PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal Computer; a low cost machine it hopes will create a winning brand. Several models are produced in quick succession accompanied by an ad campaign featuring a Charlie Chaplin figure. The message is clear: It's cheap and it's cheerful.

The growth vector for the product turns out to be a software application called a spreadsheet. Its many early forms - VisiCalc, Multiplan, Lotus 1-2-3, along with WordStar word-processing and of course games all help drive hardware sales.

Nobody seems to question the rapid and promiscuous spread of these programs by copying onto 5.25" floppy disks and passing them from person to person.

That was then. This is now. Harsh fines and jail sentences are threatened to anyone involved in doing what came naturally back in the early '80s. It's a Very Bad Thing to copy software without having a license to do so. They say 'this stuff is ours, we want to be paid for it', and of course they're right.

But here is a problem. Software's binary information is a kind of digital DNA, always wanting to replicate. It's what has made and sustained the digital revolution. When transmitting information, whether from one disk to another or over the Internet, errors can be corrected, faint signals regenerated as new, and even lost portions of messages recreated. This is the essence of the digital world, and replication is its big trick.

One of the things most of us did with our first computer was to copy something. In our early PC vocabulary COPY was the most popular word. Doing it was so easy and so immediately rewarding. It did nobody any harm ? did it? The user got the software and the manufacturer got their product widely distributed.

But a company has to make money, not just gain market share, and at some point in time a shift occurred. It's as if the manufacturers decided to play the soccer off-side rule and grab the high moral ground at the same time - nearly every PC owner in the world was suddenly wrong-footed. And no one after all can disagree with their position. But how will they play catch-up on their lost revenues? How can they now make all their customers compliant?

A London analyst who specialises in intellectual rights issues says "the paradigm we have at present where the license chases the product doesn't seem to be an effective mechanism for compliance by itself."

In other words trying to push a license into everywhere the software has gone without the ease with which the software got there in the first place will prove difficult. But that's not all.

An account manager for a hardware firm in the US says "It can be difficult to keep the licensing nailed down. The hardware changes, the software moves on, departments, even companies, merge. The picture is always changing"

Demand has always fuelled innovation in Information Technology. Fluid, dynamic, competitive, the elements of IT constantly move. Suppliers apply different strategies at different times for different reasons: Market share, volume shipments, profit. Licensing is a big weapon in their arsenal. Then new technologies emerge, legislation changes, big players go bust and others are created. It's hard to see how a static and legalistic document can cover all this.

There are also the licensing arrangements that software manufacturers employ. Licenses may be priced according to whether they are academic, charity, large volume, product upgrade, competitive upgrade, client server, thin-client, or one of several other types. On top of that there are the popular service add-ons of maintenance and technical support.

Of course if we all started afresh that would make things easier. But as that's impossible we must do two things; look at new software in terms of correct quantity and correct type of license. That's the easy part. The not so easy part is to look at what your company already has and see what licenses, if any, are missing or incorrect.

'The biggest criminal gang in history' is about to be disbanded.

?2003 Jamie Plenderleith
Microsoft Certified Licensing Specialist
Chief Developer - Whaddayagot Pro Asset Management Suite

About The Author

Jamie is a software design engineer with Everyman Technologies of Dublin Ireland. He attends Trinity College Dublin part time and is a Sci-Fi fan.

jamie@everyman.ie

monthly home cleaning Buffalo Grove ..
In The News:

Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

Computer Geeks and Garden Gnomes

First and foremost before I begin my ranting it is... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

How To Become A True CCNA

I've worked my way from the CCNA to the CCIE,... Read More

EDTV: What You Should Know Before You Make That Purchase

Enhanced Definition Television ? also known as EDTV ? is... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

What Exactly are Screensavers? - part I

After reading this good article you will know some important... Read More

Portable DVD Players - Things To Know

In my humble opinion nothing makes a long trip easier... Read More

Cisco Certification: A Survival Guide To The Cisco Cable Jungle

One of the most confusing parts of beginning your Cisco... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

The Newbies Guide to Personal Computer Maintenance

When you turn on your computer, does it act like... Read More

Selecting the Perfect Big Screen TV

Selecting a TV isn't as easy as it used to... Read More

scheduled maid service Mundelein ..