{"id":26790,"date":"2016-12-21T11:52:57","date_gmt":"2016-12-21T11:52:57","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/news\/2016\/dec\/21\/how-spotify-changed-password-sharing-and-how-cloud-enables-it\/"},"modified":"2016-12-21T11:52:57","modified_gmt":"2016-12-21T11:52:57","slug":"how-spotify-changed-password-sharing-and-how-the-cloud-enables-it","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/how-spotify-changed-password-sharing-and-how-the-cloud-enables-it\/","title":{"rendered":"How Spotify changed password sharing and how the cloud enables it"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/hocus-focus.jpg\"><\/p>\n<p class=\"Paragraph SCX123375739\"><em>(c)iStock\/<span>hocus-focus<\/span><\/em><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">According to the\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"https:\/\/www.wired.com\/2014\/11\/hacker-lexicon-computer-fraud-abuse-act\/\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">Computer Fraud and Abuse Act<\/span><\/span><\/a><span class=\"EOP SCX123375739\">,&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">unauthoris<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">ed<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;access of computers is a federal crime. However, the law&#8217;s<\/span><span class=\"EOP SCX123375739\">&nbsp;vague definition of &#8220;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">unauthoris<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">ed<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;access,&#8221; highlighted by a recent\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"http:\/\/nymag.com\/selectall\/2016\/07\/federal-court-rules-that-password-sharing-is-illegal-under-insane-ancient-law.html\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">New York court case<\/span><\/span><\/a><span class=\"EOP SCX123375739\">, has consumer advocates and business groups worried.\u202f<\/span><span class=\"EOP SCX123375739\"><br \/><\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">This past July, the US Court of Appeals for the Ninth Circuit upheld defendant David&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">Nosal&#8217;s<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;conviction for using a colleague&#8217;s login credentials to access his employer&#8217;s research databases.<\/span><span class=\"EOP SCX123375739\"><br \/><\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">Nosal<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;is far from the first person to be convicted on such charges. In October 2015, former Reuters journalist\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"http:\/\/nymag.com\/selectall\/2016\/04\/matthew-keys-sentencing-computer-crimes.html\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">Matthew Keys<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fwas sentenced to two years in prison for sharing usernames and passwords with &#8220;hacktivist&#8221; collective Anonymous.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Despite being illegal, password sharing is ubiquitous. A 2016&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">LastPass<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;survey found that a staggering\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"http:\/\/prod.cdata.app.sprinklr.com\/DAM\/434\/Sharing_Survey_Infographic-1-6f0f4580-73be-406a-9115-9d5276273a22-1375330592.pdf\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">95<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">%<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">&nbsp;of U.S. consumers<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fshare passwords with significant others, children, co-workers, and friends.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Rampant password sharing puts content streaming services, law enforcement, and consumers in a difficult position. Do we prosecute everyone who&#8217;s ever shared a Netflix password? Or do we pretend the law doesn&#8217;t exist and let hackers off the hook?<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">&nbsp;<\/span><br class=\"SCX123375739\" \/><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">&nbsp;<\/span><br class=\"SCX123375739\" \/><\/span><span class=\"EOP SCX123375739\">Spotify has managed to devise\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"https:\/\/community.spotify.com\/t5\/iOS-iPhone-iPad\/Spotify-on-multiple-devices\/td-p\/30667\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">a solution<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fthat avoids the situation altogether.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<h3 class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">The content access c<\/span><span class=\"EOP SCX123375739\">onundrum<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/h3>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">To comply with content owner copyright guidelines, a streaming or clo<\/span><span class=\"EOP SCX123375739\">ud service user must be&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">authoris<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">ed<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;by the provider. Most websites and online services use password authentication to enforce these rules.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Between password-protected bank, utility, news, and entertainment sites, it&#8217;s common for consumers to juggle dozens of passwords. It&#8217;s also easy for them to share those credentials with others.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">To prevent this account<\/span><span class=\"EOP SCX123375739\">&nbsp;abuse, content providers&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">analys<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">e<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;login times, locations, and devices to spot suspicious patterns. Service providers send warnings and threatening emails to inform users that account sharing has been spotted, but most of these companies are attacking the wrong problem.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">The\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"https:\/\/www.pubnub.com\/blog\/2014-10-20-mitigate-and-prevent-subscription-sharing-for-saas-companies\/\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">issue with subscription sharing<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fisn&#8217;t unfettered access to gated apps and sites. Frankly, traffic data can be useful to marketers. The real issue is\u202fsimultaneous access to media.<\/span><span class=\"EOP SCX123375739\"><br \/><\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Netflix, for example, doesn&#8217;t care if 10 people use the same credentials to browse movies. But when all 10 users simultaneously stream content, the company pays for 10 large data streams and heftier licensing costs. In 2015, Netflix budgeted more than\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"http:\/\/www.investopedia.com\/articles\/investing\/062515\/how-netflix-pays-movie-and-tv-show-licensing.asp\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">$6 billion<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202ffor licensing deals through 2018 &mdash; the streaming video giant&#8217;s largest expense.\u202f<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<h3 class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Tune in to Spotify&#8217;s s<\/span><span class=\"EOP SCX123375739\">olution<\/span><\/h3>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Spotify &mdash; unlike Netflix, HBO, and dozens of others &mdash; handles the problem in a unique way that offers valuable features to users.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\">&nbsp;<\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">The music streaming service uses real-time technology to maintain a live, two-way connection to devices running the app, including laptops, phones, tablets, smart TVs, receivers, and more. This live connection ensures only one song is played at a given time by each Spotify account, regardless of how many people are logged in.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Imagine you&#8217;re jamming to AC\/DC when your cousin decides to listen to Drake using the credentials for your account. Your music cuts off within milliseconds of your relative pressing play, and you&#8217;re notified of the remote access. When you press play to resume &#8220;Thunderstruck,&#8221; your cousin&#8217;s music stops and he gets the same message.<\/span><span class=\"EOP SCX123375739\"><br \/><\/span><\/p>\n<p>&nbsp;<\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">What&#8217;s more, the live connection enables features such as the ability to start a song on a smartphone and switch to another device, like a laptop, without skipping a beat. It&#8217;s an innovative feature that helps Spotify continue to disrupt the music industry while staying compliant.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<h3 class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Sharing beyond the streaming i<\/span><span class=\"EOP SCX123375739\">ndustry<\/span><\/h3>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">So why hasn&#8217;t every streaming provider and secure site followed Spotify&#8217;s lead?<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Until recently, it was difficult to build reliable, high-speed two-way connections. Spotify implemented these connections at a global scale because of its\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"https:\/\/highfive.com\/blog\/how-spotify-built-one-of-the-best-engineering-cultures\/\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">exceptional engineers<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fand worldwide data centers, bu<\/span><span class=\"EOP SCX123375739\">t not every&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">organis<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">ation<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;had such resources.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">But that&#8217;s changed.\u202fToday, global data stream networks are easily plugged into existing content-provider applications. Using technology from companies such as Pusher, Google,&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">PubNub<\/span><\/span><span class=\"EOP SCX123375739\">, and more, content providers<\/span><span class=\"EOP SCX123375739\">&nbsp;can&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">capitalis<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">e<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;on Spotify&#8217;s brilliant solution.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">And it doesn&#8217;t need to stop there.\u202fCloud services\u202f<\/span><a class=\"Hyperlink SCX123375739\" href=\"https:\/\/aws.amazon.com\/streaming-data\/\" rel=\"noreferrer\" ><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">like Amazon<\/span><\/span><\/a><span class=\"EOP SCX123375739\">\u202fhave embraced two-way data stream connections, and the proliferation of publicly accessible Wi-Fi and the FCC wireless spectrum auctions are both set to remove bottlenecks in wireless data transfer capabilities.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">This new manner of authentication will soon move beyond content providers to reinvent how other sectors manage account access. Perhaps there&#8217;s nothing truly wrong with an executive allowing a secretary to log in to his workstation or a family sharing a Netflix account.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n<p class=\"Paragraph SCX123375739\"><span class=\"EOP SCX123375739\">Spotify has&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">revolutionis<\/span><\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">ed<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;content streaming in more ways than it&#8217;s given credit. By the time&nbsp;<\/span><span class=\"EOP SCX123375739\"><span class=\"EOP SCX123375739\">Nosal<\/span><\/span><span class=\"EOP SCX123375739\">&nbsp;is released from prison, the rest of us hopefully won&#8217;t have to worry about being incarcerated for something as prevalent as password sharing.<\/span><span class=\"EOP SCX123375739\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/hocus-focus.jpg\"><\/p>\n<p><em>(c)iStock\/<span>hocus-focus<\/span><\/em><\/p>\n<p><span>According to the&#8239;<\/span><a href=\"https:\/\/www.wired.com\/2014\/11\/hacker-lexicon-computer-fraud-abuse-act\/\" rel=\"noreferrer\" target=\"_blank\"><span><span>Computer Fraud and Abuse Act<\/span><\/span><\/a><span>,&nbsp;<\/span><span><span>unauthoris<\/span><\/span><span><span>ed<\/span><\/span><span>&nbsp;access of computers is a federal crime. However, the law&#8217;s<\/span><span>&nbsp;vague definition of &#8220;<\/span><span><span>unauthoris<\/span><\/span><span><span>ed<\/span><\/span><span>&nbsp;access,&#8221; highlighted by a recent&#8239;<\/span><a href=\"http:\/\/nymag.com\/selectall\/2016\/07\/federal-court-rules-that-password-sharing-is-illegal-under-insane-ancient-law.html\" rel=\"noreferrer\" target=\"_blank\"><span><span>New York court case<\/span><\/span><\/a><span>, has consumer advocates and business groups worried.&#8239;<\/span><span><br \/><\/span><\/p>\n<p><span>This past July, the US Court of Appeals for the Ninth Circuit upheld defendant David&nbsp;<\/span><span><span>Nosal&#8217;s<\/span><\/span><span>&nbsp;conviction for using a colleague&#8217;s login credentials to access his employer&#8217;s research databases.<\/span><span><br \/><\/span><\/p>\n<p><span><span>Nosal<\/span><\/span><span>&nbsp;is far from the first person to be convicted on such charges. In October 2015, former Reuters journalist&#8239;<\/span><a href=\"http:\/\/nymag.com\/selectall\/2016\/04\/matthew-keys-sentencing-computer-crimes.html\" rel=\"noreferrer\" target=\"_blank\"><span><span>Matthew Keys<\/span><\/span><\/a><span>&#8239;was sentenced to two years in prison for sharing usernames and passwords with &#8220;hacktivist&#8221; collective Anonymous.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Despite being illegal, password sharing is ubiquitous. A 2016&nbsp;<\/span><span><span>LastPass<\/span><\/span><span>&nbsp;survey found that a staggering&#8239;<\/span><a href=\"http:\/\/prod.cdata.app.sprinklr.com\/DAM\/434\/Sharing_Survey_Infographic-1-6f0f4580-73be-406a-9115-9d5276273a22-1375330592.pdf\" rel=\"noreferrer\" target=\"_blank\"><span><span>95<\/span><\/span><span><span>%<\/span><\/span><span><span>&nbsp;of U.S. consumers<\/span><\/span><\/a><span>&#8239;share passwords with significant others, children, co-workers, and friends.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Rampant password sharing puts content streaming services, law enforcement, and consumers in a difficult position. Do we prosecute everyone who&#8217;s ever shared a Netflix password? Or do we pretend the law doesn&#8217;t exist and let hackers off the hook?<\/span><span><span>&nbsp;<\/span><br \/><\/span><span><span>&nbsp;<\/span><br \/><\/span><span>Spotify has managed to devise&#8239;<\/span><a href=\"https:\/\/community.spotify.com\/t5\/iOS-iPhone-iPad\/Spotify-on-multiple-devices\/td-p\/30667\" rel=\"noreferrer\" target=\"_blank\"><span><span>a solution<\/span><\/span><\/a><span>&#8239;that avoids the situation altogether.<\/span><span>&nbsp;<\/span><\/p>\n<h3><span>The content access c<\/span><span>onundrum<\/span><span>&nbsp;<\/span><\/h3>\n<p><span>To comply with content owner copyright guidelines, a streaming or clo<\/span><span>ud service user must be&nbsp;<\/span><span><span>authoris<\/span><\/span><span><span>ed<\/span><\/span><span>&nbsp;by the provider. Most websites and online services use password authentication to enforce these rules.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Between password-protected bank, utility, news, and entertainment sites, it&#8217;s common for consumers to juggle dozens of passwords. It&#8217;s also easy for them to share those credentials with others.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>To prevent this account<\/span><span>&nbsp;abuse, content providers&nbsp;<\/span><span><span>analys<\/span><\/span><span><span>e<\/span><\/span><span>&nbsp;login times, locations, and devices to spot suspicious patterns. Service providers send warnings and threatening emails to inform users that account sharing has been spotted, but most of these companies are attacking the wrong problem.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>The&#8239;<\/span><a href=\"https:\/\/www.pubnub.com\/blog\/2014-10-20-mitigate-and-prevent-subscription-sharing-for-saas-companies\/\" rel=\"noreferrer\" target=\"_blank\"><span><span>issue with subscription sharing<\/span><\/span><\/a><span>&#8239;isn&#8217;t unfettered access to gated apps and sites. Frankly, traffic data can be useful to marketers. The real issue is&#8239;simultaneous access to media.<\/span><span><br \/><\/span><\/p>\n<p><span>Netflix, for example, doesn&#8217;t care if 10 people use the same credentials to browse movies. But when all 10 users simultaneously stream content, the company pays for 10 large data streams and heftier licensing costs. In 2015, Netflix budgeted more than&#8239;<\/span><a href=\"http:\/\/www.investopedia.com\/articles\/investing\/062515\/how-netflix-pays-movie-and-tv-show-licensing.asp\" rel=\"noreferrer\" target=\"_blank\"><span><span>$6 billion<\/span><\/span><\/a><span>&#8239;for licensing deals through 2018 &mdash; the streaming video giant&#8217;s largest expense.&#8239;<\/span><span>&nbsp;<\/span><\/p>\n<h3><span>Tune in to Spotify&#8217;s s<\/span><span>olution<\/span><\/h3>\n<p><span>Spotify &mdash; unlike Netflix, HBO, and dozens of others &mdash; handles the problem in a unique way that offers valuable features to users.<\/span><span>&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span>The music streaming service uses real-time technology to maintain a live, two-way connection to devices running the app, including laptops, phones, tablets, smart TVs, receivers, and more. This live connection ensures only one song is played at a given time by each Spotify account, regardless of how many people are logged in.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Imagine you&#8217;re jamming to AC\/DC when your cousin decides to listen to Drake using the credentials for your account. Your music cuts off within milliseconds of your relative pressing play, and you&#8217;re notified of the remote access. When you press play to resume &#8220;Thunderstruck,&#8221; your cousin&#8217;s music stops and he gets the same message.<\/span><span><br \/><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span>What&#8217;s more, the live connection enables features such as the ability to start a song on a smartphone and switch to another device, like a laptop, without skipping a beat. It&#8217;s an innovative feature that helps Spotify continue to disrupt the music industry while staying compliant.<\/span><span>&nbsp;<\/span><\/p>\n<h3><span>Sharing beyond the streaming i<\/span><span>ndustry<\/span><\/h3>\n<p><span>So why hasn&#8217;t every streaming provider and secure site followed Spotify&#8217;s lead?<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Until recently, it was difficult to build reliable, high-speed two-way connections. Spotify implemented these connections at a global scale because of its&#8239;<\/span><a href=\"https:\/\/highfive.com\/blog\/how-spotify-built-one-of-the-best-engineering-cultures\/\" rel=\"noreferrer\" target=\"_blank\"><span><span>exceptional engineers<\/span><\/span><\/a><span>&#8239;and worldwide data centers, bu<\/span><span>t not every&nbsp;<\/span><span><span>organis<\/span><\/span><span><span>ation<\/span><\/span><span>&nbsp;had such resources.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>But that&#8217;s changed.&#8239;Today, global data stream networks are easily plugged into existing content-provider applications. Using technology from companies such as Pusher, Google,&nbsp;<\/span><span><span>PubNub<\/span><\/span><span>, and more, content providers<\/span><span>&nbsp;can&nbsp;<\/span><span><span>capitalis<\/span><\/span><span><span>e<\/span><\/span><span>&nbsp;on Spotify&#8217;s brilliant solution.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>And it doesn&#8217;t need to stop there.&#8239;Cloud services&#8239;<\/span><a href=\"https:\/\/aws.amazon.com\/streaming-data\/\" rel=\"noreferrer\" target=\"_blank\"><span><span>like Amazon<\/span><\/span><\/a><span>&#8239;have embraced two-way data stream connections, and the proliferation of publicly accessible Wi-Fi and the FCC wireless spectrum auctions are both set to remove bottlenecks in wireless data transfer capabilities.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>This new manner of authentication will soon move beyond content providers to reinvent how other sectors manage account access. Perhaps there&#8217;s nothing truly wrong with an executive allowing a secretary to log in to his workstation or a family sharing a Netflix account.<\/span><span>&nbsp;<\/span><\/p>\n<p><span>Spotify has&nbsp;<\/span><span><span>revolutionis<\/span><\/span><span><span>ed<\/span><\/span><span>&nbsp;content streaming in more ways than it&#8217;s given credit. By the time&nbsp;<\/span><span><span>Nosal<\/span><\/span><span>&nbsp;is released from prison, the rest of us hopefully won&#8217;t have to worry about being incarcerated for something as prevalent as password sharing.<\/span><span>&nbsp;<\/span><\/p>\n","protected":false},"author":280,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-26790","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/280"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=26790"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26790\/revisions"}],"predecessor-version":[{"id":26791,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26790\/revisions\/26791"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=26790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=26790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=26790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}