|
|||||
When the NFL and Apple Music announced Bad Bunny as the 2026 Super Bowl half-time show headliner, the choice surprised some. But to anyone tracking the data over the past few years, it was inevitable. In 2022, Bad Bunnys Un Verano Sin Ti redefined the market, driving Latin musics streaming growth to new heights. It later became the first Spanish-language album nominated for Grammy Album of the Year. The takeaway is simple: When you have accurate, real-time data, you dont guess where culture is going, you know. That kind of foresight is exactly what industries need now, especially as AI accelerates change at a pace that demands evidence, not instinct. In real time, we’re watching AI fundamentally reshape the economics of music, and much of the industry is still arguing that maybe it shouldnt exist at all. The discourse surrounding AI and music is filled with necessary debates, from copyright infringement and artist compensation to vocal cloning and authenticity. These concerns are valid and must be addressed. But while the industry argues about whether AI should change music, our data shows it already is. Some of the resulting evolution has relevant precedent for reference. Some of it requires urgent action. Reliable information, detection, and measurement is required to make sense of it all. Here to stay Whether we like it or not, AI music is here to stay, and rather than fighting it, we should understand its benefits as a tool for artistseither to amplify existing production processes or to introduce new ways of designing music. Recent data from Luminates consumer research shows that 44% of U.S. music listeners say they’re uncomfortable with AI-created songs. But discomfort doesn’t predict behavior. The AI artist Xania Monet (created by Music Designer Telisha Jones) averaged 8 million weekly global on-demand audio streams in October, following her debut on multiple Billboard charts, including Hot Gospel Songs with Let Go, Let Go and Hot R&B Songs with How Was I Supposed to Know? Monets songs touch on emotional healing, life lessons, and heartbreak, pointing to the argument that music at its essence is how it makes you feel and not how its made. This conflicting tension between initial consumer attitudes and actual listening habits is not new. Consider what happened with auto-tune. In 2009, Jay-Z released “D.O.A (Death of Auto-Tune),” declaring war on the technology. That same year, The Black Eyed Peas released “Boom Boom Pow” and “I Gotta Feeling, both anchored by auto-tune production. Today, each of those Black Eyed Peas songs has hundreds of millions of streams in the U.S. Jay-Z’s protest anthem? Less than 40 million. The market spoke. Technological evolution won. Infrastructure evolves If AI continues to earn its place in music productionand all signs point to that inevitable realityit doesnt mean that artists or rights holders have to lose. This is where foresight becomes essential. The sampler wars of the late 1980s offer an instructive parallel. When Biz Markie was sued in 1991 for sampling Gilbert O’Sullivan, the industry faced an existential crisis. The outcome wasn’t suppression of the technology, it was the creation of an entire licensing and clearance infrastructure. Detection and attribution became the foundation of a functioning market. That infrastructure has continued to evolve in the era of streaming and transmedia discovery. Millions are being spent on legacy music catalogs, and those high valuations are proving to be valid. At the midpoint of this year, Becoming Led Zeppelin was the most-viewed new music documentary in the U.S., and its high viewership drove a sustained 23% increase in streams for the bands catalog. Notably, the documentarys release drove Led Zeppelin to its highest-ever weekly total for global on-demand audio streams: 40.4 million in late February. But what happens if AI-generated music infringes on Led Zeppelins copyright during the creation process? I think we can all agree that no one should get away with stealing others creative IP for financial gain. The industry needs to move fast and policy needs to be implemented so that artists and rights holders continue to be paid fairly and rightfully as AIs presence in music expands. At Luminate, our mission is to provide the entertainment industry with essential, objective, and trustworthy data. When it comes to AI, that mission has only become more critical. Our data shows not just what happened, but what’s happening now, and increasingly, what’s about to happen. That visibility is what enables stakeholders across the industry, everyone from labels and publishers to platforms and policymakers, to make informed decisions rather than reactive ones. AI-generated artists designed for scale and low-cost delivery will proliferate. Online and live performance environments will be filled with algorithmically-optimized content. The technology will become more sophisticated, more accessible, and harder to detect without proper infrastructure. We all need to work with the same objective information to navigate these advancements.
Category:
E-Commerce
Almost everywhere you go, from the doctors office to the library to the car dealership, theres one ubiquitous design gem hidden in plain sight: the Bic Cristal. This unsung hero of the writing desk has produced uncountable signatures and annotationsbut now its getting its moment in the spotlight through a collaboration with the Italian home goods brand Seletti. The Bic Cristal is the worlds best-selling pen, boasting more than 120 billion sales since its release in 1950. For the tail end of the pens 75th anniversary, Bic teamed up with Seletti to produce a work of art inspired by the pen: a giant, 12:1 scale lamp. The products massive scale translates particularly well for a lamp, with a clear case revealing a glowing, neon-like LED light inside. It can be positioned vertically or horizontally, and used as a floor lamp, pendant, or wall sconce. The lamp will be available in the pens classic blue, red, and black colorways when it debuts in the U.S. later this year for around $350. [Photo: Bic] Why the Bic Cristal makes a perfect lamp The Bic Cristal is an adaptation of the first-ever ballpoint pen, invented in 1938 by a Hungarian journalist named László Biró (hence the pens common nickname, the Bic Biro). According to a breakdown written for the MoMA exhibition Pirouette: Turning Points in Design, which featured the Bic Crystal, Birós original pen was designed to allow ink to flow more consistently than older fountain pens, but it still had some issues with clogging and leaking. After acquiring Birós patent, Bic founder Marcel Bich adjusted the design to include a smaller, 1-millimeter-wide ballpoint tip with a simple quirk: an air hole, which prevented a vacuum from forming inside the pen. This tiny tweak allows the pen’s ink to flow freely to the nub, and is what makes it such a reliable choice to this day. Aesthetically, Bichs choice of a clear plastic for the pens body reveals how it works and renders it instantly recognizable. Paola Antonelli, MoMAs senior curator of architecture and design, said in the museums breakdown, It almost looks like it is within a crystal tube. It was such a beautiful use of plastic that almost made us think plastic could be precious. [Photo: Bic] Art director Stefano Seletti was similarly drawn to the Bic Cristals sleek, crystalline aesthetic as a potential lighting object for Seletti. Since the brand began dabbling in lighting several years ago, its embraced an out-of-the-box approach to its catalog, playing with everything from animal figures holding light bulbs to an anatomically correct rendition of a human heart. The structure of the pen was absolutely perfect for this project: The transparent tubular body allows light to pass through, the ink cartridge could easily be transformed into the LED that provides the light, and the electrical components could be easily hidden by the colored plastic parts, Seletti says. His team partnered with Italian designer Mario Paroli, as well as with Bic, to bring the Bic Lamp to life. They used Bics archives and technical drawings to faithfully reproduce the pen at a 12-to-1 scale. The final product is an ode to Bics simple-yet-functional design ethosand its the perfect kitsch addition to any space where writing gets done.
Category:
E-Commerce
You sit down at your desk, ready to start the day. Before you can even open your first email, youve already typed in three different passwordseach more complex than the last. By lunchtime, youve repeated the ritual half a dozen times. Its frustrating, its slow, and its happening to millions of employees every single day. This is password fatiguethe silent productivity killer and hidden security risk plaguing modern enterprises. Its more than an annoyance; its a costly vulnerability. Our global survey found that most users still rely on passwords as their primary authentication method. This should concern most organizations, because in an era defined by work-from-everywhere policies, apps, and mobile devices, businesses are still relying on a defense that hasnt meaningfully evolved since the 1960s. Complexity Without Security When it comes to password complexity, organizations are damned if they do and damned if they dont. They either abandon complexity altogetherlook at the Louvre, which used “Louvre” as the password to secure its surveillance systemor require increasingly complex strings of mixed cases, numbers, symbols, frequent changes, and multi-factor authentication (MFA). While intended to strengthen security, complex password requirements can just as easily have the opposite effect. How many times has someone been locked out of their system for days because they forgot their recovery answer, or lost the phone that sends the authentication link needed to grant access? And in how many instances has that person decided to forsake those approved tools and upload sensitive data into a personal Google Driveeasier for them and their colleagues to access, but also easier for cybercriminals to exploit? The tragedy is that added complexity doesnt guarantee safety. Cybercriminals have long since adapted to password advances with credential stuffing and brute-force attacks. But the most effective technique theyre using targets the weakest link in the password chain; not the password itself but the person who created it. Why spend hours trying to pick a lock when the owner will unknowingly hand you the combination? There have been instances of cybercriminals creating look-alike login pages to collect passwords. The massive data breaches that hit MGM Resorts and Clorox were the result of cybercriminals masquerading as legitimate users, asking the IT help desk to reset their password and MFA. These threat actors didnt break inthey logged in. The rise of AI has made the password problem even more urgent. Cybercriminals now use AI to guess passwords, craft flawless phishing emails, and even generate deepfake voices to trick help desk staff. Traditional passwords simply cant withstand this new generation of attacks. According to the 2026 RSA ID IQ Report, 69% of organizations reported an identity-related breach in the last three years, a 27-percentage-point increase from last years survey. These arent abstract statisticsthey represent real financial losses, operational disruption, and reputational harm. And in many cases, they could have been prevented. But how? Employees are burdened with increasingly unmanageable login rituals, yet organizations remain exposed to the very breaches these measures were meant to prevent. So, whats the answer? The Passwordless Solution The most viable way out of this cycle is passwordless authentication. When theres no password to steal, organizations significantly reduce their risks and streamline the login process by eliminating the need to remember, update, or constantly reenter a password string. Passwords typically rely on “something you know” for users to gain access. Passwordless authentication replaces typing in a password with two or more other factors, including “something you have” like a mobile phone or hardware token, or “something you are,” like a face or fingerprint scan. Typically, using those factors manifests in one of three ways, each with its own trade-offs: Authenticator Apps & Push Notifications: What it is: Instead of typing a password, the user enters their username and receives a secure notification on a trusted mobile app asking them to verify the login, often by matching a number. Pros: Highly popular in business environments; relies on the smartphone the user already carries. Cons: Requires the user to have a smartphone with data access; slightly slower than direct biometrics; susceptible to phishing and other attacks. Magic Links: What it is: Similar to the “forgot password” link Instagram or Slack might send you, the system emails a unique link or texts a code to log you in. Pros: No hardware or setup is required; it works on any device with access to email. Cons: While “password-free,” this is not truly “passwordless” in the security sense. It relies on the security of the email inbox (which is often protected only by a weak password) and is still susceptible to phishing and interception. Platform Biometrics (Face ID, Touch ID, Windows Hello): What it is: The user verifies their identity using a fingerprint scan or facial recognition built directly into their laptop or smartphone. Pros: This offers the highest convenience and speed; users are already trained to unlock their phones this way. Cons: It ties the credential to a specific device. If that device is lost or broken, account recovery mechanisms must be robust. What to Look for in an Enterprise-Grade Passwordless Solution If youre evaluating passwordless options for your company, ask yourself these two questions: 1. Is it comprehensive? If your solution only works for one environment or user group, then youll need to bolt on additional solutions to cover everyone and everything. For example, a solution might offer seamless biometric login for modern cloud apps like Office 365, but fail completely with legacy on-premises mainframes or VPNs, forcing users to fall back to passwords for critical internal systems. Your solution must work across every platform, deployment model, and environmentcloud, on-premises, edge, legacy, Microsoft, and macOS. 2. Is it truly secure? Phishing-resistance is a key trend in passwordless solutions, and its a critcal feature for eliminating one of the most frequent and highest-impact attack vectors. But phishing-resistance isnt enoughorganizations also need to be bypass resistant, malware resistant, fraud resistant, and outage resistant. If a cybercriminal can evade passwordless MFA by convincing your IT Help Desk to let them in, then the passwordless method itself isnt worth all that much. Making the Transition Shifting to a different paradigm doesnt happen overnight, but the payoff is immediate. Start with your most critical applications or highest-risk users and choose device-bound passkeys over synced alternatives that allow keys to roam between devices for stronger security. Build rigorous enrollment processes with identity verification and liveness detection, which validates that the biometric source is a live person. In addition, protect your help desk with bilateral verification: this process confirms the caller’s identity via a device prompt and proves the agents legitimacy by displaying their verified status on the callers screen. Plan for secure recovery when devices are lost by establishing high-assurance fallbacks, like pre-registered backup keys or biometric re-verification, instead of passwords. Look for solutions that automatically provide device-bound passkeys when users register the app. Lastly, measure the percentage of passwordless authentications over time against any suspected account compromises to ensure your actions are having a positive impact. By eliminating the daily drain of password fatigue while closing one of the biggest doors to cybercriminals, enterprises can finally reclaim both productivity and peace of mind.
Category:
E-Commerce
All news |
||||||||||||||||||
|
||||||||||||||||||