Both parties in the IT buying process desire a fair deal based on value, but too often wind up feeling exposed due to complexity, uncertainty, and risk surrounding software assets over time. Traditionally ISVs have relied heavily (or even exclusively) on a single-threaded approach to remediating the problems posed by the IT buying process. In that vein, the most commonly accepted industry approach is arguably the audit. However, ISVs should explore a portfolio approach to monetizing their software. A portfolio model would yield greater overall flexibility in navigating the spectrum between the sins of the past (revenue recapture) and the forward business relationship (sales enablement), and would break that “one size fits all” paradigm of audit for everyone...
Read the Full PostWhen confronted on their misuse, the reasons pirates give for deploying unlicensed software boil down to two categories – "we didn’t know it was happening," or "we needed it to do our jobs and didn’t see another option." Clad in their excuses, when that initial letter of noncompliance crosses their desks, most targets start the process of buying legitimate licenses on the defensive.
Read the Full PostOver the years we have dealt with various software vendors on countless software infringement cases globally. Even though no case is ever identical, we have seen a growing trend of the same excuses being used over and over by the software infringers. As boastful as it sounds, there aren’t a lot of piracy excuses we haven’t already heard. Today, we’re going to review the top reasons we hear why people are using unlicensed software.
Read the Full Post