAS REDES DE TELECOMUNICACIONES ........................68 2.2.2 EL SUMINISTRO DE CONEXIÓN Y ACCESO A INTERNET ..........................75 2.2.3 LA CONVERGENCIA DE LOS SERVICIOS DE TELECOMUNICACIONES E INTERNET ..........80 2.2.4 POSIBILIDADES Y LIMITACIONES DEL PROCESO DE CONVERGENCIA .................83 2.3 LA GEOPOLÍTICA DE INTERNET .............................................87 2.3.1 EL TRAZADO DE SU ESTRUCTURA TÉCNICA ..................................90 2.3.2 LA CONCENTRACIÓN DE LOS NODOS DE PRODUCCIÓN Y DISTRIBUCIÓN DE INFORMACIÓN ...99 2.3.3 LA GEOGRAFÍA DE LOS USUARIOS .......................................105 3. LOS PRIMEROS SISTEMAS DE INTERCAMBIO P2P..............................111 3.1 DEFINICIÓN, CARACTERÍSTICAS Y TIPOLOGÍA GENERAL ...........................112 3.2 LOS SISTEMAS CENTRALIZADOS: EL MODELO NAPSTER.............................118 3.3 LOS SISTEMAS DISTRIBUIDOS: EL MODELO GNUTELLA.............................128 3.4 LAS ESTRUCTURAS TÉCNICAS ..............................................134 3.4.1 REDES, ARQUITECTURAS Y MODELOS .....................................138 3.4.2 LA LÓGICA DE DISTRIBUCIÓN Y REPRODUCCIÓN DE PRODUCTOS CULTURALES ..........148 3.5 LAS ESTRUCTURAS ECONÓMICAS.............................................155 3.6 LA REGULACIÓN .......................................................167 3.7 LOS USOS Y LOS USUARIOS ...............................................173 4. LOS NUEVOS SISTEMAS DE INTERCAMBIO P2P ...............................179 4.1 LOS SISTEMAS DESCENTRALIZADOS: LOS MODELOS KAZAA Y MORPHEUS .................180 4.2 EL SISTEMA KAZAA.....................................................188 4.2.1 ESTRUCTURA TÉCNICA ...............................................193 4.2.1.1 EL MENÚ DE OPCIONES ...........................................200 4.2.2 ESTRUCTURA ECONÓMICA ..............................................203 4.2.3 REGULACIÓN ......................................................215 4.3 EL SISTEMA MORPHEUS ..................................................224 4.3.1 ESTRUCTURA TÉCNICA ...............................................225 4.3.1.1 EL MENÚ DE OPCIONES ...........................................227 4.3.2 ESTRUCTURA ECONÓMICA..............................................228 4.3.3 REGULACIÓN ......................................................232 5 4.4 OTROS SISTEMAS DE INTERCAMBIO P2P ......................................235 4.5 LOS USOS Y LOS USUARIOS ...............................................243 4.6 RESUMEN GENERAL DE TODOS LOS SISTEMAS ANALIZADOS (CAPÍTULOS 3 Y 4) ...........251 5. LAS INDUSTRIAS CULTURALES FRENTE A LOS SISTEMAS P2P .....................259 5.1 ESTRATEGIAS Y MODELOS DE COMERCIALIZACIÓN DE PRODUCTOS CULTURALES EN INTERNET ...265 5.2 EL IMPACTO DE LOS SISTEMAS P2P SOBRE LAS INDUSTRIAS CULTURALES ..............275 5.3 PROBLEMAS DE REALIZACIÓN ECONÓMICA DE PRODUCTOS CULTURALES EN INTERNET ........297 5.4 HACIA UN NUEVO RÉGIMEN DE EXPLOTACIÓN DE PRODUCTOS CULTURALES EN INTERNET ......301 5.4.1 LA EXTENSIÓN DE LA LEY DEL COPYRIGHT ................................304 5.4.2 LOS SISTEMAS DE PROTECCIÓN DIGITAL DEL COPYRIGHT ......................315 5.4.3 LA LEY DE DERECHOS DE AUTOR PARA EL MILENIO DIGITAL ...................319 5.4.4 LA ALIANZA PARA UNA PLATAFORMA INFORMÁTICA SEGURA .....................326 6. CONCLUSIONES .....................................................339 BIBLIOGRAFÍA ........................................................349 ÍNDICE DE GRÁFICOS Y TABLAS............................................361 POSTSCRIPTUM ............................................................365 ANEXOS (CD-ROM) I. OTROS GRÁFICOS Y TABLAS II. NOTAS 6 Capítulo 1 1. Introducción En las últimas décadas se viene verificando una expansión constante de los sectores tradicionales de las Industrias Culturales (I.C.). La edición de libros, periódicos y revistas, discos, películas y vídeos así como la producción audiovisual radiotelevisiva, han experimentado un importante desarrollo y un consecuente incremento de su peso económico con tasas de crecimiento superiores a cualquier otro sector industrial. De este modo, estas industrias se constituyen hoy en sectores estratégicos de la economía mundial y su influencia política, social y cultural es, por tanto, cada vez mayor (Bustamante y otros, 2003). Los grandes grupos de empresas que controlan los distintos sectores de las I.C., denominados genéricamente grupos multimedia (Miguel, 1993), han cobrado así una importancia fundamental dentro del proceso de expansión y globalización de la economía de mercado, y proceden en su mayoría de EE.UU. y de Europa, donde se han constituido en áreas estratégicas del desarrollo económico de cada país. No obstante, a finales de la década de los años 80, los distintos sectores de las I.C., principalmente el audiovisual, alcanzaron un punto de saturación del consumo de sus productos conjuntamente a una crisis de los modelos tradicionales de financiación basados en la publicidad y en recursos fiscales (Richeri, 1993). Esto desencadenó un proceso de reestructuración de los grupos multimedia, tendente a reducir su dependencia de los recursos publicitarios y a revalorizar sus productos, dirigiéndolos directamente al consumidor
Recommended publications
  • “Napster” Is Released (At Northeastern University) • 04/04/00
    • 03/07/97 - “Hotline” is released • 09/09/99 - “Napster” is released (at NorthEastern University) • 04/04/00 - “Gnutella 0.56” is released • 01/04/00 - “Napster” reaches 10 million downloads, but still has no revenue • 01/05/00 - Cable internet provider threaten to discontinue contracts with users that use “Napster” • 01/05/00 - Universal and Sony start to develop “Duet”, a “Napster” clone to be released 4/01 • 01/08/00 - AT&T start to develop “Publius”, a P2P network publishing system • 03/08/00 - Intel, HP and IBM create the “P2P Working Group” • 16/11/00 - Bertelsmann buys Napster; invests millions • 08/12/00 - Sun says it is working on a Java Peer-to-Peer platform • 18/01/01 - Microsoft initiates “Farsite” (“Federated, Available and Reliable Storage for an Incompletely Trusted Environment”) project [email protected] 24.1.01/UBIComp 1/44 • Background Etzard Stolte – History: P2P Networking IKS Group/ETH – A P2P Definition [email protected] – Merging technologies • What is out there? – File Sharing – Distributed Computing – Instant Messaging – Collaboration – Web Services • Summary • Discussion – Will P2P remain? – Will P2P be a profitable business concept? [email protected] 24.1.01/UBIComp 2/44 • Peer-to-Peer (P2P) has a specific meaning in many fields, e.g. – Literature (e.g. P2P review) – Psychology (e.g. counceling) – Education e.g. (peer groups) • In computer science P2P used to describe – A small network without dedicated server – Files and peripherals are shared – Some access control • What are then these P2P tools my younger sister talks about? – Isn’t the internet just a peer-to-peer network (e.g.
    [Show full text]
  • Network Defense Tools: Perimeter and Internal Defenses This Lecture
    CS 155 Spring 2006 Perimeter and Internal Defenses Network Defense Tools: Commonly deployed defenses Firewalls, Traffic shapers, and Perimeter defenses – Firewall, IDS Protect local area network and hosts Intrusion Detection Keep external threats from internal network Internal defenses – Virus scanning Protect hosts from threats that get through the perimeter defenses John Mitchell Extend the “perimeter” –VPN Common practices, but could be improved Internal threats are significant Unhappy employees Compromised hosts 2 This lecture Basic Firewall Concept Standard perimeter defense mechanisms Separate local area net from internet Firewall Packet filter (stateless, stateful) Application layer proxies Firewall Traffic shaping Intrusion detection Local network Internet Anomaly and misuse detection Methods applicable to network or host Router Future lectures Virus and malware Worm propagation and detection All packets between LAN and internet routed through firewall 3 4 Firewall goals Two Separable Topics Prevent malicious attacks on hosts Arrangement of firewall and routers Port sweeps, ICMP echo to broadcast addr, syn flooding, … Several different network configurations Worm propagation Separate internal LAN from external Internet Exploit buffer overflow in program listening on network Wall off subnetwork within an organization Prevent general disruption of internal network Intermediate zone for web server, etc. External SMNP packets Personal firewall on end-user machine Provide defense in depth How the firewall
    [Show full text]
  • Browser Security
    Transcript of Episode #38 Browser Security Description: Steve and Leo discuss the broad topic of web browser security. They examine the implications of running "client-side" code in the form of interpreted scripting languages such as Java, JavaScript, and VBScript, and also the native object code contained within browser "plug- ins" including Microsoft’s ActiveX. Steve outlines the "zone-based" security model used by IE and explains how he surfs with high security under IE, only "lowering his shields" to a website after he’s had the chance to look around and decide that the site is trustworthy. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-038.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-038-lq.mp3 Leo Laporte: Bandwidth for Security Now! is provided by AOL Radio at AOL.com/podcasting. This is Security Now! with Steve Gibson, Episode 38 for May 4, 2006: Browser Security. Security Now! is brought to you by Astaro, makers of the Astaro Security Gateway, on the web at www.astaro.com. So finally the sun is shining in beautiful California. We have summer, or at least spring finally arrived. And, look, Steve Gibson’s wearing a tank top and shorts. No, he’s not. Steve Gibson: Well, it’s dry in Toronto, Leo. You were all chapped; I was all, like, chapped just after one day. Leo: I am. And, you know, they complain in Toronto that it’s too humid because they have the lake effect. But I guess it gets humid some other time because I – chapped is the word, exactly.
    [Show full text]
  • D-Link Announce Alliance to Offer Expanded Entertainment Options for the Digital Home
    PRESS RELEASE AMERICA ONLINE AND D-LINK ANNOUNCE ALLIANCE TO OFFER EXPANDED ENTERTAINMENT OPTIONS FOR THE DIGITAL HOME Taipei, January 8, 2004 D-Link, the global leader in the design and development of connectivity and communications technologies for the digital home and the small to medium business markets, and America Online, Inc., the world's leading interactive services company, today announced a new alliance to jointly offer expanded entertainment options for the Digital Home. The companies are collaborating to develop and deliver products and services that will allow broadband consumers to access secure, high-quality video, music and photo content, on-demand, from virtually any room in the home. In the first step of this new relationship, D-Link and AOL are extending access to the #1 Internet broadcasting service, Radio@AOL, beyond the computer and into any room with a TV or stereo. A new line of D-Link Wireless Media Players, including the Wireless Network Player with DVD and the D-Link Wireless Network Player with 5-in-1 Flash Card Reader stream multimedia content such as audio, photos and video across a home network to a home entertainment center for an unparalleled entertainment experience. The D-Link Wireless Media Players will immediately enhance and extend an AOL for Broadband member's experience by allowing them to listen to over 175 CD-quality Radio@AOL stations on any TV or stereo in the home. D-Link and AOL are also working together to extend AOL's popular You've Got Pictures in the same way, allowing AOL for Broadband members to view their personal photos and slideshows, and exclusive photos from AOL's various photo galleries by using the AOL You've Got Pictures service on any TV in the home.
    [Show full text]
  • Finding a Partner Model with Broadcasters at Tunein.Com.” Stanford Casepublisher 204-2011-1
    S TANFORD U NIVERSITY 2 0 1 1 - 2 0 4 - 1 S CHOOL OF E NGINEERING C ASEP UBLISHER DRAFT Rev. May 17, 2011 DRAFT COPY DO NOT CITE: R. Chen et al. “Finding a Partner Model with Broadcasters at Tunein.com.” Stanford CasePublisher 204-2011-1. 17 May 2010. DRAFT COPY DO NOT CITE FINDING A PARTNER MODEL WITH BROADCASTERS AT TUNEIN.COM T ABLE OF C ONTENTS Introduction 1. Overview of Online Broadcast Industry 1.1. Industry Trends 1.2. Industry Participants 2. TuneIn Background 2.1. RadioTime 2.2. Tunein Radio 3. Business Model 3.1. Metrics 3.2. Market Reaction 4. Conclusions 5. Discussion 6. Questions 7. Exhibits 8. References 9. Authors Professors Micah Siegel (Stanford University) and Fred Gibbons (Stanford University) guided the de- velopment of this case using the CasePublisher service as the basis for class discussion rather than to il- lustrate either effective or ineffective handling of a business situation. S TANFORD 204-2011-01 Finding a Partner Model at TuneIn.com Introduction !Founded in 2002, TuneIn delivers free Internet radio from all over the world. The application streams radio stations from 50,000 local, international, and Internet stations spanning 140 countries and 55 di"erent languages in over 150 products.1) It provides users with access to live radio content through a variety of media including websites, smart- phones, home entertainment devices, and auto in-dash receivers. 2) The application also al- lows users to pause, rewind, and record live radio programs. Although there are numerous online applications that o"er music streaming, TuneIn di"erentiates itself by focusing on radio programming.
    [Show full text]
  • An Introduction to Internet Radio
    NB: This version was updated with new Internet Radio products on 26 October 2005 (see page 8). INTERNET RADIO AnInternet introduction to Radio Franc Kozamernik and Michael Mullane EBU This article – based on an EBU contribution to the WBU-TC Digital Radio Systems Handbook – introduces the concept of Internet Radio (IR) and provides some technical background. It gives examples of IR services now available in different countries and provides some guidance for traditional radio broadcasters on how to adapt to the rapidly changing multimedia environment. Traditionally, audio programmes have been available via dedicated terrestrial networks broad- casting to radio receivers. Typically, they have operated on AM and FM terrestrial platforms but, with the move to digital broadcasting, audio programmes are also available today via DAB, DRM and IBOC (e.g. HD Radio in the USA). However, this paradigm is about to change. Radio programmes are increasingly available not only from terrestrial networks but also from a large variety of satellite, cable and, indeed, telecommunications networks (e.g. fixed telephone lines, wire- less broadband connections and mobile phones). Very often, radio is added to digital television plat- forms (e.g. DVB-S and DVB-T). Radio receivers are no longer only dedicated hi-fi tuners or portable radios with whip aerials, but are now assuming the shape of various multimedia-enabled computer devices (e.g. desktops, notebooks, PDAs, “Internet” radios, etc.). These sea changes in radio technologies impact dramatically on the radio medium itself – the way it is produced, delivered, consumed and paid-for. Radio has become more than just audio – it can now contain associated metadata, synchronized slideshows and even short video clips.
    [Show full text]
  • HTTP: IIS "Propfind" Rem HTTP:IIS:PROPFIND Minor Medium
    HTTP: IIS "propfind"HTTP:IIS:PROPFIND RemoteMinor DoS medium CVE-2003-0226 7735 HTTP: IkonboardHTTP:CGI:IKONBOARD-BADCOOKIE IllegalMinor Cookie Languagemedium 7361 HTTP: WindowsHTTP:IIS:NSIISLOG-OF Media CriticalServices NSIISlog.DLLcritical BufferCVE-2003-0349 Overflow 8035 MS-RPC: DCOMMS-RPC:DCOM:EXPLOIT ExploitCritical critical CVE-2003-0352 8205 HTTP: WinHelp32.exeHTTP:STC:WINHELP32-OF2 RemoteMinor Buffermedium Overrun CVE-2002-0823(2) 4857 TROJAN: BackTROJAN:BACKORIFICE:BO2K-CONNECT Orifice 2000Major Client Connectionhigh CVE-1999-0660 1648 HTTP: FrontpageHTTP:FRONTPAGE:FP30REG.DLL-OF fp30reg.dllCritical Overflowcritical CVE-2003-0822 9007 SCAN: IIS EnumerationSCAN:II:IIS-ISAPI-ENUMInfo info P2P: DC: DirectP2P:DC:HUB-LOGIN ConnectInfo Plus Plus Clientinfo Hub Login TROJAN: AOLTROJAN:MISC:AOLADMIN-SRV-RESP Admin ServerMajor Responsehigh CVE-1999-0660 TROJAN: DigitalTROJAN:MISC:ROOTBEER-CLIENT RootbeerMinor Client Connectmedium CVE-1999-0660 HTTP: OfficeHTTP:STC:DL:OFFICEART-PROP Art PropertyMajor Table Bufferhigh OverflowCVE-2009-2528 36650 HTTP: AXIS CommunicationsHTTP:STC:ACTIVEX:AXIS-CAMERAMajor Camerahigh Control (AxisCamControl.ocx)CVE-2008-5260 33408 Unsafe ActiveX Control LDAP: IpswitchLDAP:OVERFLOW:IMAIL-ASN1 IMail LDAPMajor Daemonhigh Remote BufferCVE-2004-0297 Overflow 9682 HTTP: AnyformHTTP:CGI:ANYFORM-SEMICOLON SemicolonMajor high CVE-1999-0066 719 HTTP: Mini HTTP:CGI:W3-MSQL-FILE-DISCLSRSQL w3-msqlMinor File View mediumDisclosure CVE-2000-0012 898 HTTP: IIS MFCHTTP:IIS:MFC-EXT-OF ISAPI FrameworkMajor Overflowhigh (via
    [Show full text]
  • Paul Collins Status Name/Startup Item Command Comments X System32
    SYSINFO.ORG STARTUP LIST : 11th June 2006 (c) Paul Collins Status Name/Startup Item Command Comments X system32.exe Added by the AGOBOT-KU WORM! Note - has a blank entry under the Startup Item/Name field X pathex.exe Added by the MKMOOSE-A WORM! X svchost.exe Added by the DELF-UX TROJAN! Note - this is not the legitimate svchost.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in the Winnt or Windows folder X SystemBoot services.exe Added by the SOBER-Q TROJAN! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a HelpHelp subfolder of the Windows or Winnt folder X WinCheck services.exe Added by the SOBER-S WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "ConnectionStatusMicrosoft" subfolder of the Windows or Winnt folder X Windows services.exe Added by the SOBER.X WORM! Note - this is not the legitimate services.exe process which is always located in the System (9x/Me) or System32 (NT/2K/XP) folder and should not normally figure in Msconfig/Startup! This file is located in a "WinSecurity" subfolder of the Windows or Winnt folder X WinStart services.exe Added by the SOBER.O WORM! Note - this is not the legitimate
    [Show full text]
  • 1 Worldwide Revenue
    digitalposter08_v19_(jg).qxp 3/7/2008 5:24 PM Page 1 ADAGE.COM/DIGITALFAMILYTREES08 GO ONLINE TO EXPLORE AN INTERACTIVE VERSION WITH PROPERTY DESCRIPTIONS DIGITAL FAMILY TREES 2008 AND LINKS Interactive ventures of top media,web portal and agency companies MEDIA COMPANIES PORTALS/SEARCH AGENCY COMPANIES DIGITAL HOLDINGS OF FIVE MAJOR U.S. MEDIA COMPANIES PROPERTIES OF THE BIG THREE WORLDWIDE DIGITAL PROPERTIES OF THE TOP FOUR AGENCY HOLDING COMPANIES Key digital properties and services. See “About the Digital Family Trees” for more information. Key digital properties and services. Key digital services. Go to AdAge.com/digitalfamilytrees08 to see No. 5 Havas and No. 6 Dentsu. TIME WARNER NEWS CORP. GOOGLE OMNICOM GROUP INTERPUBLIC GROUP OF COS. U.S. UNIQUE VISITORS: 123.8 million U.S. UNIQUE VISITORS: 86.6 million U.S. UNIQUE VISITORS: 134.9 million DIGITAL SHARE OF ’07 REVENUE: 13% Ad Age estimate DIGITAL SHARE OF ’07 REVENUE: 10% Ad Age estimate WORLDWIDE REVENUE (’07): $46.5B U.S. MEDIA WORLDWIDE REVENUE (’07): $28.7B U.S. MEDIA WORLDWIDE REVENUE (’07): $16.6B U.S. MEDIA WORLDWIDE REVENUE (’07): $12.7B HOLDING COMPANY WORLDWIDE REVENUE (’07): $6.6B HOLDING COMPANY DIGITAL REVENUE (’07): $655M Ad Age est. U.S. MEDIA REVENUE (’06): $34.0B COMPANY RANK: 1 U.S. MEDIA REVENUE (’06): $15.4B COMPANY RANK: 4 U.S. MEDIA REVENUE (’06): $4.1B COMPANY RANK: 19 DIGITAL REVENUE (’07): $1.6B Ad Age estimate WORLDWIDE REV. RANK: 1 WORLDWIDE REV. RANK: 3 AOL CABLE ADVERTISING SERVICES AGENCIES AGENCIES AD NETWORKS AOL LIVING MAPQUEST BIGTENNETWORK.COM
    [Show full text]
  • Claude Chastagner Université Paul Valéry, Montpellier III
    Chastagner, Claude. « Rebels on the Net », Cercles 3 (2001) : 8-19 <www.cercles.com>. © Cercles 2001. Toute re- production, même partielle, par quelque procédé que ce soit, est interdite sans autorisation préalable (loi du 11 mars 1957, al. 1 de l’art. 40). ISSN : 1292-8968. Claude Chastagner Université Paul Valéry, Montpellier III REBELS ON THE NET What makes popular music popular is not only the nature and content of the songs or the identity of its performers; it is also its availability. Popular music is as much shaped and defined by advertising, marketing, distribution and re- tailing as by lyrics and chords sequences. The sheer amount of literature on the subject is a sobering reminder of how much of a truism this has become.1 However, it is also a field in which fast, permanent evolution necessitates constant monitoring. The development of the Internet was bound to have a momentous impact on popular culture, particularly on the accessibility of the words, sounds and images that define it. Throughout the 1990s, a series of technical innovations gradually made the distribution of music via the Internet more than a dream, and several commercial ventures were launched, probing the possibilities of making music accessible on-line.2 But none gene- rated such a fierce and heated debate as the new generation of digital music- promoting companies led by the much maligned and the much celebrated Napster, and a number of others that came in its wake, Gnutella, Scour, CuteMX, Freenet or iMESH, to name but a few. In the course of the last few months, the music business has indeed been challenged and questioned by companies like Napster that offer a revo- lutionary means to access music.
    [Show full text]
  • Quick Guide to the Web
    Quick Guide to the Web For Reference & For Fun Reference General Reference Wiki Reference Academic Encyclopedias Dictionaries More Glossaries by Topic Basic Info Phone & Address Maps & Directions News Weather Health Answers & How-To Basic Sites Internet Basics News News & Politics Newspapers Media Research Entertainment Movies & TV Shows/Movies Online Movies Television Reference Pop Culture Music Online Music Music Sites Reference Games Computer & Console Internet Puzzles & More Media & Fun Online Video Humor/Fun Baseball & Other Sports Government General Depts & Agencies Law Public_Resources Data & Statistics Travel General Flights Driving Automobiles Hotels Studying Academic Study Aids General Reference Data & Statistics Wiki Reference Encyclopedias Dictionaries More Glossaries by Topic Media Online Shows & Movies Music Video Internet Games Books Newspapers Magazines More Local Info Genealogy Finding Basic Information Basic Search & More Google Yahoo Bing MSN ask.com AOL Wikipedia About.com Internet Public Library Freebase Librarian Chick DMOZ Open Directory Executive Library Web Research OEDB LexisNexis Wayback Machine Norton Site-Checker DigitalResearchTools Web Rankings Alexa Web Tools - Librarian Chick Web 2.0 Tools Top Reference & Resources – Internet Quick Links E-map | Indispensable Links | All My Faves | Joongel | Hotsheet | Quick.as Corsinet | Refdesk Tools | CEO Express Internet Resources Wayback Machine | Alexa | Web Rankings | Norton Site-Checker Useful Web Tools DigitalResearchTools | FOSS Wiki | Librarian Chick | Virtual
    [Show full text]
  • Jews Control U.S.A., Therefore the World – Is That a Good Thing?
    Jews Control U.S.A., Therefore the World – Is That a Good Thing? By Chairman of the U.S. based Romanian National Vanguard©2007 www.ronatvan.com You probably don’t believe a world! That’s why we decided to back up with proof & facts all our statements in 15 (as short as possible) Chapters! v. 1.5 1 INDEX 1. Are Jews satanic? 1.1 What The Talmud Rules About Christians 1.2 Foes Destroyed During the Purim Feast 1.3 The Shocking "Kol Nidre" Oath 1.4 The Bar Mitzvah - A Pledge to The Jewish Race 1.5 Jewish Genocide over Armenian People 1.6 The Satanic Bible 1.7 Other Examples 2. Are Jews the “Chosen People” or the real “Israel”? 2.1 Who are the “Chosen People”? 2.2 God & Jesus quotes about race mixing and globalization 3. Are they “eternally persecuted people”? 3.1 Crypto-Judaism 4. Is Judeo-Christianity a healthy “alliance”? 4.1 The “Jesus was a Jew” Hoax 4.2 The "Judeo - Christian" Hoax 4.3 Judaism's Secret Book - The Talmud 5. Are Christian sects Jewish creations? Are they affecting Christianity? 5.1 Biblical Quotes about the sects , the Jews and about the results of them working together. 6. “Anti-Semitism” shield & weapon is making Jews, Gods! 7. Is the “Holocaust” a dirty Jewish LIE? 7.1 The Famous 66 Questions & Answers about the Holocaust 8. Jews control “Anti-Hate”, “Human Rights” & Degraded organizations??? 8.1 Just a small part of the full list: CULTURAL/ETHNIC 8.2 "HATE", GENOCIDE, ETC.
    [Show full text]