Skip to main content

Sean Parker: Facebook Power Users Have Gone to Twitter or Google+


Sean Parker: Facebook Power Users Have Gone to Twitter or Google+

Spotify investor and former Facebook President Sean Parker had some harsh words for his favorite social network: Its problem isn’t privacy, it’s that some of its most active users are leaving for other services.
“The threat to Facebook is that power users have gone to Twitter or Google+,” Parker told the Web 2.0 Summit. They are leaving, he says, because Facebook isn’t giving them enough ways to manage a glut of information.
Parker also defended Spotify’s decision to integrate the music service with Facebook, requiring users to sign up with a Facebook account. “It gives Spotify access to Facebook’s roughly 800 million users,” he said in an interview with Federated Media’s John Battelle.
Battelle continued on the Facebook line, asking Parker what he thinks of the argument that Facebook is perceived as being a “little creepy.” After attempting to dodge the question — and pointing out that he is a major Facebook shareholder — Parker offered this immortal answer. “Look: There’s good creepy and there’s bad creepy,” he said. “Today’s creepy is tomorrow’s necessity.”
SEE ALSO: Sean Parker Joins Twitter, With Apology to Mark Zuckerberg
Parker also had some harsh words for the record labels, arguing that bands can simply bypass them. “You can now be a master of your own destiny,” he said. “I’m not sure why you would sign up with a record label.”
Unless they desperately need an advance, Parker believes, bands are better off on their own. He apologized to his friends in the recording industry but offered the slow-to-grow success of indie band Foster The People as a prime example.
Parker’s argument: The digital revolution has removed barriers to sharing music. It doesn’t cost extra to create another copy of a song anymore and it’s easier than ever to get recommendations for music from friends. The result is that labels are lagging behind because they have layers of bureaucracy and protocols they no longer need. Bands are responding by using other distribution mediums (such as Spotify) in order to take charge of their own destinies.
Finally, Parker attempted to clarify the controversy over whether he was a co-founder of Napster or just an early employee. “I was a co-founder,” he said in a response to a question from Mashable. He explained that he was one of three people with founding shares when the company was first incorporated.

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...