Both parties in the IT buying process desire a fair deal based on value, but too often wind up feeling exposed due to complexity, uncertainty, and risk surrounding software assets over time. Traditionally ISVs have relied heavily (or even exclusively) on a single-threaded approach to remediating the problems posed by the IT buying process. In that vein, the most commonly accepted industry approach is arguably the audit. However, ISVs should explore a portfolio approach to monetizing their software. A portfolio model would yield greater overall flexibility in navigating the spectrum between the sins of the past (revenue recapture) and the forward business relationship (sales enablement), and would break that “one size fits all” paradigm of audit for everyone...
Read the Full PostWhen confronted on their misuse, the reasons pirates give for deploying unlicensed software boil down to two categories – "we didn’t know it was happening," or "we needed it to do our jobs and didn’t see another option." Clad in their excuses, when that initial letter of noncompliance crosses their desks, most targets start the process of buying legitimate licenses on the defensive.
Read the Full PostAny fan of National Geographic’s “Wicked Tuna” knows the melodic beep the boat’s fish finding software makes when one boats zeroes in on a potential catch.
Read the Full PostOver the years we have dealt with various software vendors on countless software infringement cases globally. Even though no case is ever identical, we have seen a growing trend of the same excuses being used over and over by the software infringers. As boastful as it sounds, there aren’t a lot of piracy excuses we haven’t already heard. Today, we’re going to review the top reasons we hear why people are using unlicensed software.
Read the Full PostIf you received a letter from the Software Compliance Group (SCG) you are most likely a senior official in your organization. The reason for our letter is to foster constructive dialogue with your firm about a sensitive matter: unlicensed software usage.
Read the Full Post