PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal Computer; a low cost machine it hopes will create a winning brand. Several models are produced in quick succession accompanied by an ad campaign featuring a Charlie Chaplin figure. The message is clear: It's cheap and it's cheerful.

The growth vector for the product turns out to be a software application called a spreadsheet. Its many early forms - VisiCalc, Multiplan, Lotus 1-2-3, along with WordStar word-processing and of course games all help drive hardware sales.

Nobody seems to question the rapid and promiscuous spread of these programs by copying onto 5.25" floppy disks and passing them from person to person.

That was then. This is now. Harsh fines and jail sentences are threatened to anyone involved in doing what came naturally back in the early '80s. It's a Very Bad Thing to copy software without having a license to do so. They say 'this stuff is ours, we want to be paid for it', and of course they're right.

But here is a problem. Software's binary information is a kind of digital DNA, always wanting to replicate. It's what has made and sustained the digital revolution. When transmitting information, whether from one disk to another or over the Internet, errors can be corrected, faint signals regenerated as new, and even lost portions of messages recreated. This is the essence of the digital world, and replication is its big trick.

One of the things most of us did with our first computer was to copy something. In our early PC vocabulary COPY was the most popular word. Doing it was so easy and so immediately rewarding. It did nobody any harm ? did it? The user got the software and the manufacturer got their product widely distributed.

But a company has to make money, not just gain market share, and at some point in time a shift occurred. It's as if the manufacturers decided to play the soccer off-side rule and grab the high moral ground at the same time - nearly every PC owner in the world was suddenly wrong-footed. And no one after all can disagree with their position. But how will they play catch-up on their lost revenues? How can they now make all their customers compliant?

A London analyst who specialises in intellectual rights issues says "the paradigm we have at present where the license chases the product doesn't seem to be an effective mechanism for compliance by itself."

In other words trying to push a license into everywhere the software has gone without the ease with which the software got there in the first place will prove difficult. But that's not all.

An account manager for a hardware firm in the US says "It can be difficult to keep the licensing nailed down. The hardware changes, the software moves on, departments, even companies, merge. The picture is always changing"

Demand has always fuelled innovation in Information Technology. Fluid, dynamic, competitive, the elements of IT constantly move. Suppliers apply different strategies at different times for different reasons: Market share, volume shipments, profit. Licensing is a big weapon in their arsenal. Then new technologies emerge, legislation changes, big players go bust and others are created. It's hard to see how a static and legalistic document can cover all this.

There are also the licensing arrangements that software manufacturers employ. Licenses may be priced according to whether they are academic, charity, large volume, product upgrade, competitive upgrade, client server, thin-client, or one of several other types. On top of that there are the popular service add-ons of maintenance and technical support.

Of course if we all started afresh that would make things easier. But as that's impossible we must do two things; look at new software in terms of correct quantity and correct type of license. That's the easy part. The not so easy part is to look at what your company already has and see what licenses, if any, are missing or incorrect.

'The biggest criminal gang in history' is about to be disbanded.

?2003 Jamie Plenderleith
Microsoft Certified Licensing Specialist
Chief Developer - Whaddayagot Pro Asset Management Suite

About The Author

Jamie is a software design engineer with Everyman Technologies of Dublin Ireland. He attends Trinity College Dublin part time and is a Sci-Fi fan.

jamie@everyman.ie

licensed cleaning services Park Ridge ..
In The News:

Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.
Moving and downsizing expose seniors to identity theft and scams as data brokers collect real estate records and personal information to sell to criminals.
ShengShu's Vidar technology revolutionizes humanoid robot training by using AI-generated synthetic video, reducing required training data from hours to just 20 minutes.

Why Build Your Own Gaming Computer?

The best way to get the gaming computer that you... Read More

A Peek Into the Near Future of Electronics Technology

How long do you think DVDs have around? 20 years?... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

Help, I Need a New HDTV! (Part 4 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

What Exactly are Screensavers? - part II

Here are some tips on how to use screensavers:First of... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

Ergonomics and Healthy Computing - Positioning Your Body For Maximum Comfort At Your Computer

Do you remember the old saw about how computers would... Read More

Digital Cameras: Hot Gear with the Coolest Features!

Cameras: still known for taking pictures but assumed as digital... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

Email Management

If you utilize a computer at home or work it... Read More

Cisco CCNA Certification: Five Things To Do DURING The Exam

There are plenty of articles out there about how to... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Tips For Finding Great Deals On Computer Accessories & Supplies

Tip #1. Do a Google search. Don't be to general... Read More

What Are You Looking For In A Cheap MP3 Player?

Are you stymied by the vast offerings in cheap mp3... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

How To Remove One Operating System from a Dual Boot Windows XP Computer

In Windows Xp, you can install two operating systems on... Read More

on demand house cleaning Arlington Heights ..