Welcome to the future
An overview on the inner workings of the MP3 and what makes it superior to older formats
You're on it!
A look at some of the commotion that MP3s have caused in the courtrooms with the recording industry
A quick way to get into the world of digital music through MP3s
Some other documents you may want to check out to learn some more about MP3s
A quick biography of Jack Karlis
A little bit of history

by Jack Karlis

Like any other corner of technology, the MP3 has its own storied history.

In 1988, MPEG (Motion Picture Expert Group) was created to devise a single codec plan for digital audio. A codec is a compression/decompression device in your computer that exports and imports sound or video files for use. Compression is the process in which files are made smaller or larger to be used by a computer. The MPEG-1 was hatched as the definitive standard in audio and video coding.

Unfortunately, MPEG didnít realize the implications that this new technology would run into with copyright law. If everybody was using the same technology, what would stop them from copying things without the approval of the appropriate owners? At this time the Internet was in its infancy, serving as the missing ingredient that would make distribution of pirated material easily accessible. The MP3 is just a more advanced version of the MPEG-1.

The whole distribution of the pirated music mimics the process of mitosis, in which the parent cell eventually becomes an entire legion replicated on the original. This easily can be done with music files, thanks to the MP3.
So what happens when technology advances beyond the MP3? The recording industry has already started to brace itself for this one.

The Secure Digital Music Initiative, a consortium of 15 companies in technology and music, has begun to develop a new form of music that cannot be replicated. A2B and Liquid Audio are two forms that provide even smoother transition from file to playback. Both formats are endorsed by the Secure Digital Music Initiative, unable to play illegal files and use digital watermarks.