PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal Computer; a low cost machine it hopes will create a winning brand. Several models are produced in quick succession accompanied by an ad campaign featuring a Charlie Chaplin figure. The message is clear: It's cheap and it's cheerful.

The growth vector for the product turns out to be a software application called a spreadsheet. Its many early forms - VisiCalc, Multiplan, Lotus 1-2-3, along with WordStar word-processing and of course games all help drive hardware sales.

Nobody seems to question the rapid and promiscuous spread of these programs by copying onto 5.25" floppy disks and passing them from person to person.

That was then. This is now. Harsh fines and jail sentences are threatened to anyone involved in doing what came naturally back in the early '80s. It's a Very Bad Thing to copy software without having a license to do so. They say 'this stuff is ours, we want to be paid for it', and of course they're right.

But here is a problem. Software's binary information is a kind of digital DNA, always wanting to replicate. It's what has made and sustained the digital revolution. When transmitting information, whether from one disk to another or over the Internet, errors can be corrected, faint signals regenerated as new, and even lost portions of messages recreated. This is the essence of the digital world, and replication is its big trick.

One of the things most of us did with our first computer was to copy something. In our early PC vocabulary COPY was the most popular word. Doing it was so easy and so immediately rewarding. It did nobody any harm ? did it? The user got the software and the manufacturer got their product widely distributed.

But a company has to make money, not just gain market share, and at some point in time a shift occurred. It's as if the manufacturers decided to play the soccer off-side rule and grab the high moral ground at the same time - nearly every PC owner in the world was suddenly wrong-footed. And no one after all can disagree with their position. But how will they play catch-up on their lost revenues? How can they now make all their customers compliant?

A London analyst who specialises in intellectual rights issues says "the paradigm we have at present where the license chases the product doesn't seem to be an effective mechanism for compliance by itself."

In other words trying to push a license into everywhere the software has gone without the ease with which the software got there in the first place will prove difficult. But that's not all.

An account manager for a hardware firm in the US says "It can be difficult to keep the licensing nailed down. The hardware changes, the software moves on, departments, even companies, merge. The picture is always changing"

Demand has always fuelled innovation in Information Technology. Fluid, dynamic, competitive, the elements of IT constantly move. Suppliers apply different strategies at different times for different reasons: Market share, volume shipments, profit. Licensing is a big weapon in their arsenal. Then new technologies emerge, legislation changes, big players go bust and others are created. It's hard to see how a static and legalistic document can cover all this.

There are also the licensing arrangements that software manufacturers employ. Licenses may be priced according to whether they are academic, charity, large volume, product upgrade, competitive upgrade, client server, thin-client, or one of several other types. On top of that there are the popular service add-ons of maintenance and technical support.

Of course if we all started afresh that would make things easier. But as that's impossible we must do two things; look at new software in terms of correct quantity and correct type of license. That's the easy part. The not so easy part is to look at what your company already has and see what licenses, if any, are missing or incorrect.

'The biggest criminal gang in history' is about to be disbanded.

?2003 Jamie Plenderleith
Microsoft Certified Licensing Specialist
Chief Developer - Whaddayagot Pro Asset Management Suite

About The Author

Jamie is a software design engineer with Everyman Technologies of Dublin Ireland. He attends Trinity College Dublin part time and is a Sci-Fi fan.

jamie@everyman.ie

green cleaning service Park Ridge ..
In The News:

Your home address is easily accessible on people finder sites, putting you at risk for stalking and identity theft, but data removal services can help protect your personal information.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Robot combat evolves at Unitree's Iron Fist King event as G1 robots face off in China, featuring knockouts, precise strikes and agile machines that can perform side flips.
Take control of your digital privacy with actionable tips like Facebook privacy checkup, location tracking management and data removal services to protect your personal information.
Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power them on; infections have been detected in 222 countries.
The lightweight, 15-pound Tenniix tennis robot mimics pro playing styles like Nadal and Federer, using AI trained on 8,000 hours of professional tennis data.
Oak Ridge's uranium enrichment facility supports America's AI ambitions amid concerns that China's aggressive nuclear reactor construction could give it an edge in powering data centers.
Facebook scam ads now leverage AI and deepfakes to create convincing celebrity endorsements, targeting specific demographics with sophisticated schemes.
Apple unveils iOS 26, macOS 26 Tahoe and iPadOS 26 with translucent Liquid Glass design at WWDC 2025, featuring ChatGPT integration as competitors advance rapidly.
The Atom Touch prosthetic arm combines an AI neural interface with EMG sensors, allowing amputees to control individual fingers with precision at an affordable $25,000.
Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data the AI technology gives.
Tech expert Kurt “CyberGuy" Knutsson says iPads are usually secure, but hackers can access them. Spot warning signs early to protect your data.
Tech expert Kurt Knutsson reveals how to easily move photos and videos off your iPhone or Android to securely protect your favorite moments.
The Social Security Administration is launching digital SSN access this summer. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to use it and protect your identity.
Glide underwater with CudaJet and make the ocean your playground. Kurt “CyberGuy" Knutsson discusses the redesigned tech that might be your next big thrilling adventure.
Protect yourself from login alert scams with five security steps, including avoiding suspicious links, checking account activity and enabling two-factor authentication
Skip the usual Father's Day gifts with personalized ideas for tech enthusiasts, home brewers, pool owners, seniors, outdoor lovers and privacy-conscious dads.
DMV text scam alert: Fraudsters impersonating motor vehicle departments nationwide are sending threatening messages about unpaid tickets and tolls to steal your information.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
E-BAR, MIT's mobile robot, provides physical support for seniors with handlebars that follow from behind, helping prevent falls while maintaining dignity for aging adults.
AI is changing everything – now, we can even use it to generate video. I tried OpenAI's Sora and Google's Veo – here's how they measure up against each other.
Five simple phone setting tweaks that make your device work harder for you, from automatic text message deletion to scheduled focus modes.
Android users can save time with 10 simple automations, including automatic battery saver mode, location-based Wi-Fi settings and scheduled "Do Not Disturb" mode.
Personal information from 364,000 people was compromised in a LexisNexis data breach that went undetected for months, highlighting privacy risks.
The Phantom 3500 jet features a windowless design that reduces drag and structural weak points, burning 50% less fuel than conventional business jets.

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

More Cool Web Tricks

If you ask most people what frustrates them most about... Read More

If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

I am going to assume that you are running windows... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Lightning Season: How to Avoid Data Loss

We have just entered the time of year that most... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

Anti-Skip Protection on Mp3 Players

There have been some questions on anti-skip protection on mp3... Read More

Selecting the Perfect Big Screen TV

Selecting a TV isn't as easy as it used to... Read More

Bluetooth Headphones For Your PDA

Nothing is worse than having to negotiate all kinds of... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

The Ipod Mini: Why Its Not that Hot

I got my eyes set on a iPod mini, as... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

Compare MP3 Players for the Coolest Features and Sweetest Deals

How can you compare mp3 players to be sure you're... Read More

Smart Apple iPod Tips and Techniques

Are you thinking of buying an Apple iPod? Or have... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Passwords and the Human Factor

Passwords have a strange dual nature. The stronger and safer... Read More

Why Get a Microsoft MCSE Certification?

In the years of the dot com boom and bust,... Read More

cleaning help near Bannockburn ..