Featured Post

LG Operation Strategy Final Report Essay Example

LG Operation Strategy Final Report Paper Household rivalry drove them to rebuild their tasks in early ass, blending the two significant b...

Thursday, December 19, 2019

Short Story - 1021 Words

â€Å"How very unusual, I usually happen to know all of my guests...You are, however, very mysterious, and I do like mysteries,† she purred. Somehow it seemed as if all time had stopped. The background around us began to fade in an unfocused blur of color. The only thing I could sharpen in on now was the woman. Her parted red lips, and her dark liquid eyes that bore into mine. â€Å"Have you a name?† she whispered. â€Å"Jared. And yours?† â€Å"Berona,† she answered. â€Å"And what has brought you here, Jared?† she said, taking in a deep breath, her chest rising. I could feel my heart thumping. I was starting to feel nervous. â€Å"I don’t know,† I said, continuing to lead in our back and forth dance. â€Å"Was it to see me, perhaps?† she said, her eyes tightening. â€Å"I†¦show more content†¦Once you receive a box, and when the clock strikes twelve, you will unclasp it and raise the cup inside. Remember the cup never lies, and so we shall begin.† Everyone nodded in agreement as a group of servants entered the ballroom, handing out boxes. I sifted through the crowd. I had to find Gemma and quick. I had to warn her. The redness in Beronas eyes, something was not right. We had to leave immediately. â€Å"Gemma,† I called, approaching. â€Å"Jared,† she said. Surprise and relief crossed her face, â€Å"Jared what—† â€Å"Gemma we have to leave now.† â€Å"Is something wrong?† â€Å"Yes,† I said, â€Å"there is something very wrong. Quick we need to leave. Suddenly a thudding noise echoed. My eyes shot up, and I could see all the doors had closed, guards standing in front of them. We were locked inside. There was no chance of escape now. â€Å"Excuse me sir, but I have a box for you,† said a servant, ceremoniously proffering a case, the craftsmanship was exceedingly fine. â€Å"And one for you,† said another man, bowing, handing Gemma one as well. After watching Gemma take the box in her hands, I reluctantly accepted mine. But I knew it was inconsequential and impossible, the whole system. A cup that was supposed to tell the moral of ones virtue or character? It was all flawed. A person’s integrity shouldn’t or couldn’t be quantified, and besides the boxes were given randomly, I argued in my mind. Just as I touched the metal clasp, IShow MoreRelatedshort story1018 Words   |  5 Pagesï » ¿Short Stories:  Ã‚  Characteristics †¢Short  - Can usually be read in one sitting. †¢Concise:  Ã‚  Information offered in the story is relevant to the tale being told.  Ã‚  This is unlike a novel, where the story can diverge from the main plot †¢Usually tries to leave behind a  single impression  or effect.  Ã‚  Usually, though not always built around one character, place, idea, or act. †¢Because they are concise, writers depend on the reader bringing  personal experiences  and  prior knowledge  to the story. Four MajorRead MoreThe Short Stories Ideas For Writing A Short Story Essay1097 Words   |  5 Pageswriting a short story. Many a time, writers run out of these short story ideas upon exhausting their sources of short story ideas. If you are one of these writers, who have run out of short story ideas, and the deadline you have for coming up with a short story is running out, the short story writing prompts below will surely help you. Additionally, if you are being tormented by the blank Microsoft Word document staring at you because you are not able to come up with the best short story idea, youRead MoreShort Story1804 Words   |  8 PagesShort story: Definition and History. A  short story  like any other term does not have only one definition, it has many definitions, but all of them are similar in a general idea. According to The World Book Encyclopedia (1994, Vol. 12, L-354), â€Å"the short story is a short work of fiction that usually centers around a single incident. Because of its shorter length, the characters and situations are fewer and less complicated than those of a novel.† In the Cambridge Advanced Learner’s DictionaryRead MoreShort Stories648 Words   |  3 Pageswhat the title to the short story is. The short story theme I am going conduct on is â€Å"The Secret Life of Walter Mitty’ by James Thurber (1973). In this short story the literary elements being used is plot and symbols and the theme being full of distractions and disruption. The narrator is giving a third person point of view in sharing the thoughts of the characters. Walter Mitty the daydreamer is very humorous in the different plots of his dr ifting off. In the start of the story the plot, symbols,Read MoreShort Stories1125 Words   |  5 PagesThe themes of short stories are often relevant to real life? To what extent do you agree with this view? In the short stories â€Å"Miss Brill† and â€Å"Frau Brechenmacher attends a wedding† written by Katherine Mansfield, the themes which are relevant to real life in Miss Brill are isolation and appearance versus reality. Likewise Frau Brechenmacher suffers through isolation throughout the story and also male dominance is one of the major themes that are highlighted in the story. These themes areRead MoreShort Story and People1473 Words   |  6 Pagesï » ¿Title: Story Of An Hour Author: Kate Chopin I. On The Elements / Literary Concepts The short story Story Of An Hour is all about the series of emotions that the protagonist, Mrs. Mallard showed to the readers. With the kind of plot of this short story, it actually refers to the moments that Mrs. Mallard knew that all this time, her husband was alive. For the symbol, I like the title of this short story because it actually symbolizes the time where Mrs. Mallard died with joy. And with thatRead MoreShort Story Essay1294 Words   |  6 PagesA short story concentrates on creating a single dynamic effect and is limited in character and situation. It is a language of maximum yet economical effect. Every word must do a job, sometimes several jobs. Short stories are filled with numerous language and sound devices. These language and sound devices create a stronger image of the scenario or the characters within the text, which contribute to the overall pre-designed effect.As it is shown in the metaphor lipstick bleeding gently in CinnamonRead MoreRacism in the Short Stor ies1837 Words   |  7 PagesOften we read stories that tell stories of mixing the grouping may not always be what is legal or what people consider moral at the time. The things that you can learn from someone who is not like you is amazing if people took the time to consider this before judging someone the world as we know it would be a completely different place. The notion to overlook someone because they are not the same race, gender, creed, religion seems to be the way of the world for a long time. Racism is so prevalentRead MoreThe Idol Short Story1728 Words   |  7 PagesThe short stories â€Å"The Idol† by Adolfo Bioy Casares and â€Å"Axolotl† by Julio Cortà ¡zar address the notion of obsession, and the resulting harm that can come from it. Like all addictions, obsession makes one feel overwhelmed, as a single thought comes to continuously intruding our mind, causing the individual to not be able to ignore these thoughts. In â€Å"Axolotl†, the narr ator is drawn upon the axolotls at the Jardin des Plantes aquarium and his fascination towards the axolotls becomes an obsession. InRead MoreGothic Short Story1447 Words   |  6 Pages The End. In the short story, â€Å"Emma Barrett,† the reader follows a search party group searching for a missing girl named Emma deep in a forest in Oregon. The story follows through first person narration by a group member named Holden. This story would be considered a gothic short story because of its use of setting, theme, symbolism, and literary devices used to portray the horror of a missing six-year-old girl. Plot is the literal chronological development of the story, the sequence of events

Wednesday, December 11, 2019

Business System Analysis Cheat Sheet free essay sample

A system is a set of steps (process) put together to accomplish a task. An information system (IS) is an arrangement of people, data, processes, and information technology that interact to collect, process, store, and provide as output the information needed to support an organization. Types of IS : A transaction processing system (TPS): captures and processes data about business transactions. A management information system (MIS): provides for management-oriented reporting based on other computer systems. A decision support system (DSS): provides information to help make decisions. An expert system: captures the expertise of workers and then simulates that expertise to the benefit of nonexperts. A communications and collaboration system: enables more effective communications between workers, partners, customers, and suppliers to enhance their ability to collaborate. An office automation system: supports the wide range of business office activities that provide for improved work flow between workers. Systems analyst – a specialist who studies the problems and needs of an organization to determine how people, data, processes, and information technology can best accomplish improvements for the business. Chap2 : Information systems architecture a unifying framework into which various stakeholders with different perspectives can organize and view the fundamental building blocks of information systems. Knowledge (ERD), process (UML) and communication (Interface). Chap3 : Capability Maturity Model (CMM) – a standardized framework for assessing the maturity level of an organization’s information system development and management processes and products. Model-driven development – a system development strategy that emphasizes the drawing of system models to help visualize and analyze problems, define business requirements, and design information systems. Process modeling – a process-centered technique popularized by the structured analysis and design methodology that used models of business process requirements to derive effective software designs for a system. Data modeling – a data-centered technique used to model business data requirements and design database systems that fulfill those requirements. Object modeling – a technique that attempts to merge the data and process concerns into singular constructs called objects. Object models are diagrams that document a system in terms of its objects and their interactions. Chap4 : Project management – the process of scoping, planning, staffing, organizing, directing, and controlling the development of an acceptable system at a minimum cost within a specified time frame. Process management – the activity of documenting, managing, and continually improving the process of systems development. Joint project planning (JPP) – a strategy in which all stakeholders attend an intensive workshop aimed at reaching consensus on project decisions. Chap5: Discovery Prototyping: a technique used to identify the users’ business requirements by having them react to a quick-and-dirty implementation of those requirements. Rapid Architected Analysis: an approach that attempts to derive system models from existing systems or discovery prototypes. Requirements discovery – the process, used by systems analysts of identifying or extracting system problems and solution requirements from the user community. Approaches include: Fact-finding – the process of collecting information about system problems, opportunities, solution requirements, and priorities via sampling, research, observation, questionnaires and surveys, and interviews. Joint requirements planning (JRP) – the use of facilitated workshops to bring together all of the system owners, users, and analysts, and some systems designer and builders to jointly perform systems analysis. JRP is generally considered a part of a larger method called joint application development (JAD), a more comprehensive application of the JRP techniques to the entire systems development process. Business process redesign (BPR) – the application of systems analysis methods to the goal of dramatically changing and improving the fundamental business processes of an organization, independent of information technology. Agile method – the integration of various approaches of systems analysis and design for applications as deemed appropriate to the problem being solved and the system being developed. Chap6: Use-case modeling – the process of modeling a system’s functions in terms of business events, who initiated the events, and how the system responds to those events. Use-case modeling has roots in object-oriented modeling. Use case – a behaviorally related sequence of steps (a scenario), both automated and manual, for the purpose of completing a single business task. Description of system functions from the perspective of external users in terminology they understand. Use-case diagram – a diagram that depicts the interactions between the system and external systems and users. It graphically describes who will use the system and in what ways the user expects to interact with the system. Use-case narrative – a textual description of the business even and how the user will interact with the system to accomplish the task. Extension use case – a use case consisting of steps extracted from a more complex use case in order to simplify the original case and thus extend its functionality. Abstract use case – a use case that reduces redundancy among two or more other use cases by combining the common steps found in those cases. Depends On – a use case relationship that specifies which other use cases must be performed before the current use case. Inheritance – a use case relationship in which the common behavior of two actors initiating the same use case is extrapolated and assigned to a new abstract actor to reduce redundancy. Chap8: Data modeling – a technique for organizing and documenting a system’s data. Sometimes called database modeling. Entity relationship diagram (ERD) – a data model utilizing several notations to depict data in terms of the entities and relationships described by that data. Entity – a class of persons, places, objects, events, or concepts about which we need to capture and store data. Attribute or elements – a descriptive property or characteristic of an entity. Compound attribute – an attribute that consists of other attributes. Synonyms in different data modeling languages are numerous: concatenated attribute, composite attribute, and data structure. Key – an attribute, or a group of attributes, that assumes a unique value for each entity instance. It is sometimes called an identifier. Concatenated key a group of attributes that uniquely identifies an instance of an entity. Synonyms include composite key and compound key. Candidate key – one of a number of keys that may serve as the primary key of an entity. Also called a candidate identifier. Primary key – a candidate key that will most commonly be used to uniquely identify a single entity instance. Alternate key – a candidate key that is not selected to become the primary key is called an alternate key. A synonym is secondary key. Cardinality – the minimum and maximum number of occurrences of one entity that may be related to a single occurrence of the other entity. Associative entity – an entity that inherits its primary key from more than one other entity (called parents). Foreign key – a primary key of an entity that is used in another entity to identify instances of a relationship. Nonspecific relationship – a relationship where many instances of an entity are associated with many instances of another entity. Also called many-to-many relationship. Normalization – a data analysis technique that organizes data into groups to form nonredundant, stable, flexible, and adaptive entities. First normal form (1NF) – an entity whose attributes have no more than one value for a single instance of that entity. Second normal form (2NF) – an entity whose nonprimary-key attributes are dependent on the full primary key. Third normal form (3NF) – an entity whose nonprimary-key attributes are not dependent on any other non-primary key attributes. System Analysis: Study of an organization’s policies and procedures and processes. It involves breaking down these processes, studying the processes and interactions. The processes are documented using narratives and diagrams.

Wednesday, December 4, 2019

The technology impacts on music industry Essay Example For Students

The technology impacts on music industry Essay Introduction The music industry is the business of producing, recording and selling music through a number of different methods. These methods typical refer to recording and selling music through physical or digital means, including live performance. The product offered by the music industry are varied over years, from the very first beginning of tape cassettes, and then to CDC, till now, digital music records have become more popular comparing to others. Although the mainstream of production in music industry changes a lot, live performance of music is still an important part of industry s it allows performers to establish new fans and give old fans a chance to hear the music in a live venue. Beside this, music radio still typically plays a major part because they have traditionally been as a platform for new songs and performer showing and promoting. However, the influence of digital contribution in the music radio industry is also obviously. We will write a custom essay on The technology impacts on music industry specifically for you for only $16.38 $13.9/page Order now In this article, I will analysis the impact of digital evolution on music recording and selling industry, and music artists career. I will focus more on the influence of digital towards the record labels. In the end, I will give mom recommendations on how the future of music industry should be like to be better off. Digital convergence and record labels The traditional business model in the music industry includes the mass production and distribution of physical goods (Hughes Lang, 2003). In this model, for the better part of a hundred years the recorded music business had an impressive track record of staying on top of the freshest technology, up until 1980, recorded music was an ecosystem totally run by the major record labels (Bobby, 2014). Record labels are selecting artists and signing with them, manufacturing the products, such as CDC, ND distribute through music stores and artist will sell it at concerts as well (Valerie Deborah, 2004). The main revenue comes from the sales of the products, including CDC, cassettes and concert tickets and so on. They are promoting the product via print media and radio mostly. The music industry was enjoying low manufacturing and high price of products. The high cost in music made music such luxurious and the spread of music is not very wide compare to nowadays. The record label was in the centre of the industry and each activity in this industry must get its approval fore progressing. The money in the music industry flowed mainly to the record labels. They are the master of their own domain. However in the last few years, the recording industry has gone through great changes because of the introduction of digital technology. In 1999, Anapest, a piece of software created by Shawn Fanning, brought about a major change in the industry (Pablo, 2013). Anapest as the pioneer of semi-centralized services, operated in a client server peer-to-peer model, where a central server system facilitates communication among peer clients (Kate, 2005). The appearance of Anapest provides a tool to share the music files through the internet directly among fans and The technology impacts on music industry By hence enthusiasts find and discuss music on the internet (David Starling, 2005). It can be say that Anapest was changing the music industry by permitting almost anyone to reproduce and distribute digital content at close to zero marginal cost over highly decentralized peer-to-peer computing architectures (David Starling, 2005). This, in my own opinion, is because of the demand for the cheap or free music by the nonusers. Anapest had more than 60 million users worldwide before it was shut down by the U. S. Court system (Valerie Deborah, 2004). The market research submitted by the Arias expert showed that 41% of the people said that Anapest decrease or displaced music purchase (David Starling, 2005). Anapest was sued by ARIA for illegal, unauthorized peer-to-peer music file trading via the internet. However, the law of copyright was only effectively regulating the publishers at that time (Lawrence, 2001). .u2f71a3775771267f168b1a56dea578ac , .u2f71a3775771267f168b1a56dea578ac .postImageUrl , .u2f71a3775771267f168b1a56dea578ac .centered-text-area { min-height: 80px; position: relative; } .u2f71a3775771267f168b1a56dea578ac , .u2f71a3775771267f168b1a56dea578ac:hover , .u2f71a3775771267f168b1a56dea578ac:visited , .u2f71a3775771267f168b1a56dea578ac:active { border:0!important; } .u2f71a3775771267f168b1a56dea578ac .clearfix:after { content: ""; display: table; clear: both; } .u2f71a3775771267f168b1a56dea578ac { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2f71a3775771267f168b1a56dea578ac:active , .u2f71a3775771267f168b1a56dea578ac:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2f71a3775771267f168b1a56dea578ac .centered-text-area { width: 100%; position: relative ; } .u2f71a3775771267f168b1a56dea578ac .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2f71a3775771267f168b1a56dea578ac .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2f71a3775771267f168b1a56dea578ac .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2f71a3775771267f168b1a56dea578ac:hover .ctaButton { background-color: #34495E!important; } .u2f71a3775771267f168b1a56dea578ac .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2f71a3775771267f168b1a56dea578ac .u2f71a3775771267f168b1a56dea578ac-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2f71a3775771267f168b1a56dea578ac:after { content: ""; display: block; clear: both; } READ: Duke Ellington Biography EssayIn the situation that the law of copyright was not consummate, he court could not accuse Anapest for infringing copyright at first because Anapest argued that its users practice of sampling music as a way to inform purchasing decisions was a legitimate fair use (David Starling, 2005). At that time, the music industry had no guidelines for how to charge licensing fees for sample music, so that it made challenges for court to charge Anapest. However, the win of the ARIA did not stop the free music sharing in the internet and the law of copyright still has vulnerabilities exist. Part of the reason Anapest was vulnerable to legal action was hat is represented a centralized target, and its status as a company meant that ultimately it had to take responsibility for activities taking place via central server( Kate, 2005). Because of the pressure from external, the internet is forced to general changes and makes innovations, both legal and illegal. After Anapest, the decentralized peer-to-peer networks appeared. This model has no central server, communication on the network traverses the peers themselves, and these individual computers are then linked together to form an advertisement hoc ratable network (Kate, 2005). For illegal network for example, Neutral is Just a program but the company to offering particular service through system, and they avoiding sues by attempting sue individuals using network to download unauthorized content, which makes it hard for ARIA to protect its rights and revenues. And later on, networks seeks to safeguard their users by hiding its users details using techniques such as encryption. For legal network it includes legitimate online digital music services through POP services. For example tunes, it pays to the record labels to get licenses and sold the digital music ill on their web. It priced $0. 99 per song, $0. 75 goes to the record label, and $0. 05 goes to the credit card companies and left only $0. 20 for company to cover all of its cost (Kate, 2005). Initially, Apply tunes does not expect to raise its revenue by selling music files but to stimulate the purchase of pod (Kate, 2005). Revenue model Both legal and illegal networks can raise their capital by 3 ways. The first source is from advertising of course (Kate, 2005). The second one is that music sharing networks can collect download rating data and sell it towards record labels as big which is more preferred by the customers. Additions to this some illegal networks will track the consumers Web browsing history and send promotional messages (Kate, 2005). And the last source is that collecting capital by selling licenses to independent artists who wants to post their content online (Kate, 2005). The annual global music sales declined by more than $2 million from 1999 to 2002 attribute to unauthorized online POP file trading, and offline piracy (Valerie Deborah, 2004). And the revenue and sales of record labels fell more than 40% since online music sharing was introduced. But the POP music file trading not Just change the situation of record labels, ultimately, it also changes the career of music artists. Digital convergence and independent artists In the past, the artists were controlled over by the record labels. They dont have many options to fund their recordings, tours or projects in general without signing up with record labels (Pablo, 2013). The most important reason is that the artists do not have the equipment to record high quality music and distribute them without the supply of record labels. However, in nowadays, the innovation of digital tools aromatically changes the horizon of access for those who would like to create new music (Lawrence, 2001). For example, Apple technology can create music by the computer instead of instruments. Its advertisement said: rip, mix, burn, after all, its your music. And again, the copyright law has to be mentioned. Just because you recreated the song doesnt mean that is your music! .ucb88c9415c1b9b9499e666f77d4c6e70 , .ucb88c9415c1b9b9499e666f77d4c6e70 .postImageUrl , .ucb88c9415c1b9b9499e666f77d4c6e70 .centered-text-area { min-height: 80px; position: relative; } .ucb88c9415c1b9b9499e666f77d4c6e70 , .ucb88c9415c1b9b9499e666f77d4c6e70:hover , .ucb88c9415c1b9b9499e666f77d4c6e70:visited , .ucb88c9415c1b9b9499e666f77d4c6e70:active { border:0!important; } .ucb88c9415c1b9b9499e666f77d4c6e70 .clearfix:after { content: ""; display: table; clear: both; } .ucb88c9415c1b9b9499e666f77d4c6e70 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ucb88c9415c1b9b9499e666f77d4c6e70:active , .ucb88c9415c1b9b9499e666f77d4c6e70:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ucb88c9415c1b9b9499e666f77d4c6e70 .centered-text-area { width: 100%; position: relative ; } .ucb88c9415c1b9b9499e666f77d4c6e70 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ucb88c9415c1b9b9499e666f77d4c6e70 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ucb88c9415c1b9b9499e666f77d4c6e70 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ucb88c9415c1b9b9499e666f77d4c6e70:hover .ctaButton { background-color: #34495E!important; } .ucb88c9415c1b9b9499e666f77d4c6e70 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ucb88c9415c1b9b9499e666f77d4c6e70 .ucb88c9415c1b9b9499e666f77d4c6e70-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ucb88c9415c1b9b9499e666f77d4c6e70:after { content: ""; display: block; clear: both; } READ: Musical Education Opportunities in America EssayFor distribution, by paying low membership fees to the music distributing website such as amp. Com. AU, these independent artists can upload their music file to public. Within the easy way to compose and distribute music, independent musicians have heir own way to make a living and many of the people following them because they are more free to create the music they like. The future music industry To respond the decrease of sales, record labels should shift their attention from suing the piracy to promotion and marketing (Freedman, 2003). The record labels had more than one crisis because they have difficulties to accepting new technologies and styles of sale. In my view of point, maybe they should totally change their revenue structure. Till now, the main income of record labels is the sales of music in form of both physical and digital. They ignore the income from derivative industry of music, for example the photo albums of their artists, the tickets of the concerts, the product that contain the element of artists. Animation industry can collect money by selling their cartoon toys and cups printed with cartoon characters. How about music industry? Record labels can freely supply the music to the popular music website and share the advertisement revenue with these websites. By promoting the song in the internet, the influence of the song will increase and then the artist will get more famous, and ultimately, the sales in derivative industry will increase too. Additional to this, if the popularity of the artist improves, companies can seek higher influence of artist, record label can raise more capital. Conclusion The introduction of new technology is always disruptive to old markets and particular to those copyright holders whose works are sold through will-established distribution mechanism (Kate, 2005). Yet, all the activities are driving by the demand of the market. The record labels will end if they do not seek new ways to make an opportunity. According to most of the experts, the music industry created it own estimates because it refuse to adopt and adapt the new digital innovation until it was too late