PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal Computer; a low cost machine it hopes will create a winning brand. Several models are produced in quick succession accompanied by an ad campaign featuring a Charlie Chaplin figure. The message is clear: It's cheap and it's cheerful.

The growth vector for the product turns out to be a software application called a spreadsheet. Its many early forms - VisiCalc, Multiplan, Lotus 1-2-3, along with WordStar word-processing and of course games all help drive hardware sales.

Nobody seems to question the rapid and promiscuous spread of these programs by copying onto 5.25" floppy disks and passing them from person to person.

That was then. This is now. Harsh fines and jail sentences are threatened to anyone involved in doing what came naturally back in the early '80s. It's a Very Bad Thing to copy software without having a license to do so. They say 'this stuff is ours, we want to be paid for it', and of course they're right.

But here is a problem. Software's binary information is a kind of digital DNA, always wanting to replicate. It's what has made and sustained the digital revolution. When transmitting information, whether from one disk to another or over the Internet, errors can be corrected, faint signals regenerated as new, and even lost portions of messages recreated. This is the essence of the digital world, and replication is its big trick.

One of the things most of us did with our first computer was to copy something. In our early PC vocabulary COPY was the most popular word. Doing it was so easy and so immediately rewarding. It did nobody any harm ? did it? The user got the software and the manufacturer got their product widely distributed.

But a company has to make money, not just gain market share, and at some point in time a shift occurred. It's as if the manufacturers decided to play the soccer off-side rule and grab the high moral ground at the same time - nearly every PC owner in the world was suddenly wrong-footed. And no one after all can disagree with their position. But how will they play catch-up on their lost revenues? How can they now make all their customers compliant?

A London analyst who specialises in intellectual rights issues says "the paradigm we have at present where the license chases the product doesn't seem to be an effective mechanism for compliance by itself."

In other words trying to push a license into everywhere the software has gone without the ease with which the software got there in the first place will prove difficult. But that's not all.

An account manager for a hardware firm in the US says "It can be difficult to keep the licensing nailed down. The hardware changes, the software moves on, departments, even companies, merge. The picture is always changing"

Demand has always fuelled innovation in Information Technology. Fluid, dynamic, competitive, the elements of IT constantly move. Suppliers apply different strategies at different times for different reasons: Market share, volume shipments, profit. Licensing is a big weapon in their arsenal. Then new technologies emerge, legislation changes, big players go bust and others are created. It's hard to see how a static and legalistic document can cover all this.

There are also the licensing arrangements that software manufacturers employ. Licenses may be priced according to whether they are academic, charity, large volume, product upgrade, competitive upgrade, client server, thin-client, or one of several other types. On top of that there are the popular service add-ons of maintenance and technical support.

Of course if we all started afresh that would make things easier. But as that's impossible we must do two things; look at new software in terms of correct quantity and correct type of license. That's the easy part. The not so easy part is to look at what your company already has and see what licenses, if any, are missing or incorrect.

'The biggest criminal gang in history' is about to be disbanded.

?2003 Jamie Plenderleith
Microsoft Certified Licensing Specialist
Chief Developer - Whaddayagot Pro Asset Management Suite

About The Author

Jamie is a software design engineer with Everyman Technologies of Dublin Ireland. He attends Trinity College Dublin part time and is a Sci-Fi fan.

jamie@everyman.ie

Rolling Meadows Cadillac Escalade rental .. Lockport Chicago limo O’Hare
In The News:

There are a number of features with AirPods you may or may not know about to take your listening experience to the next level. Kurt the CyberGuy explains.
These 35 Chrome extensions have privacy and security concerns. Tech expert Kurt “CyberGuy" Knutsson says to delete them now.
Tech expert Kurt “CyberGuy" Knutsson says 329,000 mph fusion rocket promises to be fast, disruptive and enable deep-space missions.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech expert Kurt “CyberGuy" Knutsson says a new autonomous AI is a game changer that also raises privacy risks. Is your data safe?
Tech expert Kurt “CyberGuy" Knutsson says robots and drones are revolutionizing fruit farming with faster picking and smarter handling.
Landmark Admin revises May 2024 cyberattack scope to show twice as many people were affected. Kurt “CyberGuy" Knutsson gives tips to help stay safe from an insurance data breach.
Tech expert Kurt “CyberGuy" Knutsson talks about how Yamaha’s hydrogen outboard motor could revolutionize boating with zero emissions.
Tech expert Kurt “CyberGuy" Knutsson reveals how to memorialize or remove a deceased loved one’s Facebook account and protect their digital legacy from misuse or scams.
Tech expert Kurt “CyberGuy" Knutsson says an Apple Watch saved psychiatrist Amanda Faulkner by detecting deadly leukemia early.
Scammers and fraudsters are increasingly targeting the most vulnerable, especially nursing homes and the personal data of their residents. Kurt the CyberGuy has safety tips.
Infected USB flash drives can spread malware among multiple organizations in ways that can easily bypass traditional security systems.
With a fully automated warehouse system and AI-powered robots, Ocado's Hive picks, packs and delivers grocery store orders in just a few minutes.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Recycling robots are using artificial intelligence to learn how to sort recyclables by recognizing patterns in colors, textures, shapes and logos.
The Reachy 2 robot is designed to be friendly and approachable, inviting natural interaction and is perfect for research, education and experimenting with embodied AI.
Kurt "CyberGuy" Knutsson shares several easy ways to keep your credit cards safe from digital thieves while you're traveling this summer.
Arcturus sets up cameras around the edges of baseball stadiums to capture real-time action and generate a 3D digital clone of the game.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The CyberGuy explains why healthcare organizations are vulnerable to hackers after there have been a half dozen data breaches this year.
Developed at two California universities, the innovative technology combines brain-computer interfaces with advanced AI to decode neural activity into audible speech.
Microsoft patches 12 critical flaws, but six have already been exploited by criminals. Kurt “CyberGuy" Knutsson says updating your system is only a short-term fix.
Tech expert Kurt “CyberGuy" Knutsson discusses how robots can milk, feed and clean cows on dairy farms, boosting efficiency and comfort.
Tech expert Kurt “CyberGuy" Knutsson says quantum internet ensures unhackable security and redefines online privacy and speed.
Kawasaki's CORLEO is a hydrogen-powered, AI-driven rideable robot. Tech expert Kurt “CyberGuy" Knutsson reports on this new way of thinking about off-road transportation.

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

Spyware Remover

Your first step in removing dangerous infections from your computer... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

Is Online DVD Rental or Pay-Per-View the Best Way to Get Your Movies?

With renting methods such as online DVD rental and pay-per-view,... Read More

Upgrading Your PC for Non-experts

IntroOne of the big advantages of PCs over earlier types... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Occupational Therapy and PDAs

Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Virtual Memory - What is It?

I recently got an e-mail asking about virtual memory. The... Read More

Quick System Restore with ASR Backups

ASR (Automated System Recovery) is a feature available on the... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Font Organizers Review, Part I

Do you know how many fonts are currently installed on... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

New Computer? Steps to Protect Your Computer Before Connecting to the Internet

Getting a new computer should be an exciting and gratifying... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

iPod users get the picture

iPod users start to get the picture and it's turning... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

Des Moines rental limo ..